Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: Cloud Computing, Security Journal, Government Cloud Computing, Cloud Security Journal

Article

The Criminal Justice System and the Cloud

Adhering to the FBI’s requirements

As with other industries, the daily operations of law enforcement and criminal justice organizations rely heavily on obtaining, holding and sharing sensitive data. The FBI's Criminal Justice Information System (CJIS) is responsible for providing many critical pieces of data that criminal justice organizations and contractors need to conduct business every day - including fingerprint records, sex offender registries and criminal histories.

There are understandably strict regulations and standards for anyone accessing CJIS data and this applies to any cloud application provider or vendor providing products or services related to this data.

New Standards on CJIS Data & Maintaining Compliance
The FBI, collectively with other law enforcement officials, published new CJIS standards in order to address how CJIS information is accessed and shared across the country and world. By September 2014 (the extended date), all organizations that access the CJIS database must institute specific standards, including what the FBI calls "Advanced Authentication," which specifically entails the need for multiple security measures for anyone accessing or administrating CJIS data, even network administrators. Another requirement is to ensure any data moved outside of a secure facility is properly protected at all times.

While the requirements and process to be compliant may seem daunting, there are solutions available now that can properly encrypt sensitive data and bring vendors into compliance with the CJIS policy. One solution to consider is a Cloud Encryption and Tokenization Gateway, which intercepts sensitive data while it is still on-premise, encrypts or replaces it with a random token and protects the data whether at rest, in transit or on the cloud. As the proliferation of the cloud continues, more stringent regulations surrounding sensitive data held in databases and systems such as the CJIS can be expected. Cloud Encryption and Tokenization Gateways are a viable solution to help organizations stay compliant.

Read the original blog entry...


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit http://www.perspecsys.com/ or follow on Twitter @perspecsys.

More Stories By Gerry Grealish

Gerry Grealish is Vice President, Marketing & Products, at PerspecSys. He is responsible for defining and executing PerspecSys’ marketing vision and driving revenue growth through strategic market expansion and new product development. Previously, he ran Product Marketing for the TNS Payments Division, helping create the marketing and product strategy for its cloud-based payment gateway and tokenization/encryption security solutions. He has held senior marketing and leadership roles for venture-backed startups as well as F500 companies, and his industry experience includes enterprise analytical software, payment processing and security services, and marketing and credit risk decisioning platforms.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.