Search icon

Search

Product Type

Discipline / Community

Business Process Lifecycle

Role

Focus Area

Triggering Process

National Program

Emerging Product / Emerging Topic

Global Standards Package (GSP)

Business Problem / Need

Non-GSP, but closely associated resources

Maturity of Product

Support Needs

Search Ranking

Committee

Medium

ON GFIPM.NET

Refine Results
76 Products Found
Cover Page
License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities
The License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities (LPR Policy Template) is a policy guidance resource designed specifically for law enforcement entities and fusion centers to assist them in their efforts to develop comprehensive privacy, civil rights, and civil ...
Cover Page
Global Advisory Committee (GAC) Meeting - Fall 2016 Meeting Highlights
On November 29−30, premier leaders and practitioners from across the justice landscape convened for the Fall 2016 Global Justice Information Sharing Initiative (Global) Advisory Committee (GAC, Committee) Meeting. To maximize resources and provide opportunities for Global engagement by an even greater range of subject-matter ...
Cover Page
Public Safety Primer on Cloud Technology
The Public Safety Primer on Cloud Technology is a high-level primer for law enforcement and public safety communities regarding video and the cloud environment. With the quantity of video evidence now available, storage is a significant problem for record management systems and bandwidth capability. Obtaining video from a ...
Cover Page
Understanding Digital Footprints: Steps to Protect Personal Information
This document provides material designed to assist law enforcement personnel in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don'ts, and links to further cyber training and resources.
Cover Page
Cyber Training for Law Enforcement Call to Action
The flyer is designed to help raise awareness of the need for state, local, tribal, and territorial law enforcement leaders to ensure that appropriate agency personnel receive cybercrime training.
Cover Page
Global Advisory Committee: Fall 2015 GAC Meeting Summary
This document provides an overview of the topics, resolutions, and resources (including associated links) presented and approved at the November 4, 2015, meeting of the Global Advisory Committee (GAC), held in Washington, DC, at the Office of Justice Programs offices. The GAC is supported and guided by the Bureau of Justice ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Audit Guidance for the State, Local, Tribal, and Territorial Intelligence Component
The Privacy, Civil Rights, and Civil Liberties Audit Guidance for the State, Local, Tribal, and Territorial Intelligence Component is designed to help state, local, tribal, and territorial agencies conduct a privacy, civil rights, and civil liberties audit of records within the agency's intelligence component.
Cover Page
Global Advisory Committee (GAC) - Winter 2015 GAC Meeting Summary
This document provides an overview of the topics, resolutions, and resources (including associated links) presented and approved at the January 27, 2015, meeting of the Global Advisory Committee, held in Washington, DC, at the Office of Justice Programs offices. Included is a recap of the biennial election of the new GAC ...
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Video Evidence: A Law Enforcement Guide to Resources and Best Practices
The purpose of this resource is to provide answers to straightforward common questions that law enforcement officers, or the agencies they represent, may have regarding properly securing, collecting, storing, and analyzing video by directing them to valuable tools and resources from experts in the field.  Through ...
Cover Page
Global Justice Information Sharing Initiative: Strategic Solutions to Transform Our Nation’s Justice and Public Safety Information Sharing – A Call to Action
The Global Justice Information Sharing Initiative (Global) Advisory Committee (GAC) is a Federal Advisory Committee to the U.S. Attorney General, providing recommendations on promising national information sharing policies, practices, and technologies to solve problems and improve justice. Through the work of the Bureau of ...
Cover Page
Global Justice Information Sharing Initiative Briefing Booklet
This booklet serves as an excellent primer on the Global Justice Information Sharing Initiative (Global). It includes an overview of Global and the Global Advisory Committee (GAC), and importantly highlights reasons why “Global Matters” to and supports the justice-interested enterprise by addressing priority business issues ...
Cover Page
Health Security: Public Health and Medical Integration for Fusion Centers
This document identifies the recommended actions for state and major urban area fusion centers to integrate the public health and healthcare (PH/HC) community into the fusion process.
Web Address Icon
National Criminal Intelligence Sharing Plan (Version 1.0) Resource CD
Provides resources to implement the National Criminal Intelligence Sharing Plan, version 1.0.
Web Address Icon
Fusion Center Guidelines Resource CD
Provides resources to assist agencies in the development and operation of a fusion center.
Cover Page
Minimum Standards for Intermediate-Level Analytic Training Courses
This resource provides the minimum training standards for intermediate-level analytic courses. Training partners developing intermediate-level analytic courses (such as comprehensive analytic training) or specialized courses (such as report writing or analytic tradecraft development) should use these standards as they ...
