Search icon


Product Type

Discipline / Community

Business Process Lifecycle


Focus Area

Triggering Process

National Program

Emerging Product / Emerging Topic

Global Standards Package (GSP)

Business Problem / Need

Non-GSP, but closely associated resources

Maturity of Product

Support Needs

Search Ranking




Refine Results
43 Products Found
Cover Page
A Global Unified Message Regarding Information Sharing
This 2-page resource provides guidance on planning for system interoperability, incorporating nationwide information sharing programs into policies and plans to leverage existing trusted information sharing platforms, and applying best practices to improve access to data while ensuring privacy, civil rights, and civil ...
Cover Page
Considerations and Recommendations Regarding State and Local Officer-Involved Use-of-Force Investigations
The Considerations and Recommendations Regarding State and Local Officer-Involved Use-of-Force Investigations resource sets forth recommendations and considerations for municipal, county, and state law enforcement officials tasked with ensuring accountability for critical use-of-force incidents that result in death or ...
Cover Page
Real-Time and Open Source Analysis (ROSA) Resource Guide
The Real-Time Open Source Analysis (ROSA) Resource Guide was developed by the National Network of Fusion Centers, in partnership with the Office of the Director of National Intelligence's (ODNI) Office of Partner Engagement for the Information Sharing Environment (PE-ISE), the U.S. Department of Homeland Security (DHS), ...
Cover Page
Global Reference Architecture (GRA) Online Training Flyer
The Global Reference Architecture Training is a free, self-paced, online course that helps justice and public safety practitioners gain a comprehensive understanding of the GRA framework, standards, methods, and processes. It uses interactive, scenario-based training that helps stakeholders—such as executives, senior ...
Cover Page
Video Evidence: A Primer for Prosecutors
Video Evidence: A Primer for Prosecutors was developed for the purpose of educating prosecutors on the numerous sources of video evidence, the benefits of its use in court, and challenges faced by prosecutors’ offices in the handling of video evidence. A sample process flow is included as step-by-step guidance on the ...
Cover Page
Understanding Digital Footprints: Steps to Protect Personal Information
This document provides material designed to assist law enforcement personnel in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don'ts, and links to further cyber training and resources.
Cover Page
Cyber Training for Law Enforcement Call to Action
The flyer is designed to help raise awareness of the need for state, local, tribal, and territorial law enforcement leaders to ensure that appropriate agency personnel receive cybercrime training.
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Video Evidence: A Law Enforcement Guide to Resources and Best Practices
The purpose of this resource is to provide answers to straightforward common questions that law enforcement officers, or the agencies they represent, may have regarding properly securing, collecting, storing, and analyzing video by directing them to valuable tools and resources from experts in the field.  Through ...
Cover Page
Event Deconfliction Unified Message
This resource addresses the importance of using an event deconfliction system in agency operations to assist in officer safety. The resource does not identify what system to use but rather encourages all agencies to use one of the three nationally recognized systems. Additional information on event deconfliction, including ...
Cover Page
Sex Offender Registration and Notification Act (SORNA) Interjurisdictional Relocation Service (SIRS) Specification, Version 1.0
Under the federal SORNA (Title I of the Adam Walsh Child Protection and Safety Act of 2006), a sex offender’s SORNA registration jurisdiction (e.g., a state, tribe, or territory) is required to notify the new jurisdiction when the sex offender intends to relocate. The purpose of this legal requirement is to enable the new ...
Cover Page
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources
Checklist for the Development, Review, and Dissemination of Analytic Products and Resources is designed to be used as a checklist for personnel operating in an intelligence enterprise (including fusion centers and agency intelligence units), to ensure that privacy, civil rights, and civil liberties protections are upheld in ...
Cover Page
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations.
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:  Guidance and Recommendations provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, ...
Web Address Icon
Responding to First Amendment-Protected Events—The Role of State and Local Law Enforcement Officers Training Videos
The Bureau of Justice Assistance, with the support of the Global Justice Information Sharing Initiative and the Criminal Intelligence Coordinating Council, developed the Responding to First Amendment-Protected Events—The Role of State and Local Law Enforcement Officers videos to assist agency leadership in providing training ...
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Web Address Icon
Nationwide Suspicious Activity Reporting (SAR) Concept of Operations
Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
Web Address Icon
Final Report: Information Sharing Suspicious Activity Reporting (SAR) Evaluation Environment
Provides lessons learned, best practices, and implementation steps identified during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Cover Page
Why Law Enforcement Agencies Need an Analytical Function
Why Law Enforcement Agencies Need an Analytical Function explains how the analytical function benefits law enforcement agencies.
Cover Page
Guidelines for Establishing and Operating Gang Intelligence Units and Task Forces
