Search icon

Search

Product Type

Discipline / Community

Business Process Lifecycle

Role

Focus Area

Triggering Process

National Program

Emerging Product / Emerging Topic

Global Standards Package (GSP)

Business Problem / Need

Non-GSP, but closely associated resources

Maturity of Product

Support Needs

Search Ranking

Committee

Medium

ON GFIPM.NET

Refine Results
95 Products Found
Cover Page
Considerations and Recommendations Regarding State and Local Officer-Involved Use-of-Force Investigations
The Considerations and Recommendations Regarding State and Local Officer-Involved Use-of-Force Investigations resource sets forth recommendations and considerations for municipal, county, and state law enforcement officials tasked with ensuring accountability for critical use-of-force incidents that result in death or ...
Cover Page
Real-Time and Open Source Analysis (ROSA) Resource Guide
The Real-Time Open Source Analysis (ROSA) Resource Guide was developed by the National Network of Fusion Centers, in partnership with the Office of the Director of National Intelligence's (ODNI) Office of Partner Engagement for the Information Sharing Environment (PE-ISE), the U.S. Department of Homeland Security (DHS), ...
Cover Page
License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities
The License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities (LPR Policy Template) is a policy guidance resource designed specifically for law enforcement entities and fusion centers to assist them in their efforts to develop comprehensive privacy, civil rights, and civil ...
Cover Page
Public Safety Primer on Cloud Technology
The Public Safety Primer on Cloud Technology is a high-level primer for law enforcement and public safety communities regarding video and the cloud environment. With the quantity of video evidence now available, storage is a significant problem for record management systems and bandwidth capability. Obtaining video from a ...
Cover Page
Video Evidence: A Primer for Prosecutors
Video Evidence: A Primer for Prosecutors was developed for the purpose of educating prosecutors on the numerous sources of video evidence, the benefits of its use in court, and challenges faced by prosecutors’ offices in the handling of video evidence. A sample process flow is included as step-by-step guidance on the ...
Cover Page
Understanding Digital Footprints: Steps to Protect Personal Information
This document provides material designed to assist law enforcement personnel in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don'ts, and links to further cyber training and resources.
Cover Page
Cyber Training for Law Enforcement Call to Action
The flyer is designed to help raise awareness of the need for state, local, tribal, and territorial law enforcement leaders to ensure that appropriate agency personnel receive cybercrime training.
Cover Page
Arrest Reporting Service Specification, Version 1.0
Reporting arrest information is critical in keeping justice business partners and systems up-to-date with current details regarding arrests. This service provides the ability to report new arrests and provide updates to arrests. NOTE: To fully review the purpose, scope, capability offered and real-world effect(s) this ...
Cover Page
Cover Page
GAC Summer 2014 Summary
On June 23 in Washington, DC, Global Advisory Committee (GAC) representatives from over 30 premier state, local, and tribal justice organizations joined federal sponsors, partners, and guests to tackle today’s justice and public safety challenges facing our neighborhoods and nation through more effective, efficient, and ...
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Video Evidence: A Law Enforcement Guide to Resources and Best Practices
The purpose of this resource is to provide answers to straightforward common questions that law enforcement officers, or the agencies they represent, may have regarding properly securing, collecting, storing, and analyzing video by directing them to valuable tools and resources from experts in the field.  Through ...
Cover Page
Global Justice Information Sharing Initiative Briefing Booklet
This booklet serves as an excellent primer on the Global Justice Information Sharing Initiative (Global). It includes an overview of Global and the Global Advisory Committee (GAC), and importantly highlights reasons why “Global Matters” to and supports the justice-interested enterprise by addressing priority business issues ...
Cover Page
Minimum Standards for Intermediate-Level Analytic Training Courses
This resource provides the minimum training standards for intermediate-level analytic courses. Training partners developing intermediate-level analytic courses (such as comprehensive analytic training) or specialized courses (such as report writing or analytic tradecraft development) should use these standards as they ...
Cover Page
National Criminal Intelligence Sharing Plan Version 2.0
The NCISP Version 2.0 provides a way forward to continue to support law enforcement’s and homeland security’s ability to develop and share criminal intelligence through the identification of recommendations and action items. The resource includes both internal agency recommendations and action items, as well as action items ...
Cover Page
Event Deconfliction Unified Message
This resource addresses the importance of using an event deconfliction system in agency operations to assist in officer safety. The resource does not identify what system to use but rather encourages all agencies to use one of the three nationally recognized systems. Additional information on event deconfliction, including ...
Cover Page
Sex Offender Registration and Notification Act (SORNA) Interjurisdictional Relocation Service (SIRS) Specification, Version 1.0
