{"id":29913,"date":"2021-03-29T03:07:30","date_gmt":"2021-03-29T08:07:30","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=29913"},"modified":"2021-04-15T05:16:09","modified_gmt":"2021-04-15T10:16:09","slug":"understanding-cjis-and-how-filecloud-help-you-with-the-compliance","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/","title":{"rendered":"Understanding CJIS Policies and Implementation using FileCloud"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-29928\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/CJIS.png\" alt=\"\" width=\"552\" height=\"368\"><\/p>\n<p>CJIS Security Policy entails information security requirements, guidelines, and agreements documenting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The Criminal Justice Information (CJIS) Security Policy provides a secure model of laws, standards, and elements of published and vetted policies for accomplishing the mission across the broad spectrum of the criminal justice and noncriminal justice communities.<\/p>\n<p><span dir=\"ltr\">The prime focus of the CJIS Security Policy is to implement the proper controls <\/span><span dir=\"ltr\">necessary to secure the full lifecycle of CJI, both at rest and in transit.<\/span><span dir=\"ltr\"> It applies to a private entity, <\/span><span dir=\"ltr\">contractor, noncriminal justice agency representative, or member of a <\/span><span dir=\"ltr\">criminal justice entity that utilizes or has access to criminal justice services <\/span><span dir=\"ltr\">and information. <\/span><\/p>\n<p>Because the magnitude of cyberattacks has increased over the years, CJIS has had to adapt. CJIS came up with a set of standards for organizations, cloud vendors for software as a service (SaaS), local agencies, and corporate networks, etc. These standards must be complied with by those parties to ensure best practices for wireless networks, remote access, data encryption, and multiple-step authentication.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Ground_Rules_of_CJIS\" title=\"Ground Rules of CJIS\">Ground Rules of CJIS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_and_Implementation_Using_FileCloud\" title=\"Policy and Implementation Using FileCloud\">Policy and Implementation Using FileCloud<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_1%E2%80%94Information_Exchange_Agreements\" title=\"Policy Area 1\u2014Information Exchange Agreements\">Policy Area 1\u2014Information Exchange Agreements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_2%E2%80%94Security_Awareness_Training\" title=\"Policy Area 2\u2014Security Awareness Training\">Policy Area 2\u2014Security Awareness Training<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_3%E2%80%94Incident_Response\" title=\"Policy Area 3\u2014Incident Response\">Policy Area 3\u2014Incident Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_4%E2%80%94Auditing_and_Accountability\" title=\"Policy Area 4\u2014Auditing and Accountability\">Policy Area 4\u2014Auditing and Accountability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_5%E2%80%94Access_Control\" title=\"Policy Area 5\u2014Access Control\">Policy Area 5\u2014Access Control<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_6_%E2%80%94_Identification_and_Authentication\" title=\"Policy Area 6 \u2014 Identification and Authentication\">Policy Area 6 \u2014 Identification and Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_7_%E2%80%94_Configuration_Management\" title=\"Policy Area 7 \u2014 Configuration Management\">Policy Area 7 \u2014 Configuration Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_8_%E2%80%94_Media_Protection\" title=\"Policy Area 8 \u2014 Media Protection\">Policy Area 8 \u2014 Media Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_9_%E2%80%94_Physical_Protection\" title=\"Policy Area 9 \u2014 Physical Protection\">Policy Area 9 \u2014 Physical Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#_Policy_Area_10%E2%80%94Systems_and_Communications_Protection_and_Information_Integrity\" title=\"\u00a0Policy Area 10\u2014Systems and Communications Protection and Information Integrity\">\u00a0Policy Area 10\u2014Systems and Communications Protection and Information Integrity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_11_%E2%80%94_Formal_Audits\" title=\"Policy Area 11 \u2014 Formal Audits\">Policy Area 11 \u2014 Formal Audits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_12_%E2%80%94_Personnel_Security\" title=\"Policy Area 12 \u2014 Personnel Security\">Policy Area 12 \u2014 Personnel Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Policy_Area_13_%E2%80%94_Mobile_Devices\" title=\"Policy Area 13 \u2014 Mobile Devices\">Policy Area 13 \u2014 Mobile Devices<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Ground_Rules_of_CJIS\"><\/span>Ground Rules of CJIS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The policies proposed by CJIS encompass best practices in wireless networking, remote access, data encryption, and multiple authentications. Some basic rules include:<\/p>\n<ul class=\"dot-list\">\n<li>A limit of 5 unsuccessful login attempts by a user accessing CJIS<\/li>\n<li>Event logging various login activities, including password changes<\/li>\n<li>Weekly audit reviews<\/li>\n<li>Active account management moderation<\/li>\n<li>Session lock after 30 minutes of inactivity<\/li>\n<li>Access restriction based on physical location, job assignment, time of day, and network address<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Policy_and_Implementation_Using_FileCloud\"><\/span>Policy and Implementation Using FileCloud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We