8/24/2012 SLED Overview of the FBI Criminal Justice Information Services (CJIS) Security Policy Version 5.1 8/09/2012 CJISD-ITS-DOC-08140-5.0 [email protected] For Official Use Only 1 This session will be an overview of the FBI Criminal Justice Information Services (CJIS) Security 5.1 policy and how it pertains and applies to municipal court clerks, magistrates, judges and other court staff who are receiving NCIC criminal justice information. For Official Use Only 2 Security policy The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI data. This policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information. For Official Use Only 3 1 8/24/2012 What is (NCIC) National Crime Information Center NCIC 2000 is a nationwide, computerized information system established as a service to all local, state, federal, and international criminal justice agencies. The goal of NCIC 2000 is to help the criminal justice community perform its duties by providing and maintaining a computerized filing system of accurate and timely documented criminal justice information. For Official Use Only The NCIC 2000 data bank can best be described as a computerized index of documented criminal justice information concerning crimes and criminals of nationwide interest. NCIC files also include missing and unidentified person files, persons files who pose a threat to officer and public safety, as well as stolen property files. All state and local agencies participating in the NCIC 2000 System are required to adhere to the security guidelines that can be found in the FBI/CJIS Security Policy 5.1 For Official Use Only 4 5 The NCIC 2000 System stores vast amounts of criminal justice information which can be instantly retrieved by and/or furnished to any authorized agency and is a virtually uninterrupted operation 24 hours a day, 7 days a week For Official Use Only 6 2 8/24/2012 Types of queries For Official Use Only 7 Types of queries For Official Use Only 8 NCIC stats In January 1967 when NCIC became operational, it included five files, which contained 356,784 records. In its first year of operation, NCIC processed approximately 2.4 million transactions, or an average of 5,479 transactions daily. Last year NCIC processed 2.4 billion transactions. Recently, NCIC experienced a new oneday record of 8.6 million transactions. Presently, NCIC contains 19 files with over 15 million records, of which nearly 1.7 million are in the wanted persons file. NCIC services more than 90,000 user agencies and averages 7.5 million transactions per day. Currently on the average South Carolina performs 350,000 + transactions per day. For Official Use Only 9 3 8/24/2012 The local/regional computer availability goals shall be 100 percent with 96 percent as minimum. Equipment and/or technological incompatibility shall not be sufficient justification for any agency to operate outside of the normal CSA configuration. For Official Use Only The data stored in the NCIC 2000 System and the III File are documented criminal justice information and must be protected to ensure correct, legal, and efficient dissemination and use. It is incumbent upon an agency operating an NCIC 2000 infrastructure to implement the necessary procedures to make that component secure from any unauthorized use. Any departure from this responsibility warrants the removal of the offending component from further NCIC 2000 participation. For Official Use Only 10 11 Throughout the last several years, there have been significant changes in the CJIS community’s telecommunications and systems architecture. As a result of technological advances, the FBI Director authorized a security management structure to specifically address technical security controls, policy revision, oversight, training, and security incident resolution and notification. For Official Use Only 12 4 8/24/2012 In addition to the changes there have been a significant number of the larger and more important computer systems in this country that have been successfully penetrated by individuals whose reasons ran the gamete from monetary profit to ideologic principles. If the National Crime Information Center (NCIC) is going to function efficiently and effectively in today's society System Security must be an omni-present element of its everyday operation. For Official Use Only 13 Therefore the CJIS Advisory Policy Board (APB) adopted new policies in the areas of identification, authentication, encryption, wireless applications, dial-up access, Internet access, public networks, and firewalls to address security concerns. For Official Use Only 14 A Federal Working Group and several regional Working Groups were established to recommend policy and procedures for the programs administered by the FBI CJIS Division. These Working Groups are also responsible for the review of operational and technical issues related to the operation of or policy for these programs. For Official Use Only 15 5 8/24/2012 The FBI uses hardware and software controls to help ensure System security. However, final responsibility for the maintenance of the security and confidentiality of criminal justice information is shared with the individual agencies participating in the NCIC 2000 System and the IT departments who support the agencies. Further information regarding System security can be obtained from the FBI/CJIS Security Policy 5.1 For Official Use Only 16 The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI data. This policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information. For Official Use Only 17 Policy Purpose To provide minimum security requirements