Under the federal SORNA (Title I of the Adam Walsh Child Protection and Safety Act of 2006), a sex offender’s SORNA registration jurisdiction (e.g., a state, tribe, or territory) is required to notify the new jurisdiction when the sex offender intends to relocate. The purpose of this legal requirement is to enable the new ...
Cover Page
Offender Transfer Notification Service (OTNS) Specification, Version 1.0
The Interstate Commission for Adult Offender Supervision (ICAOS, Commission) is an organization of interstate compact commissioners appointed by the 53 member states and territories to make rules that carry out the policies under which offenders are transferred between and among states.  Its mission is to guide the transfer ...
Cover Page
Global Standards Package (GSP) Frequently Asked Questions (FAQ) Guide
This is a frequently asked questions guide pertaining to the Global Standards Package (GSP) -- what it is and what is contained within it.
Cover Page
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources is designed to be used as a checklist for personnel operating in an intelligence enterprise (including fusion centers and agency intelligence units), to ensure that privacy, civil rights, and civil liberties protections are upheld in ...
Cover Page
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations.
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:  Guidance and Recommendations provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, ...
Cover Page
Applying Wireless Security Practices to Justice Information Sharing
This wireless document is a companion resource to Applying Security Practices to Justice Information Sharing (document) or (Applying Security Practices). In most cases, the reference material in the Applying Security Practices document is relevant to the wireless perspective. This wireless document contains expanded ...
Cover Page
Global Information Sharing Toolkit (GIST) Information Card
The Global Information Sharing Toolkit card illustrates the different ways to navigate a search within the toolkit when looking for Global solutions. 
Cover Page
GFIPM Web Services System-to-System Profile
The GFIPM Web Services System-to-System Profile is a normative specification that defines a complete, composable SOAP Web Services protocol stack for basic system-to-system GFIPM use cases.
Cover Page
GFIPM Trusted Identity Broker Onboarding Guide
The GFIPM Trusted Identity Broker (TIB) Onboarding Guide describes the concept of inter-federation information sharing within the GFIPM paradigm, via the use of a TIB.
Cover Page
GFIPM Overview
This document provides a high-level executive overview of basic Federated Identity and Privilege Management (FIPM) concepts and also introduces the Global Federated Identity and Privilege Management (GFIPM) concept of information sharing based on FIPM. It also discusses the GFIPM value proposition and provides additional ...
Compressed (Zip) File Icon
GFIPM Membership Documents
The GFIPM Membership Documents package is a set of template documents and forms that a GFIPM federation can adopt for its use in support of its governance process. The purpose of each document in this package is described in the GFIPM Operational Policies and Procedures Guideline.
Cover Page
GFIPM Member Certificate Policy Template
The GFIPM Federation Member Certificate Policy (CP) Template provides a template and authoring guidance to any GFIPM federation on how to write its own Member CP, which is a set of rules that indicates the applicability of certain Public Key Infrastructure (PKI) certificates to a particular community and/or class of ...
Cover Page
GFIPM Federation Name Registration Process
The GFIPM Federation Name Registration Process Document describes the process by which the content of the GFIPM Federation Name Registry (http://gfipm.net/fed-registry.html) is managed.
Cover Page
Supervision Conditions Summary Service Specification, Version 1.0
This service provides a summary of supervision (e.g., probation and parole) conditions to which a specific person is subject to. This capability enables exchange partners to quickly and efficiently perform assessments, determine whether a subject is in violation of any supervision conditions, and support decision making ...
Cover Page
Terrorist Screening Center Encounter Information (TSCEI) Service Specification, Version 1.0
This service will be used by state or U.S. government territory designated fusion centers to receive information regarding positive encounters from TSC. The encounter information received by state or U.S. government territory designated fusion centers will be limited to Positive Encounters resulting from the hits by local ...
Cover Page
Fingerprint (FP) Service Specification, Version 1.0
This service will provide positive identification or verification based on the submission of fingerprint information. The service receives one or more fingerprint images and returns a biometrically based response which facilitates the determination of the physical identity of an individual. NOTE: To fully review the ...
Cover Page
An Introduction to Familial DNA Searching for State, Local, and Tribal Justice Agencies
GPIQWG, on behalf of Global, developed this overview to support state, local, and tribal (SLT) justice entities that are performing or considering performing familial DNA searching with a primer on the science of familial DNA and its use in criminal investigations, key issues implicated by familial DNA searching, and ...
Cover Page
Criminal Intelligence Resources Guide
Consolidated listing of criminal intelligence products and resources.
Cover Page
A Call To Action: A Unified Message Regarding the Need to Support Suspicious Activity Reporting and Training
This Unified Message was created to help clarify a unified approach to the process of reporting and sharing of information related to suspicious activity.
Cover Page
Minimum Criminal Intelligence Training Standards