This document provides guidance to agencies seeking to establish and operate a gang task force or gang intelligence unit within their jurisdiction or those agencies that participate in a gang task force or intelligence unit.
Cover Page
Fusion Center Technology Resources Road Map
This document provides guidance on how information, technology infrastructure, applications, performance metrics, and business processes align with the core business capabilities of a fusion center. The document leverages best practices of enterprise architecture, business process, information flow, and exchange ...
Cover Page
Fusion Center Technology Guide
The Fusion Center Technology Guide was developed collaboratively by technology subject matter experts. It provides a methodology for fusion center directors and managers that can be used to facilitate technology planning and provides a practical perspective on the value of technology as an enabler to the fusion center ...
Cover Page
Defining Fusion Center Technology Business Process: A Tool for Planning
The purpose of this document is to provide a tool to fusion center directors/managers to assist with understanding and implementing the fundamental business requirements of the center and planning for the underlying components for each of the business processes the particular fusion center is or will be undertaking (e.g., ...
Cover Page
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
The document Fusion Center Guidelines addresses the development of guidelines for fusion centers as well as the foundation for the development of fusion center guidelines for law enforcement intelligence, public safety, and private sector entities. These guidelines and related materials will provide assistance to centers as ...
Cover Page
Fire Service Integration for Fusion Centers
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the fire service into the fusion process. Within the context of this document, the fire service is defined as including fire and emergency operations, emergency medical service ...
Cover Page
Critical Infrastructure and Key Resources: Protection Capabilities for Fusion Centers
This document identifies the capabilities necessary for state and major urban area fusion centers (fusion centers) to establish a critical infrastructure and key resources (CIKR) protection analytic capability that supports infrastructure security activities at the state and local levels. This document is an appendix to the ...
Cover Page
Common Competencies for State, Local, and Tribal Intelligence Analysts
The Common Competencies for State, Local, and Tribal Intelligence Analysts identifies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for ...
Cover Page
Analyst Toolbox
This document aims to provide intelligence analysts with information on the tools they need to effectively and efficiently perform their duties and produce useful intelligence products. The tools examined in this document represent the basic toolbox that the intelligence analyst will need to provide the vital intelligence ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
This document assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identifies the high-liability areas of concern that ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Implementing Privacy Policy in Justice Information Sharing: A Technical Framework
This document is intended to provide guidelines for supporting the electronic expression of privacy policy and how to convert privacy policy so that it is understandable to computers and software. This report is intended as a resource for a technical audience, including National Information Exchange Model (NIEM) and Global ...
Cover Page
7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
Designed for both justice executives and agency personnel, this document raises awareness and educates readers on the seven basic steps involved in the preparation for development of a privacy, civil rights, and civil liberties policy (as recommended in DOJ's Privacy, Civil Rights, and Civil Liberties Policy Development ...
Cover Page
Baseline Capabilities for State and Major Urban Area Fusion Centers
Provides fusion centers with the baseline capabilities and operational guidelines necessary to achieve each of the capabilities. By achieving a baseline level of capability, a fusion center will have the necessary structures, processes, and tools in place to support the gathering, processing, analysis, and dissemination of ...
Cover Page
The Role of State and Local Law Enforcement at First Amendment Events Reference Card
This reference is designed to serve as a pocket-sized reference card for line officers who are responding to a First Amendment-protected event and provides an overview of their roles and responsibilities, as well as an overview of the rights of the participants of First Amendment-protected events.
Cover Page
Recommendations for First Amendment-Protected Events for State and Local Law Enforcement Agencies
Provides guidance and recommendations to law enforcement agency personnel in understanding their roles and responsibilities in First Amendment-protected events. This guidance document is divided into three stages: Pre-Event, Operational, and Post-Event, with each stage identifying the recommended actions of law enforcement. ...
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: SLT Policy Development Template
Included in the Privacy Guide is the SLT Policy Development Template, which was developed to assist SLT agencies in drafting a privacy policy. The provisions suggested are intended to be incorporated into the agency's general operational policies and day-to-day operations. Each section represents a fundamental component of ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities: Privacy Guide
This guide is a practical, hands-on tool for SLT justice practitioners charged with drafting the privacy policy, providing sensible guidance for articulating privacy obligations in a manner that protects the justice agency, the individual, and the public. This guide provides a well-rounded approach to the planning, ...