Cover Page
National Criminal Intelligence Sharing Plan Version 2.0
The NCISP Version 2.0 provides a way forward to continue to support law enforcement’s and homeland security’s ability to develop and share criminal intelligence through the identification of recommendations and action items. The resource includes both internal agency recommendations and action items, as well as action items ...
Cover Page
Event Deconfliction Unified Message
This resource addresses the importance of using an event deconfliction system in agency operations to assist in officer safety. The resource does not identify what system to use but rather encourages all agencies to use one of the three nationally recognized systems. Additional information on event deconfliction, including ...
Cover Page
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources is designed to be used as a checklist for personnel operating in an intelligence enterprise (including fusion centers and agency intelligence units), to ensure that privacy, civil rights, and civil liberties protections are upheld in ...
Cover Page
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations.
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:  Guidance and Recommendations provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, ...
Web Address Icon
Responding to First Amendment-Protected Events—The Role of State and Local Law Enforcement Officers Training Videos
The Bureau of Justice Assistance, with the support of the Global Justice Information Sharing Initiative and the Criminal Intelligence Coordinating Council, developed the Responding to First Amendment-Protected Events—The Role of State and Local Law Enforcement Officers videos to assist agency leadership in providing training ...
Web Address Icon
JISP Beacon Webinar: Getting the GIST - June 15, 2012
Discussion and demonstration for Getting the Global Information Sharing Toolkit (GIST).  This demonstration provides a step-by-step walkthrough of the GIST, highlighting the ways to discover Global Solutions. 
Cover Page
An Introduction to Familial DNA Searching for State, Local, and Tribal Justice Agencies
GPIQWG, on behalf of Global, developed this overview to support state, local, and tribal (SLT) justice entities that are performing or considering performing familial DNA searching with a primer on the science of familial DNA and its use in criminal investigations, key issues implicated by familial DNA searching, and ...
Cover Page
Criminal Intelligence Resources Guide
Consolidated listing of criminal intelligence products and resources.
Cover Page
A Call To Action: A Unified Message Regarding the Need to Support Suspicious Activity Reporting and Training
This Unified Message was created to help clarify a unified approach to the process of reporting and sharing of information related to suspicious activity.
Cover Page
Minimum Criminal Intelligence Training Standards
The document Minimum Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies explains the recommended development of minimum training standards for all affected levels of law enforcement personnel, including core training objectives in six areas: General Law Enforcement ...
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Web Address Icon
Nationwide Suspicious Activity Reporting (SAR) Concept of Operations
Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
Web Address Icon
Final Report: Information Sharing Suspicious Activity Reporting (SAR) Evaluation Environment
Provides lessons learned, best practices, and implementation steps identified during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Cover Page
Why Law Enforcement Agencies Need an Analytical Function
Why Law Enforcement Agencies Need an Analytical Function explains how the analytical function benefits law enforcement agencies.
Cover Page
National Criminal Intelligence Sharing Plan
The National Criminal Intelligence Sharing Plan (NCISP), the first of its kind in the country, provides a blueprint to help agencies establish criminal intelligence sharing policies, procedures, standards, technologies, and training. The Plan was assembled with close input and cooperation from local, state, tribal, and ...
Cover Page
10 Simple Steps to Help Your Agency Become a Part of the National Criminal Intelligence Sharing Plan
This document provides valuable guidance towards systematically sharing law enforcement information among local, state, tribal, and federal law enforcement agencies—large or small.
Cover Page
Guidelines for Establishing and Operating Gang Intelligence Units and Task Forces
This document provides guidance to agencies seeking to establish and operate a gang task force or gang intelligence unit within their jurisdiction or those agencies that participate in a gang task force or intelligence unit.
Cover Page
Fusion Center Technology Resources Road Map
This document provides guidance on how information, technology infrastructure, applications, performance metrics, and business processes align with the core business capabilities of a fusion center. The document leverages best practices of enterprise architecture, business process, information flow, and exchange ...
Cover Page
Fusion Center Technology Guide
The Fusion Center Technology Guide was developed collaboratively by technology subject matter experts. It provides a methodology for fusion center directors and managers that can be used to facilitate technology planning and provides a practical perspective on the value of technology as an enabler to the fusion center ...