associated with the creation, viewing, modification, transmission, dissemination, storage, or destruction of Criminal Justice Information or CJI. To provide a baseline security policy for Local, State, and Federal agencies to build their policies upon. (It is the minimum standard a local policy must follow). The policy covers roles and responsibilities as well as the 12 areas of compliance. For Official Use Only 18 6 8/24/2012 Roles and Responsibilities – State ISO SLED will appoint an Information Security Officer (ISO) who has the responsibility to establish and maintain information security policy, assesses threats and vulnerabilities, performs risk and control assessments, oversees the governance of security operations, and establishes information security training and awareness programs. For Official Use Only 19 Roles and Responsibilities state CSO Each state must have a CJIS Security Officer (CSO) assigned by the head of the CJIS Systems Agency (CSA)(SLED) who is responsible for enforcing security policy rules over ALL agencies, users, and devices accessing CJI information via the state CSA(SLED). For Official Use Only 20 Roles and Responsibilities – Local Level Each local agency accessing Criminal Justice Information or CJI is required to have a Terminal Access Coordinator (TAC) and a Local Access Security Officer (LASO) to oversee that the CJIS Security Policy is being abided by locally. They can be the same person. For Official Use Only 21 7 8/24/2012 Terminal Agency Coordinator (TAC) The TAC serves as the point-of-contact at the local agency for matters relating to CJIS information access. A TAC administers CJIS systems programs within the local agency and oversees the agency’s compliance with CJIS systems policies. The TAC is the Agency Coordinator (AC) For Official Use Only 22 AC of the CGA The AC is a staff member of the CGA who manages agreements, responsible for the supervision and integrity of the system, training and continuing education of employees as required. 3.2.7 For Official Use Only 23 Agency Coordinator (AC) The AC shall be responsible for the supervision and integrity of the system, training and continuing education of employees and operators, scheduling of initial training and testing, and certification testing and all required reports by NCIC. For Official Use Only 24 8 8/24/2012 The AC shall: Understand the communications, records capabilities, and needs of the individual which is accessing federal and state records through or because of its relationship with the CGA. Receive information from the CGA (e.g., system updates) and disseminate it to appropriate individuals. For Official Use Only 25 The AC shall: Maintain up-to-date records of all employees or contractors who access the system, including name, date of birth, social security number, date fingerprint card(s) submitted, date security clearance issued, and date initially trained, tested, certified or recertified (if applicable). For Official Use Only 26 The AC shall: Schedule new operators for the certification exam as well as schedule certified operators for biennial recertification testing within thirty (30) days prior to the expiration of certification. Schedule operators for other mandated class. For Official Use Only 27 9 8/24/2012 The AC shall: The AC will not permit an untrained/untested or non-certified employee or contractor to access CJI or systems supporting CJI where access to CJI can be gained. For Official Use Only 28 The AC shall: Provide completed applicant fingerprint cards on each Contractor employee who accesses the system to the CJA (or, where appropriate, CSA) for criminal background investigation prior to such employee accessing the system. For Official Use Only 29 Local Agency Security Officer (LASO) The primary Information Security contact between a local law enforcement agency and the CSA The LASO actively represents their agency in all matters pertaining to Information Security, disseminates Information Security alerts and other material to their constituents, maintains Information Security documentation (including system configuration data), assists with Information Security audits of hardware and procedures, and keeps the CSA informed as to any Information Security needs and problems. For Official Use Only 30 10 8/24/2012 Roles and Responsibilities – Outsourcing of CJI Administration The responsibility for the management of the approved security requirements shall remain with the Criminal Justice Agency. Thus the outsourcing of the state CSO and ISO positions is not allowed. Thus the outsourcing of local TAC and LASO positions is not allowed For Official Use Only 31 Roles and Responsibilities – Local Points of Contact Local or municipal entities should refer all CJIS Security procedural or technical questions to their local criminal justice agency’s TAC or LASO. They are the local point of contact. If the local TAC or LASO does not have an answer they can refer to the state CSO for assistance. For Official Use Only 32 Illegal Dissemination of CJI and PII Can Lead to Penalties Improper access and dissemination of any CJI data including CHRI may result in administrative sanctions, termination, and state and federal penalties. Refer to S.C. Financial Fraud and Identity Theft Law for more information. For Official Use Only 33 11 8/24/2012 What does the policy cover? Information Exchange Agreements. Awareness Training Incident Response Auditing and Accountability Access Control Identification and Authentication 1. 2. 3. 4. 5. 6. For Official Use Only 34 What does the policy cover? (cont.) 7. 8. 9. 10. 11. 