Contact Us

Choosing an Authentication Solution for Criminal Justice Information System (CJIS) Services

Choosing an Authentication Solution for Criminal Justice Information System (CJIS) Services

With the crucial need to share criminal justice information (CJI) comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing crime fighting operations.

As CJI items contain personal information of offenders, suspects, and witnesses, leakage of such information can violate individual privacy rights.

This paper explains how to select an authentication solution that can help organizations address the controls, requirements and best practices that are part of the Criminal Justice Information Services (CJIS) Security Policy.

Anyone working for local, state, or federal agencies that access and handle Criminal Justice Information through its lifecycle - from creation through dissemination, whether at rest or in transit - should read this guide.

Download Now

* First Name:  
* Last Name:  
* Company Name:  
* Email Address:  
*Phone:  
City:  
* Country:  
*State/Province(US/Canada Only):  
 

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.