The document Minimum Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies explains the recommended development of minimum training standards for all affected levels of law enforcement personnel, including core training objectives in six areas: General Law Enforcement ...
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Web Address Icon
Nationwide Suspicious Activity Reporting (SAR) Concept of Operations
Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
Web Address Icon
Final Report: Information Sharing Suspicious Activity Reporting (SAR) Evaluation Environment
Provides lessons learned, best practices, and implementation steps identified during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Cover Page
Why Law Enforcement Agencies Need an Analytical Function
Why Law Enforcement Agencies Need an Analytical Function explains how the analytical function benefits law enforcement agencies.
Cover Page
National Criminal Intelligence Sharing Plan
The National Criminal Intelligence Sharing Plan (NCISP), the first of its kind in the country, provides a blueprint to help agencies establish criminal intelligence sharing policies, procedures, standards, technologies, and training. The Plan was assembled with close input and cooperation from local, state, tribal, and ...
Cover Page
10 Simple Steps to Help Your Agency Become a Part of the National Criminal Intelligence Sharing Plan
This document provides valuable guidance towards systematically sharing law enforcement information among local, state, tribal, and federal law enforcement agencies—large or small.
Cover Page
Guidelines for Establishing and Operating Gang Intelligence Units and Task Forces
This document provides guidance to agencies seeking to establish and operate a gang task force or gang intelligence unit within their jurisdiction or those agencies that participate in a gang task force or intelligence unit.
Cover Page
Fusion Center Technology Resources Road Map
This document provides guidance on how information, technology infrastructure, applications, performance metrics, and business processes align with the core business capabilities of a fusion center. The document leverages best practices of enterprise architecture, business process, information flow, and exchange ...
Cover Page
Fusion Center Technology Guide
The Fusion Center Technology Guide was developed collaboratively by technology subject matter experts. It provides a methodology for fusion center directors and managers that can be used to facilitate technology planning and provides a practical perspective on the value of technology as an enabler to the fusion center ...
Cover Page
Defining Fusion Center Technology Business Process: A Tool for Planning
The purpose of this document is to provide a tool to fusion center directors/managers to assist with understanding and implementing the fundamental business requirements of the center and planning for the underlying components for each of the business processes the particular fusion center is or will be undertaking (e.g., ...
Cover Page
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
The document Fusion Center Guidelines addresses the development of guidelines for fusion centers as well as the foundation for the development of fusion center guidelines for law enforcement intelligence, public safety, and private sector entities. These guidelines and related materials will provide assistance to centers as ...
Cover Page
Fire Service Integration for Fusion Centers
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the fire service into the fusion process. Within the context of this document, the fire service is defined as including fire and emergency operations, emergency medical service ...
Cover Page
Critical Infrastructure and Key Resources: Protection Capabilities for Fusion Centers
This document identifies the capabilities necessary for state and major urban area fusion centers (fusion centers) to establish a critical infrastructure and key resources (CIKR) protection analytic capability that supports infrastructure security activities at the state and local levels. This document is an appendix to the ...
Cover Page
Law Enforcement Analytic Standards
The booklet Law Enforcement Analytic Standards discusses the standards created by the International Association of Law Enforcement Intelligence Analysts (IALEIA) as a result of the National Criminal Intelligence Sharing Plan (NCISP) recommendations. The analytic standards consist of 25 standards that explain the requirements ...
Cover Page
Law Enforcement Analyst Certification Standards
This document provides guidance to agencies and organizations that offer analyst certification. The first section provides guidance to agencies and organizations that offer analyst certification. Recommendations include the development of a code of ethics, development of policies and procedures for the certification process, ...
Cover Page
Common Competencies for State, Local, and Tribal Intelligence Analysts
The Common Competencies for State, Local, and Tribal Intelligence Analysts identifies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for ...
Cover Page
Analyst Toolbox
This document aims to provide intelligence analysts with information on the tools they need to effectively and efficiently perform their duties and produce useful intelligence products. The tools examined in this document represent the basic toolbox that the intelligence analyst will need to provide the vital intelligence ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
This document assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identifies the high-liability areas of concern that ...
Cover Page
Global Reference Architecture (GRA) Reliable Secure Web Services Service Interaction Profile