12. Configuration Management Media Protection Physical Protection Systems & Communications Protection and Information Integrity Formal Audits Personnel Security For Official Use Only 35 Information Exchange Agreements Policy Area 1 Criminal Justice Information requires protection throughout its life which is why agreements need to be in place between each agency sharing CJI data. These agreements must specify security controls meeting the CJIS Security Policy requirements and be in place before any CJI can be exchanged. Agreements should state the policies, standards, sanctions, governance, auditing, services accessed and policy compliance required for the user agency CJI exchange includes e-mail, instant messaging, web services, facsimile, hard copy, and the information systems sending, receiving, and storing CJI. For Official Use Only 36 12 8/24/2012 Some Agreement Types User Service Management Control * Inter-Agency * CJIS Security Addendum * Civil Agency User Agreement Livescan/Latent Fingerprint Sharing For Official Use Only 37 Agreements required for NCJA Management Control agreement - grants the criminal justice agency management control over the operations of the noncriminal justice agency as they relate to access to the Law Enforcement Data System network and services. Required between CJA and the NCJA which provides services to the CJA (dispatching, record keeping, computer services, etc.). "Management Control" means the authority to set and enforce: (a) Priorities; (b) Standards for the selection, supervision and termination of personnel; and (c) Policy governing the operation of computers, circuits, and telecommunications terminals used to process, store, or transmit information to or receive information from the Law Enforcement Data System. For Official Use Only 38 Agreements required for NCJA cont’ Inter-Agency – agreement between two agencies that states standards, policy, and access required of the parties State CSA to non-criminal justice agency (DSIT) Local criminal justice agency to non-criminal justice agency (county or city) Security Addendum Criminal Justice Agency & private contractor (each employee) Non-criminal Justice Agency & private contractor (each employee For Official Use Only 39 13 8/24/2012 Example CJA supported by NCJA SLED is CSA SLED’s enterprise extends to Metropolitan PD Metropolitan City IT department performs IT administration of PD network with some private contractors Agreements Needed CJA user agreement between SLED and Metropolitan PD Inter-agency agreement between Metropolitan City IT and Metropolitan PD Management control agreement between Metropolitan PD and Metropolitan City IT Security Addendum between Metropolitan City IT and Private contractors For Official Use Only 40 5.2 Policy Area 2: Security Awareness Training Security awareness training shall be required before an initial assignment for all personnel who have access to CJI. The CSO/CSA may accept the documentation of the completion of security awareness training from another agency. Accepting such documentation from another agency means that the accepting agency assumes the risk that the training may not meet a particular requirement or process required by federal, state, or local laws. For Official Use Only 41 Security Awareness Training Policy Area 2 Security awareness training is mandatory for those with roles in the support, administration or general access to criminal justice information. All criminal justice employees, non-criminal justice employees, contractors, vendors, etc. The level of training is dependent on the role of the individual – IT support requires the highest level of training. For Official Use Only 42 14 8/24/2012 Security Awareness Training Policy Area 2 Training must be performed every two years The management control criminal justice agency designated person (TAC, LASO, ISO, CSO, NCIC coordinator) is responsible for coordinating and verifying the completion of this requirement for their respective agency For Official Use Only 43 Incident Response Policy Area 3 The information security officer at SLED has been identified as the POC on security-related issues for the CSA and respective agencies in the state. The ISO is responsible for ensuring LASOs (local agency security officer) institute the CSA incident response reporting procedures at the local level. For Official Use Only 44 Policy Directive - 5.3 Agencies shall: (i) establish an operational incident handling capability for agency information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; (ii) track, document, and report incidents to appropriate agency officials and/or authorities For Official Use Only 45 15 8/24/2012 Responsibilities for incident response Agencies whether criminal justice or non-criminal justice, that are responsible for the administration of criminal justice, dispatching, record keeping, or computer services for CJI all are required to follow the CJIS policy incident reporting requirements. Four critical tasks must be followed with incidents: Incident Handling Collection of evidence Incident Response training Incident Monitoring These procedures may be audited by SLED and/or the FBI during the required technical and policy audits. For Official Use Only 46 Auditing and Accountability Policy Area 4 Agencies shall implement audit and accountability controls to increase the probability of authorized users conforming to a prescribed pattern of behavior. Agencies shall carefully access the inventory of components that compose their information systems to determine which security controls are applicable to the various