will now go through a high-level overview of the 13 policy areas of the CJIS Security Policy v5.3 and how FileCloud will help you implement these<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_1%E2%80%94Information_Exchange_Agreements\"><\/span>Policy Area 1\u2014Information Exchange Agreements<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Organizations dealing with CJI must have signed written agreements documenting the full length of their interaction and the relevant security policies and procedures in place between them to ensure appropriate safeguards. CJIS policy incorporates procedures on how information is handled and what should be in user agreements. Companies and agencies that use CJI must include specific processes and parameters in their information exchange agreements, including:<\/p>\n<ul>\n<li>Audits<\/li>\n<li>Dissemination<\/li>\n<li>Hit confirmation<\/li>\n<li>Logging<\/li>\n<li>Quality assurance<\/li>\n<li>Pre-employment screening<\/li>\n<li>Security<\/li>\n<li>Timeliness<\/li>\n<li>Training<\/li>\n<li>Use of systems<\/li>\n<li>Validation<\/li>\n<\/ul>\n<p>FileCloud understands this is a shared responsibility between the parties and has the provision to implement the information exchange policy in the enterprise edition.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_2%E2%80%94Security_Awareness_Training\"><\/span>Policy Area 2\u2014Security Awareness Training<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Basic security awareness training should be given in the initial six months and biennially for all personnel who have access to CJI. Records of individual basic security awareness training and specific information system security training shall be documented and updated. This is the customer\u2019s responsibility to make sure the training is made available to all the personnel having access to the information and keep the training documents up to date.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_3%E2%80%94Incident_Response\"><\/span>Policy Area 3\u2014Incident Response<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Agencies must incorporate operational incident handling capability for malicious computer attacks against agency information systems to include adequate preparation, detection, analysis, containment, recovery, and user response activities. Agencies must also track, document, and report incidents to appropriate officials. Incident-related information can be obtained from different sources including audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports. The agency should incorporate the experience from ongoing incident handling activities into the incident response procedures and implement the procedures accordingly.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_4%E2%80%94Auditing_and_Accountability\"><\/span>Policy Area 4\u2014Auditing and Accountability<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Agencies must provide for the ability to generate audit records of their systems for defined events. FileCloud Server has extensive auditing support and every operation in FileCloud Server is logged. By providing options to record every action with What, When, Who, and How attributes, FileCloud gives customers the best possible audit data to satisfy CJIS compliance. FileCloud has the capability to record logs of all events, Metadata, timestamps, the outcome of events. FileCloud can also help you create audit reports. FileCloud also has the capability to retain these audit reports\/logs for a year or until the information is no longer needed.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_5%E2%80%94Access_Control\"><\/span>Policy Area 5\u2014Access Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>One of the more complex Policy Areas, an Agency\u2019s IT organization, will implement multiple mechanisms addressing login management systems, remote access, virtual private network (VPN) solutions certified to the FIPS 140-2 standard and enact policies and controls for Wi-Fi, Bluetooth and cellular devices.<\/p>\n<p>FileCloud can be used to implement access control policies (identity-based policies, role-based policies, rule-based policies) and associated access enforcement mechanisms (access control lists, access control matrices, cryptography). It can <span dir=\"ltr\">enforce a limit of no more than 5 <\/span><span dir=\"ltr\">consecutive invalid access attempts by a user, initiate session lock after 30 min of inactivity, automated mechanisms to facilitate the monitoring and control of remote access methods. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_6_%E2%80%94_Identification_and_Authentication\"><\/span>Policy Area 6 \u2014 Identification and Authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Agencies must uniquely identify users and processes acting on behalf of users.<\/p>\n<p>Admins have the ability to set permissions for each individual user. Access permissions are generally enforced uniformly regardless of location and access method (web browser, FileCloud drive, WebDAV, FileCloud sync, mobile\/tablet app). Admins can also set an expiration date for a user, after which the user permissions will expire and will no longer have access to the FileCloud system. Admin can also disable the user for a certain period of time. FileCloud password policy management allows admins to set minimum password length for user accounts and account lockout after failed logins. Account lockout prevents brute force password attacks by immediately locking out the access point after multiple failed login attempts.