Industries
Mishandling or exposing criminal justice records could result in grave consequences for individuals "in the system"— and for our justice system as a whole. The FBI's CJIS Policy protects sensitive information by setting standards for information handling. Compliance to CJIS policy is evaluated at least once every three years.
The services below can be utilized “a la carte,” or, our business development team can design a plan that integrates a number of services to better your compliance standing. Each staff member working with your systems has undergone a fingerprint background check (Policy Area 12) —even auditors, though that isn’t explicitly required at this time.
(Policy Area 2)
New school online coursework paired with simulated phishing to shrink your greatest attack surface.
(CJIS Policy Area 3)
A dedicated team to respond to network intrusions and contain threats.
(All Policy Areas)
An audit “simulator” — your processes are evaluated against all CJIS policy areas. With a clear executive summary in hand, your team is empowered to make changes according to your timeline.
(Policy Areas 3, 4 & 10)
Your network monitored 24/7/365 by dedicated
(Policy Area 10)
Encryption of your data in transit and at rest to preserve the sanctity of the records in your care.
Our managed IT partner, EDTS, can assist agencies with Policy Areas 5, 6 and 7. Learn More
We aim to understand where you are, where you want to be, and help develop a path to get you there.
Dedicated Team
Our team has undergone the federal requirements for working with and around CJI systems, including fingerprint background checks. We also bring a culture of experience and professionalism to our work with federal and government agencies. We feel more like an extension of your team than an external partner.
Approved Vendor
Your Partner
Copyright © 2018 EDTS Cyber, LLC. | All rights reserved. | Privacy Notice