components. For Official Use Only 47 Logging Events Policy 5.4 states specific logging requirements Specific events must be logged Content to log on each event is specified Monitoring, analysis and log reporting actions Response to logged events Log retention is 365 days Other requirements exist for NCIC, III and CJIS access and information logging For Official Use Only 48 16 8/24/2012 Access Control Policy Area 5 Access control provides the planning and implementation of mechanisms to restrict reading, writing, processing and transmission of CJIS information and the modification of information systems, applications, services and communication configurations allowing access to CJIS information. Access control includes physical in addition to logical access. For Official Use Only 49 User Access Control Always assign least privilege to accounts Use Job duties, Physical, logical or network location, and Date/Time restrictions for access. All employee status changes must be reported and accounts adjusted as required. Policy guidelines state requirements for annual validation of accounts, logging of access and inactivity or failed log in attempts (policy 5.5) For Official Use Only 50 Access Control Recommendations System administrator access must be tightly regulated. Only allow remote admin access in emergency situations. Don’t allow remote access for group accounts Always provide System Notifications or Warnings to users logging on. Use approved mechanisms to control this access. Policy 5.5.2.3 and 5.5.2.4 Security must be FIPS 140-2. For Official Use Only 51 17 8/24/2012 CJI Access Restrictions CJI access is not allowed from personally owned or public computers. No CJI over Bluetooth at this time due to not FIPS140-2 approved encryption standard. CJI over Wireless and Cellular must be carefully regulated following policy 5.5.7 For Official Use Only 52 Identification and Authentication Policy Area 6 All users must be properly identified prior to access to any agency information systems or services. Follow password policies for all access to the criminal justice infrastructure or network where CJI is transmitted as listed in 5.6.2.1 For Official Use Only 53 Advanced Authentication Advanced Authentication (AA) is required when users are accessing CJI information via a network that is not deemed secure by the SLED ISO. Policy 5.6.2.2 Advanced Authentication is the use additional identifiers on top of login ID and password that may include PKI, biometric, smart cards tokens, software tokens etc… For Official Use Only 54 18 8/24/2012 Configuration Management Policy Area 7 The goal is to allow only qualified and authorized individuals access to information system components for purposes of initiating changes, including upgrades, and modifications. Thus agencies must restrict who has configuration management permissions For Official Use Only 55 Configuration Management Requirements All network changes must provide a detailed network topography diagram to the SLED ISO anytime there is a proposed network change or a network change has occurred. Agencies must protect all system configuration documentation from unauthorized access. For Official Use Only 56 Media Protection Policy Area 8 Procedures must be defined for securely handling, transporting, and storing media both electronic and physical. Procedures must also be in place for the sanitation and disposal of electronic and physical media that meet policies. All entities accessing CJI media must be vetted authorized personnel. Specific policies are in policy 5.8 For Official Use Only 57 19 8/24/2012 Physical Protection Policy Area 9 All CJI and associated information systems must be in a physically secure location. This can be a facility, area, room or group of rooms with controls described in 5.9.1.1 – 5.9.1.9 Personnel security for access to the area must follow policy area 12 The location is subject to the management control of the CJA and must follow all criminal justice policies. For Official Use Only 58 Physical protection A security perimeter should be established and posted as such. A list of authorized personnel with access must be maintained. All physical access points to the secure area must be controlled. All physical access to the IT systems and transmission lines shall be controlled. The display or view of information from outside this controlled area must prevent unauthorized viewing. For Official Use Only 59 Visitor Control Visitors must be authenticated before authorizing escorted access. Access records shall be maintained following the policy requirements in 5.9.1.8 Items entering and exiting the area shall be controlled and authorized For Official Use Only 60 20 8/24/2012 Non-criminal justice agencies or contractors must follow these procedures to report incidents to the LASO at the criminal justice agency they support. (Who signed the management control agreement?) The criminal justice agency LASO will report these incidents to the SLED ISO who will in turn communicate the details to the FBI CJIS ISO. For Official Use Only 61 Systems & Communications Protection and Information Integrity Policy Area 10 Examples range from boundary and transmission protection to securing virtual environments. Information flow enforcement between interconnected systems shall be controlled. For Official Use Only 62 Information Flow Information flow regulates where the information allowed to travel within the IT system and between IT systems. CJI can not be transmitted unencrypted across the public network Outside traffic that claims to be from the agency must be blocked Web