The purpose of this document is to establish a RELIABLE SECURE WEB SERVICES SERVICE INTERACTION PROFILE (RS WS-SIP) based on the Web services (WS) family of technology standards and, in particular, the Web Services Interoperability Organization (WS-I) Reliable Secure Profile [WS-I RSP] to the extent practical. A SERVICE ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Cover Page
Privacy and Information Quality Risks: Justice Agency Use of Biometrics
This awareness primer is intended for administrators and policymakers who have the responsibility for overseeing the use of biometric technology. These individuals may be unaware of the major privacy and information quality issues that can arise at different points in the collection and use of information derived from ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Global Reference Architecture (GRA) Execution Context Guidelines
The purpose of this document is to elaborate on the concept of execution context as defined in the Global Reference Architecture [GRA]. It will do so by providing guidelines to practitioners overseeing the implementation of a SERVICE-ORIENTED ARCHITECTURE (SOA).
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
Cover Page
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...
Cover Page
Implementing Privacy Policy in Justice Information Sharing: A Technical Framework
This document is intended to provide guidelines for supporting the electronic expression of privacy policy and how to convert privacy policy so that it is understandable to computers and software. This report is intended as a resource for a technical audience, including National Information Exchange Model (NIEM) and Global ...
Cover Page
Global Justice Information Sharing Initiative: Exploring Service-Oriented Architecture Services for Justice Information Sharing
This is a pamphlet that offers the reader the opportunity to (1) learn about the U.S. Department of Justice’s Global Justice Information Sharing Initiative (Global) and its pursuit of a Justice Reference Architecture, (2) explore the concept of SOA and why it is important to the future of justice information sharing, and ...
Cover Page
A Framework for Justice Information Sharing: Service-Oriented Architecture (SOA)
The purpose of this report is to describe the recommendation of the Global Justice Information Sharing Initiative (Global) Advisory Committee (GAC) for the design and development of an information system architecture that will support both the operational requirements of justice agencies and the requirements for a ...
Cover Page
Global Reference Architecture (GRA) Information Sharing Enterprise Service-Level Agreement
The purpose of this document is to provide a sample Service-Level Agreement (SLA), in this case, for a fingerprint service to local, state, tribal, or federal justice and public safety agencies organized under a Statement of Participation or similar umbrella agreement. This document may be consulted as an example to ...
Cover Page
Global Reference Architecture (GRA) Information Sharing Enterprise Statement of Participation, Version 1.1
The purpose of this document is to provide a reference model framework of expectations and obligations for those entities participating in any state, local, regional, or tribal information sharing enterprise. An information sharing enterprise is a consortium of information service providers and service consumers created ...
Cover Page
Global Reference Architecture (GRA) ebXML Messaging Service Interaction Profile Version 1.1
The purpose of this document is to establish a SERVICE INTERACTION PROFILE (SIP) based on the ebXML family of technology standards. A Service Interaction Profile is a concept identified in the Global Reference Architecture ([GRA]). This concept defines an approach to meeting the basic requirements necessary for interaction ...
Cover Page
Global Reference Architecture (GRA) Web Services Service Interaction Profile Version 1.3
The purpose of this document is to establish a Web Services Service Interaction Profile based on the Web Services family of technology standards. A Service Interaction Profile is a concept identified in the Global Reference Architecture. This concept defines an approach to meeting the basic requirements necessary for ...
Cover Page
Global Reference Architecture (GRA) Technical Note RESTful Web Services
This Technical Note does not reflect a normative policy position from the Global Justice Information Sharing Initiative (Global) community of stakeholders. Rather, it is intended to inform participants and practitioners on architectural compatibility issues known to exist between the Global Reference Architecture and ...
Cover Page
IQ Series Overview: Global Information Quality Series Improves the Quality of Justice Information
This flyer provides an overview of the U.S. Department of Justice’s (DOJ) Global Privacy and Information Quality Working Group's (GPIQWG) information quality (IQ) resource series which provides practical guidance on how to develop and implement an agencywide information quality program.  Using a progressive “step” approach, ...
Cover Page
Information Quality Program Guide
This Guide is intended to help justice managers develop an information quality program for their organizations and is designed to support managers who must analyze their justice entity’s information and determine what is needed to ensure good quality information. In support of that effort, the Guide features a step approach ...
Cover Page
Information Quality Self-Assessment Tool
The purpose of this tool is to provide practitioners with guidance in evaluating the information quality of justice information reports associated with justice events by way of a self-administered worksheet, designed to provide practical, hands-on assistance to information systems personnel. Evaluating the quality of agency ...
Cover Page
9 Elements of an Information Quality Program
