Publications

Publications

  • All
  • CJIS
  • Corrections
  • Courts
  • Health & Human Services
  • Homeland Security
  • Law Enforcement
  • Public Safety
All
  • All
  • CJIS
  • Corrections
  • Courts
  • Health & Human Services
  • Homeland Security
  • Law Enforcement
  • Public Safety

Protective Order Use Case Assessment

This document aims to help those in information management and exchange roles in the justice and public safety communities to understand how blockchain technology may address challenges faced when managing and sharing information among agencies at the local, state and federal levels. Specifically, it investigates the protective order use case for Missouri and how blockchain technologies can address security, authority and validity, and auditability challenges.

Read More →

Blockchain Task Force Technical Framework Use Case

This document provides a technical framework for public sector justice organizations to understand blockchain or distributed ledger technologies, as well as how and in what instances they should be considered when evaluating solutions for use cases and appropriate characteristics (e.g., security and transparency, shared (peer-to-peer) network, immutability, and method for achieving consensus on transactions).

Read More →

CJIS Background Check Playbook

Founded in 1992, the Criminal Justice Information Services (CJIS) is the largest branch of the Federal Bureau of Investigation (FBI), where it houses biometric, identity history, biographical, proprietary, and case/incident historical data. Since then, the need to store and securely transport sensitive data has increased as more data becomes available, whether through legal or illegal activities.

CJIS information is accessed through online and offline resources as local, state, federal, and tribal governments migrate data to cloud providers. Therefore, companies and cloud providers share a responsibility to protect all data when stored and while in the cloud.

As a result of increased data, the FBI released several standards to ensure the confidentiality and security of Criminal Justice Information (CJI). This playbook provides best practices for managing users who request CJI access, as well as the required state-level background checks to access CJI. This playbook also addresses best practices to use when managing background checks for personnel who require any CJI access.

Read More →

Artificial Intelligence in Justice & Public Safety

The IJIS Institute’s Technology and Architecture Committee (ITAC) provides information to industry and government practitioners regarding technologies, architectures, and standards that enable the successful adoption of the technology and sharing or enterprise use of information. Artificial Intelligence / Machine Learning / Deep Learning are a collection of related technologies that provide great benefits to the criminal justice (i.e., Law Enforcement, Corrections, Courts), homeland security, and public safety domains (i.e., Fire, Emergency Management Services). ITAC developed this position paper on these technologies to benefit our practitioners in these domains.

Read More →

Law Enforcement Facial Recognition Use Case Catalog

This Law Enforcement Facial Recognition Use Case Catalog is a joint effort by a Task Force comprised of IJIS Institute and International Association of Chiefs of Police. The document includes a brief description of how facial recognition works, followed by a short explanation of typical system use parameters. The main body of the catalog contains descriptions and examples of known law enforcement facial recognition use cases. A conclusion section completes this catalog, including four recommended actions for law enforcement leaders.

Read More →

ASAP to PSAP Case Study Standards & Outcomes

This paper will provide background on why Automated Secure Alarm Protocol (ASAP) to Public Safety Answering Point (PSAP), referred herein as ASAP-to-PSAP, is important, and what it takes to get started. Although several papers and presentations exist on the ASAP project, no one paper compiles all relevant information together in one place. The paper will answer questions not covered in other articles and illuminates a path for CAD service providers, consultants, practitioners, and systems integrators to understand ASAP benefits and begin to take the steps to gain greater participation in the ASAP-to-PSAP program.

Read More →

Corrections Technology 2020

The Corrections Tech 2020 white paper , developed by the Corrections Advisory Committee, is a survey of technological trends, current and potential, which are likely to impact the corrections environment in the next 3-5 years. The aim is to provide a ‘one-stop’ high-level overview for the leadership of correctional agencies and their information technology (IT) organizations, to help understand how these capabilities are evolving, and anticipate where technology may be applied to address current and future business problems.

Read More →

CAD to CAD Data Sharing: Recommended Standards

What standards are applicable in a CAD-to-CAD RFP or RFP with CAD-to-CAD requirements? This paper begins a discussion of applicable standards but does not specifically address CAD standards or CAD functional requirements. This discussion will help to guide practitioners to include the most appropriate standards for CAD-to-CAD data sharing.

Read More →

Saving & Satisfaction in the Court (JAVS)

Like court systems everywhere, the Kentucky Court of Justice struggled in the early 1980s with the usual suspects–“growing caseloads, excessive delays, tight budgets, and increasing costs for litigants.” Driven by economic need and the large backlog of getting court records made into written transcripts, the state judicial Administrative Office of the Courts (AOC) reached out to local technology experts Justice AV Solutions (known at that time as Jefferson Audio Video Systems, Inc.) for a better way. The solution came in the form of an automated audio video courtroom recording system designed jointly by the AOC and JAVS “that would automatically switch the microphones and the cameras to the person speaking and would not require an operator, except to turn the system on and off.”

Read More →