requests from the public network not from an internal web proxy should not be passed. For Official Use Only 63 21 8/24/2012 Layers of protection CJI and system shall provide boundary protection as established in policy 5.10.1.1 Encryption standards must be met policy 5.10.1.2, SLED has additional requirements for encryption AES 256. Intrusion detection/prevention tools shall be in place following policy 5.10.1.3 VoIP and facsimile policies shall also be implemented per policy 5.10.1.4 For Official Use Only 64 Information Technology security IT security is hardware and/or software used to assure the integrity and protection of information and the means of processing it. Many criminal justice data systems and networks are interconnected to one another and the Internet. As such, those systems and networks are vulnerable to exploitation by unauthorized individuals. For Official Use Only 65 Partitioning Specific controls must be in place to use this technology with Criminal justice information and Processing. The application, service, or system shall: Separate user functionality (including UI services) form information system management. Separate UI services from information storage and management services either physically or logically. Guidelines for achieving this are specified in 5.10.3.1 For Official Use Only 66 22 8/24/2012 Virtualization All security controls in the policy apply to virtualization. Additional controls exist in policy 5.10.3.2 Isolate host from virtual machine Maintain audit logs for all virtual hosts and machines (store these outside of virtual environment) Physically separate Internet facing virtual machines from virtual machines that process CJI Critical device drivers shall be contained in a separate guest. For Official Use Only 67 Virtualization Addition technical security controls are suggested. These include: Encrypt network traffic between virtual machine and host Implement IDS and IPS within the virtual machine environment Virtually firewall each virtual machine from each other or physically firewall each with an application layer firewall controlling protocols Segregate the administrative duties for the host For Official Use Only 68 System & Information Integrity The agency shall develop and implement a local policy for installing relevant security patches, service packs and hot fixes. The policy must include items and procedures (policy 5.10.4.1) for installing these ‘fixes’. Malicious code, spam and firewall protection must be implemented following policy 5.10.4.2 - 5.10.4.3 For Official Use Only 69 23 8/24/2012 Formal Audits Policy Area 11 Formal audits are conducted on IT services, secure areas, personnel and policies by SLED and the FBI. Regular audit are triennial but can be conducted more frequently. The FBI has the authority to conduct unannounced security inspections and scheduled audits of the facilities. All agencies CJA and NCJA are subject to the audit requirements and inspections. Responses to audit findings must be addressed in an accepted manner by the CJA, SLED and FBI. Failure to correct deficiencies will result in sanctions. For Official Use Only 70 Personnel Security Policy Area 12 All personnel who have access to unencrypted criminal justice information (CJI) including those with only physical or logical access must be screened. All requests for access must be cleared by the CJA who maintains management control. The TAC or LASO is the point of contact for these requests. For Official Use Only 71 Background Checks Notification of subsequent arrest and/or convictions for those who have access must be sent to the CSO to determine if access should be continued. Support personnel, contractors, custodial workers, and others with access to physically secure or controlled locations shall be subject to these regulations unless escorted by an authorized person at all times. For Official Use Only 72 24 8/24/2012 Personnel screening for contractors and vendors In addition to requirements in policy 5.12.1.1, the follow items are in place: The contracting government agency (CGA) shall coordinate the background check prior to granting access with the criminal justice agency that has management control. If a record of any kind if found, the CGA will be notified and access is delayed pending a review by the CJA. The CGA must notify the contractor appointed security officer. All felony convictions are disqualifications for access. Arrest warrants are disqualifications for access. The CGA shall maintain a list of personnel who have been authorized for access and shall provide a current list to the CSO when requested. The CGA can request the CSO to review any denials. For Official Use Only 73 Maintenance after granting physical or logical access Upon termination or separation, the individual’s access shall immediately be terminated. Reassignments or transfers shall result in actions such as closing and establishing new accounts and changing system access authorizations. A formal sanctions process for failure to comply with established information security policies and procedures shall be documented, distributed and enforced. This should be available during an audit. For Official Use Only 74 Background Checks A state of residency and national fingerprint background check is require for unescorted access AND all personnel who have direct access to CJI and all those who have IT responsibility. Any felony conviction will result in access denied. If a record of any kind exists, access can not be granted until the CSO (SLED) reviews and determines if access is appropriate. For Official Use Only 75 