Cover Page
Defining Fusion Center Technology Business Process: A Tool for Planning
The purpose of this document is to provide a tool to fusion center directors/managers to assist with understanding and implementing the fundamental business requirements of the center and planning for the underlying components for each of the business processes the particular fusion center is or will be undertaking (e.g., ...
Cover Page
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
The document Fusion Center Guidelines addresses the development of guidelines for fusion centers as well as the foundation for the development of fusion center guidelines for law enforcement intelligence, public safety, and private sector entities. These guidelines and related materials will provide assistance to centers as ...
Cover Page
Fire Service Integration for Fusion Centers
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the fire service into the fusion process. Within the context of this document, the fire service is defined as including fire and emergency operations, emergency medical service ...
Cover Page
Critical Infrastructure and Key Resources: Protection Capabilities for Fusion Centers
This document identifies the capabilities necessary for state and major urban area fusion centers (fusion centers) to establish a critical infrastructure and key resources (CIKR) protection analytic capability that supports infrastructure security activities at the state and local levels. This document is an appendix to the ...
Cover Page
Law Enforcement Analytic Standards
The booklet Law Enforcement Analytic Standards discusses the standards created by the International Association of Law Enforcement Intelligence Analysts (IALEIA) as a result of the National Criminal Intelligence Sharing Plan (NCISP) recommendations. The analytic standards consist of 25 standards that explain the requirements ...
Cover Page
Common Competencies for State, Local, and Tribal Intelligence Analysts
The Common Competencies for State, Local, and Tribal Intelligence Analysts identifies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for ...
Web Address Icon
Suspicious Activity Reporting (SAR) Line Officer Training
The Suspicious Activity Reporting (SAR) Line Officer Training was developed to assist law enforcement line officers in understanding what kinds of suspicious behaviors are associated with pre-incident terrorism activities, documenting and reporting suspicious activity, and protecting privacy, civil rights, and civil ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
This document assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identifies the high-liability areas of concern that ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Cover Page
Privacy and Information Quality Risks: Justice Agency Use of Biometrics
This awareness primer is intended for administrators and policymakers who have the responsibility for overseeing the use of biometric technology. These individuals may be unaware of the major privacy and information quality issues that can arise at different points in the collection and use of information derived from ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM) 2007 Users Conference Summary Briefing
This PowerPoint presentation was submitted by the Georgia Tech Research Institute (GTRI) to provide an introduction and status of the GFIPM project.  These slides were delivered during the Chicago Users' Conference on August 21, 2007.
Cover Page
Global Federated Identity and Privilege Management (GFIPM) Security Interoperability Demonstration
It is clear that the entire justice and law enforcement community stands to benefit from a solution that allows user management processes (vetting, permissioning, and credentialing) to be efficiently and effectively leveraged and reused across trust domains, thereby facilitating interoperability between SBU information ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
Web Address Icon
SEARCH Podcast: The Global Federated Identity & Privilege Management Initiative
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice credential. This standards-based justice credential ...
Cover Page
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...
Cover Page
IQ Series Overview: Global Information Quality Series Improves the Quality of Justice Information
This flyer provides an overview of the U.S. Department of Justice’s (DOJ) Global Privacy and Information Quality Working Group's (GPIQWG) information quality (IQ) resource series which provides practical guidance on how to develop and implement an agencywide information quality program.  Using a progressive “step” approach, ...
Cover Page
Information Quality Program Guide
This Guide is intended to help justice managers develop an information quality program for their organizations and is designed to support managers who must analyze their justice entity’s information and determine what is needed to ensure good quality information. In support of that effort, the Guide features a step approach ...
Cover Page
Information Quality Self-Assessment Tool
The purpose of this tool is to provide practitioners with guidance in evaluating the information quality of justice information reports associated with justice events by way of a self-administered worksheet, designed to provide practical, hands-on assistance to information systems personnel. Evaluating the quality of agency ...