Developed for high-level, managerial, and administrative personnel within an organization, 9 Elements of an Information Quality Program provides a brief outline of the nine key steps that should be followed when developing and implementing an agencywide information quality (IQ) program.
Cover Page
Information Quality: The Foundation for Justice Decision Making
This document provides an overview of information quality; problems associated with it; and its framework, dimensions, and scenarios.  It also explains what can be done to promote information quality within electronic data exchanges.
Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Cover Page
Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
Practitioners are provided a framework with which to examine the privacy implications of their information systems and information sharing collaborations so they can design and implement privacy policies to address vulnerabilities identified through the assessment process. Privacy policies emerge as a result of the analysis ...
Cover Page
7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
Designed for both justice executives and agency personnel, this document raises awareness and educates readers on the seven basic steps involved in the preparation for development of a privacy, civil rights, and civil liberties policy (as recommended in DOJ's Privacy, Civil Rights, and Civil Liberties Policy Development ...
Cover Page
The Global Reference Architecture (GRA) Service Specification Guideline V 1.2.0
This document is intended to provide a formal, standardized means of creating and understanding service specifications and service specification packages.  This document was revised to Version 1.2 with the following minor changes:  Included the use of underscores between words in all folder names. 
Cover Page
Global Reference Architecture (GRA) Guidelines for Identifying and Designing Services Version 1.1
The intent of this document is to provide guidelines to justice organizations that have interest in following or applying the Global Reference Architecture (GRA) in development of a Service-Oriented Architecture (SOA). This document concentrates on an approach to identifying and designing services that will enable effective ...
Cover Page
Global Reference Architecture (GRA) Framework, Version 1.9.1
The Global Reference Architecture (GRA) Framework—is a conceptual framework for Service Oriented Architecture (SOA) that is based on an industry standard, the OASIS SOA Reference Model, which was developed by a committee of industry and government SOA experts, including some of the Global Infrastructure/Standards Working ...
Cover Page
Baseline Capabilities for State and Major Urban Area Fusion Centers
Provides fusion centers with the baseline capabilities and operational guidelines necessary to achieve each of the capabilities. By achieving a baseline level of capability, a fusion center will have the necessary structures, processes, and tools in place to support the gathering, processing, analysis, and dissemination of ...
Cover Page
Navigating Your Agency’s Path to Intelligence-Led Policing
Serves as an overview for implementing the Intelligence-Led Policing (ILP) framework within a law enforcement agency and provides insight regarding the challenges of ILP implementation. Law enforcement executives can use this document as a resource to assist in the successful implementation of the ILP framework within their ...
Cover Page
The Role of State and Local Law Enforcement at First Amendment Events Reference Card
This reference is designed to serve as a pocket-sized reference card for line officers who are responding to a First Amendment-protected event and provides an overview of their roles and responsibilities, as well as an overview of the rights of the participants of First Amendment-protected events.
Cover Page
Recommendations for First Amendment-Protected Events for State and Local Law Enforcement Agencies
Provides guidance and recommendations to law enforcement agency personnel in understanding their roles and responsibilities in First Amendment-protected events. This guidance document is divided into three stages: Pre-Event, Operational, and Post-Event, with each stage identifying the recommended actions of law enforcement. ...
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Policy Review Checklist
The checklist is a companion piece to the SLT Policy Development Template and serves both as a self-assessment tool to assist privacy policy authors, project teams, and agency administrators in evaluating whether the provisions contained within their draft policy have met the core concepts recommended in the SLT Policy ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: SLT Policy Development Template
Included in the Privacy Guide is the SLT Policy Development Template, which was developed to assist SLT agencies in drafting a privacy policy. The provisions suggested are intended to be incorporated into the agency's general operational policies and day-to-day operations. Each section represents a fundamental component of ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities: Privacy Guide
This guide is a practical, hands-on tool for SLT justice practitioners charged with drafting the privacy policy, providing sensible guidance for articulating privacy obligations in a manner that protects the justice agency, the individual, and the public. This guide provides a well-rounded approach to the planning, ...
Cover Page
Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
An awareness resource for justice executives, as well as an informational tool to use for training. The easy-to-read flyer is designed to engender awareness about the topic, make the case for privacy policy development, and underscore the importance of promoting privacy protections within justice agencies. Included is ...