<\/p>\n<p>Most security threats today are a result of compromised user credentials. With FileCloud\u2019s two-factor authentication, users can require an extra 2FA code as part of the user authentication process. The additional login step requires users to verify their identity using a 2FA code sent via email creating a double-check for every authentication.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_7_%E2%80%94_Configuration_Management\"><\/span>Policy Area 7 \u2014 Configuration Management<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The goal is to allow only qualified and authorized individuals\u2019 access to information system components for purposes of initiating changes, including upgrades and modifications. FileCloud system administrators can configure and view the complete list of shares created by users and locked files and folders. The User Shares Report includes information such as user name, location, expiration, and share type (private or public). The User Locks Report provides a list of files locked by users. FileCloud monitors all user logins and activities including deletion, uploads, and downloads. In addition, FileCloud provides tools to filter activities using a date range, user names, and text search.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_8_%E2%80%94_Media_Protection\"><\/span>Policy Area 8 \u2014 Media Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Media protection policy and procedures shall be documented and implemented to ensure that access to electronic and physical media in all forms is restricted to authorized individuals. Procedures shall be defined for securely handling, transporting, and storing media.<\/p>\n<p>With FileCloud, you can encrypt Managed Disk Storage for compliance and security reasons. If a FIPS-enabled FileCloud license is installed, there is a new option in the Admin Portal to enable FileCloud to run in FIPS mode in FileCloud Server version 19.1 and later.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_9_%E2%80%94_Physical_Protection\"><\/span>Policy Area 9 \u2014 Physical Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Physical protection policy and procedures shall be documented and implemented to ensure CJI and information system hardware, software, and media are physically protected through access control measures.<\/p>\n<p>FileCloud protects the confidentiality and integrity of your files in transit and at rest.<\/p>\n<ul>\n<li>AES 256-bit encryption to store files at rest.<\/li>\n<li>SSL\/TLS secure tunnel for file transmission.<\/li>\n<li>Site-specific, customer-managed encryption keys in a multi-tenant setup. Each tenant gets their own set of encryption keys.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_Policy_Area_10%E2%80%94Systems_and_Communications_Protection_and_Information_Integrity\"><\/span>\u00a0Policy Area 10\u2014Systems and Communications Protection and Information Integrity<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Communications safeguards must be employed to ensure the security and integrity of data across the network both in motion and at rest.<\/p>\n<p>FileCloud security includes 256-bit AES SSL encryption at Rest, Active Directory integration, two-factor authentication, granular user and file-sharing permissions, client application security policies, anti-virus scanning, unlimited file versioning, recycle bin, file locking, endpoint device protection, and comprehensive CJIS compliant audit trail.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_11_%E2%80%94_Formal_Audits\"><\/span>Policy Area 11 \u2014 Formal Audits<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span dir=\"ltr\">Formal audits are conducted to ensure compliance with <\/span><span dir=\"ltr\">applicable statutes, regulations, and policies. These audits will be executed by either the FBI CJIS Audit Unit (CAU) or the state\u2019s lead CJIS Systems Agency (CSA).<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_12_%E2%80%94_Personnel_Security\"><\/span>Policy Area 12 \u2014 Personnel Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Agencies must provide security screenings consisting of state of residence and national fingerprint-based record checks for all personnel with either physical or logical access to unencrypted CJI. This applies to agency personnel, vendors, and contractors.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Policy_Area_13_%E2%80%94_Mobile_Devices\"><\/span>Policy Area 13 \u2014 Mobile Devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Long overdue; this section provides detailed guidance regarding employing mobile devices, e.g. cellular-enabled smartphones and tablets. Here you\u2019ll find minimum functions required to manage mobile devices and an introduction to the concept of compensating controls in order to bridge the inherent technical limitations of some devices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span dir=\"ltr\">FileCloud <\/span><span dir=\"ltr\">Server is the commercial of the shelf <\/span><span dir=\"ltr\">software solution that helps businesses <\/span><span dir=\"ltr\">securely share, manage, and govern enterprise <\/span><span dir=\"ltr\">content. <\/span><span dir=\"ltr\">FileCloud<\/span><span dir=\"ltr\">software provides the <\/span><span dir=\"ltr\">necessary capabilities for organizations to <\/span><span dir=\"ltr\">obtain compliance with CJIS.<\/span><span dir=\"ltr\"> The end<\/span><span dir=\"ltr\">\u2013<\/span><span dir=\"ltr\">user is responsible for utilizing suitable <\/span><span dir=\"ltr\">FileCloud <\/span><span dir=\"ltr\">capabilities as well as managing and <\/span><span dir=\"ltr\">maintaining the environment where <\/span><span dir=\"ltr\">FileCloud <\/span><span dir=\"ltr\">is being hosted to ensure CJIS\u2019s requirements <\/span><span dir=\"ltr\">are being met. <\/span><span dir=\"ltr\">FileCloud <\/span><span dir=\"ltr\">aids with your CJIS compliance efforts <\/span><span dir=\"ltr\">under the shared responsibility model.