Cover Page
9 Elements of an Information Quality Program
Developed for high-level, managerial, and administrative personnel within an organization, 9 Elements of an Information Quality Program provides a brief outline of the nine key steps that should be followed when developing and implementing an agencywide information quality (IQ) program.
Cover Page
Information Quality: The Foundation for Justice Decision Making
This document provides an overview of information quality; problems associated with it; and its framework, dimensions, and scenarios.  It also explains what can be done to promote information quality within electronic data exchanges.
Web Address Icon
DHS/DOJ Privacy and Civil Liberties Web Portal
Through a joint effort among DHS, DOJ, and BJA, this collaborative Web portal, accessible at www.it.ojp.gov/PrivacyLiberty, provides access to a wide range of resources and training materials available in the Information Sharing Environment that address privacy and civil liberties protections, including many of the Global ...
Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Cover Page
Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
Practitioners are provided a framework with which to examine the privacy implications of their information systems and information sharing collaborations so they can design and implement privacy policies to address vulnerabilities identified through the assessment process. Privacy policies emerge as a result of the analysis ...
Cover Page
7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
Designed for both justice executives and agency personnel, this document raises awareness and educates readers on the seven basic steps involved in the preparation for development of a privacy, civil rights, and civil liberties policy (as recommended in DOJ's Privacy, Civil Rights, and Civil Liberties Policy Development ...
Cover Page
Baseline Capabilities for State and Major Urban Area Fusion Centers
Provides fusion centers with the baseline capabilities and operational guidelines necessary to achieve each of the capabilities. By achieving a baseline level of capability, a fusion center will have the necessary structures, processes, and tools in place to support the gathering, processing, analysis, and dissemination of ...
Cover Page
Navigating Your Agency’s Path to Intelligence-Led Policing
Serves as an overview for implementing the Intelligence-Led Policing (ILP) framework within a law enforcement agency and provides insight regarding the challenges of ILP implementation. Law enforcement executives can use this document as a resource to assist in the successful implementation of the ILP framework within their ...
Cover Page
The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety Training Video
Assists local, state, and tribal law enforcement line officers in understanding their role in the protection of privacy, civil rights, and civil liberties as they perform their everyday duties. The video provides an introductory overview of what privacy, civil rights, and civil liberties protections are; examples of these ...
Cover Page
The Role of State and Local Law Enforcement at First Amendment Events Reference Card
This reference is designed to serve as a pocket-sized reference card for line officers who are responding to a First Amendment-protected event and provides an overview of their roles and responsibilities, as well as an overview of the rights of the participants of First Amendment-protected events.
Cover Page
Recommendations for First Amendment-Protected Events for State and Local Law Enforcement Agencies
Provides guidance and recommendations to law enforcement agency personnel in understanding their roles and responsibilities in First Amendment-protected events. This guidance document is divided into three stages: Pre-Event, Operational, and Post-Event, with each stage identifying the recommended actions of law enforcement. ...
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Policy Review Checklist
The checklist is a companion piece to the SLT Policy Development Template and serves both as a self-assessment tool to assist privacy policy authors, project teams, and agency administrators in evaluating whether the provisions contained within their draft policy have met the core concepts recommended in the SLT Policy ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: SLT Policy Development Template
Included in the Privacy Guide is the SLT Policy Development Template, which was developed to assist SLT agencies in drafting a privacy policy. The provisions suggested are intended to be incorporated into the agency's general operational policies and day-to-day operations. Each section represents a fundamental component of ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities: Privacy Guide
This guide is a practical, hands-on tool for SLT justice practitioners charged with drafting the privacy policy, providing sensible guidance for articulating privacy obligations in a manner that protects the justice agency, the individual, and the public. This guide provides a well-rounded approach to the planning, ...
Cover Page
Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
An awareness resource for justice executives, as well as an informational tool to use for training. The easy-to-read flyer is designed to engender awareness about the topic, make the case for privacy policy development, and underscore the importance of promoting privacy protections within justice agencies. Included is ...