Browse icon

Browse

Browse Categories

Business Problem / Need > Establishing a Privacy Policy

Cover Page
License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities
The License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities (LPR Policy Template) is a policy guidance resource designed specifically for law enforcement entities and fusion centers to assist them in their efforts to develop comprehensive privacy, civil rights, and civil ...
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations.
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:  Guidance and Recommendations provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, ...
Cover Page
An Introduction to Familial DNA Searching for State, Local, and Tribal Justice Agencies
GPIQWG, on behalf of Global, developed this overview to support state, local, and tribal (SLT) justice entities that are performing or considering performing familial DNA searching with a primer on the science of familial DNA and its use in criminal investigations, key issues implicated by familial DNA searching, and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Cover Page
Privacy and Information Quality Risks: Justice Agency Use of Biometrics
This awareness primer is intended for administrators and policymakers who have the responsibility for overseeing the use of biometric technology. These individuals may be unaware of the major privacy and information quality issues that can arise at different points in the collection and use of information derived from ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM) 2007 Users Conference Summary Briefing
This PowerPoint presentation was submitted by the Georgia Tech Research Institute (GTRI) to provide an introduction and status of the GFIPM project.  These slides were delivered during the Chicago Users' Conference on August 21, 2007.
Cover Page
Global Federated Identity and Privilege Management (GFIPM) Security Interoperability Demonstration
It is clear that the entire justice and law enforcement community stands to benefit from a solution that allows user management processes (vetting, permissioning, and credentialing) to be efficiently and effectively leveraged and reused across trust domains, thereby facilitating interoperability between SBU information ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
Web Address Icon
SEARCH Podcast: The Global Federated Identity & Privilege Management Initiative
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice credential. This standards-based justice credential ...
Cover Page
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...
Cover Page
Information Quality Self-Assessment Tool
The purpose of this tool is to provide practitioners with guidance in evaluating the information quality of justice information reports associated with justice events by way of a self-administered worksheet, designed to provide practical, hands-on assistance to information systems personnel. Evaluating the quality of agency ...
Cover Page
9 Elements of an Information Quality Program
Developed for high-level, managerial, and administrative personnel within an organization, 9 Elements of an Information Quality Program provides a brief outline of the nine key steps that should be followed when developing and implementing an agencywide information quality (IQ) program.
Cover Page
Information Quality: The Foundation for Justice Decision Making
This document provides an overview of information quality; problems associated with it; and its framework, dimensions, and scenarios.  It also explains what can be done to promote information quality within electronic data exchanges.
Web Address Icon
DHS/DOJ Privacy and Civil Liberties Web Portal
Through a joint effort among DHS, DOJ, and BJA, this collaborative Web portal, accessible at it.ojp.gov/PrivacyLiberty, provides access to a wide range of resources and training materials available in the Information Sharing Environment that address privacy and civil liberties protections, including many of the Global ...
Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Cover Page
Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
Practitioners are provided a framework with which to examine the privacy implications of their information systems and information sharing collaborations so they can design and implement privacy policies to address vulnerabilities identified through the assessment process. Privacy policies emerge as a result of the analysis ...
Cover Page
7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
Designed for both justice executives and agency personnel, this document raises awareness and educates readers on the seven basic steps involved in the preparation for development of a privacy, civil rights, and civil liberties policy (as recommended in DOJ's Privacy, Civil Rights, and Civil Liberties Policy Development ...
Cover Page
Baseline Capabilities for State and Major Urban Area Fusion Centers
Provides fusion centers with the baseline capabilities and operational guidelines necessary to achieve each of the capabilities. By achieving a baseline level of capability, a fusion center will have the necessary structures, processes, and tools in place to support the gathering, processing, analysis, and dissemination of ...
Cover Page
The Role of State and Local Law Enforcement at First Amendment Events Reference Card
This reference is designed to serve as a pocket-sized reference card for line officers who are responding to a First Amendment-protected event and provides an overview of their roles and responsibilities, as well as an overview of the rights of the participants of First Amendment-protected events.
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Policy Review Checklist
The checklist is a companion piece to the SLT Policy Development Template and serves both as a self-assessment tool to assist privacy policy authors, project teams, and agency administrators in evaluating whether the provisions contained within their draft policy have met the core concepts recommended in the SLT Policy ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: SLT Policy Development Template
Included in the Privacy Guide is the SLT Policy Development Template, which was developed to assist SLT agencies in drafting a privacy policy. The provisions suggested are intended to be incorporated into the agency's general operational policies and day-to-day operations. Each section represents a fundamental component of ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities: Privacy Guide
This guide is a practical, hands-on tool for SLT justice practitioners charged with drafting the privacy policy, providing sensible guidance for articulating privacy obligations in a manner that protects the justice agency, the individual, and the public. This guide provides a well-rounded approach to the planning, ...
Cover Page
Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
An awareness resource for justice executives, as well as an informational tool to use for training. The easy-to-read flyer is designed to engender awareness about the topic, make the case for privacy policy development, and underscore the importance of promoting privacy protections within justice agencies. Included is ...