Published By: MobileIron
Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies.
One purpose of the FBIs CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include:
Loss or theft of device
Unauthorized access to device
Mobile operating system vulnerabilities
Communication over untrusted networks
Malware or malicious Apps
Jailbreak or rooting activity
Data loss through user behaviors
To help protect access to this sensitive information, a strict set of security controls is defined in the FBIs CJIS Security Policy and must be adhered to by organizations that access CJIS information.
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Credit Union Times is the nation's leading independent source for breaking news and analysis for credit union leaders. For more than 20 years, Credit Union Times has set the standard for editorial excellence and ethical, straight-forward reporting.