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><em><strong>References<\/strong> <\/em><\/p>\n<p>https:\/\/itlaw.wikia.org\/wiki\/Criminal_Justice_Information_Services_Security_Policy<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CJIS Security Policy entails information security requirements, guidelines, and agreements documenting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The Criminal Justice Information (CJIS) Security Policy provides a secure model of laws, standards, and elements of published and vetted policies for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[284],"tags":[74,985,1402,310,941,1249],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding CJIS Policies and Implementation using FileCloud - FileCloud blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding CJIS Policies and Implementation using FileCloud\" \/>\n<meta property=\"og:description\" content=\"CJIS Security Policy entails information security requirements, guidelines, and agreements documenting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The Criminal Justice Information (CJIS) Security Policy provides a secure model of laws, standards, and elements of published and vetted policies for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-29T08:07:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-15T10:16:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/CJIS.png\" \/>\n<meta name=\"author\" content=\"Team FileCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team FileCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\"},\"author\":{\"name\":\"Team FileCloud\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\"},\"headline\":\"Understanding CJIS Policies and Implementation using FileCloud\",\"datePublished\":\"2021-03-29T08:07:30+00:00\",\"dateModified\":\"2021-04-15T10:16:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\"},\"wordCount\":1527,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"audit logs\",\"CJIS\",\"Data encryption\",\"Data Governance\",\"Security audits\",\"Versioning\"],\"articleSection\":[\"data governance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\",\"name\":\"Understanding CJIS Policies and Implementation using FileCloud - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2021-03-29T08:07:30+00:00\",\"dateModified\":\"2021-04-15T10:16:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding CJIS Policies and Implementation using FileCloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\",\"name\":\"Team FileCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"caption\":\"Team FileCloud\"},\"sameAs\":[\"http:\/\/www.filecloud.com\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding CJIS Policies and Implementation using FileCloud - FileCloud blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Understanding CJIS Policies and Implementation using FileCloud","og_description":"CJIS Security Policy entails information security requirements, guidelines, and agreements documenting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The Criminal Justice Information (CJIS) Security Policy provides a secure model of laws, standards, and elements of published and vetted policies for [&hellip;]","og_url":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2021-03-29T08:07:30+00:00","article_modified_time":"2021-04-15T10:16:09+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/CJIS.png"}],"author":"Team FileCloud","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Team FileCloud","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/"},"author":{"name":"Team FileCloud","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935"},"headline":"Understanding CJIS Policies and Implementation using FileCloud","datePublished":"2021-03-29T08:07:30+00:00","dateModified":"2021-04-15T10:16:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/"},"wordCount":1527,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["audit logs","CJIS","Data encryption","Data Governance","Security audits","Versioning"],"articleSection":["data governance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/","url":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/","name":"Understanding CJIS Policies and Implementation using FileCloud - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2021-03-29T08:07:30+00:00","dateModified":"2021-04-15T10:16:09+00:00","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/understanding-cjis-and-how-filecloud-help-you-with-the-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding CJIS Policies and Implementation using FileCloud"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935","name":"Team FileCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","caption":"Team FileCloud"},"sameAs":["http:\/\/www.filecloud.com"],"url":"https:\/\/www.filecloud.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29913"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=29913"}],"version-history":[{"count":8,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29913\/revisions"}],"predecessor-version":[{"id":30064,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29913\/revisions\/30064"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=29913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=29913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=29913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}