25 8/24/2012 System & Information Integrity Any mobile device by design (laptops, handhelds, PDA etc) must employ personal firewall protection. A minimum list of activities performed by the personal firewall is listed in policy 5.10.4.4 Manage program access to the Internet Block unsolicited requests to connect to the device Filter incoming traffic by IP, protocol or destination port Maintain and IP traffic log Security alerts and advisories must be received by the agency and policies must be in place for handling the information. Policy 5.10.4.5 For Official Use Only 76 Information Technology security A vulnerability is a condition or weakness in (or the absence of): Security Procedures Technical Controls Physical Controls Other controls that could be exploited by a threat. For Official Use Only 77 Information Technology security All systems and networks have vulnerabilities. The goal of security is to minimize those vulnerabilities. Vulnerabilities include, but not limited to physical, natural, hardware and software. For Official Use Only 78 26 8/24/2012 Information Technology security Vulnerabilities Examples Physical: The placement of a computer in a non-secure location. Natural: a server connected to a power source without a surge protector or backup power supply. Hardware: a connection to the Internet without a firewall. Software: not updating the computer operating system when updates are issued. For Official Use Only 79 Information Technology security Security Points of Contact Identify who is using the hardware/software and ensure that no unauthorized users have access to same. Identify and document how the equipment is connected to the state system. Ensure that personnel security screening procedures are being followed as stated in the CJIS Security Policy For Official Use Only 80 Information Technology security Ensure that appropriate hardware security measures are in place Support policy compliance and keep the state ISO informed of security incidents. For Official Use Only 81 27 8/24/2012 Remember The local agency may complement the CJIS Security Policy with a local policy, or the agency may develop their own standalone security policy; however, the CJIS Security Policy shall always be the minimum standard and local policy may augment, or increase the standards, but shall not detract from the CJIS Security Policy standards. For Official Use Only 82 Remember This Policy governs the operation of computers, access devices, circuits, hubs, routers, firewalls ,and other components that comprise and support a telecommunications network and related CJIS systems used to process, store, or transmit CJI, guaranteeing the priority ,confidentiality, integrity, and availability of service needed by the criminal justice community. For Official Use Only 83 Remember Responsibility for the management control of network security shall remain with the CJA. Management control of network security includes the authority to enforce the standards for the selection, supervision, and separation of personnel who have access to CJI; set and enforce policy governing the operation of circuits and network equipment used to transmit CJIS data; and to guarantee the priority service as determined by the criminal justice community. For Official Use Only 84 28 8/24/2012 Remember Private contractors who perform criminal justice functions shall meet all policies for training and certification criteria required by governmental agencies performing a similar function, and shall be subject to the same extent of audit review as are local user agencies. Additional screening requirements exist in the security policy 5.1 For Official Use Only 85 Remember All private contractors who perform criminal justice functions shall acknowledge, via signing of the Security Addendum Certification page, and abide by all aspects of the CJIS Security Addendum. For Official Use Only 86 Agreements User Agreements – states policy, standards, sanctions, governance, auditing, services accessed and policy compliance required or the user agency Agreements Needed CJA user agreement between SLED and court agency Inter-agency agreement between Metropolitan City IT and Metropolitan court agency Management control agreement between Metropolitan court agency and Metropolitan City IT Security Addendum between Metropolitan City IT and Private contractors (TAC needs copies) For Official Use Only 87 29 8/24/2012 Contacts/ and Steps to gain access Contact the CSO office in writing requesting access to NCIC data. Once received the CSO office will forward this request to the FBI for an NCIC ORI assignment. Any court that hears civil cases only (with the exception of domestic violence and stalking cases) does not qualify for an NCIC 2000 ORI assignment. Contact person for the CSO office is Millie Galloway at [email protected] or 803896-7142 For Official Use Only 88 Contacts/ and Steps to gain access When the ORI has been established the CSO office will send an Information Exchange Agreement to the court. Completed security addendums between agency and IT vendor. The Court will perform TAC/LASO assignment Security Awareness Training performed on all individuals. For Official Use Only 89 Contacts/ and Steps to gain access Completed finger print checks on all individuals. Completed state of residency Check on all individuals. Once those checks have been performed then the court will send the completed Site Survey and Topology for approval. For Official Use Only 90 30 8/24/2012 www.sled.sc.gov [email protected] [email protected] The End For Official Use Only 91 31
© Copyright 2026 Paperzz