Browse icon

Browse

Browse Categories

Business Problem / Need > Participating in… (National Program)

Cover Page
Booking Reporting Service Specification, Version 1.0
The Booking Reporting Service (BRS) is intended to assist with automating the report of a booking. This service provides the ability to report booking information collected at the booking facility at the time of offender intake. A likely consumer of this service is a jail and/or other booking facility.    NOTE: To ...
Cover Page
Juvenile Education History Query/Response Service, Version 1.0
The Juvenile Education History Query/Response Service (JEHQRS) is designed to support sharing of educational background information among Juvenile Justice Decision Makers who are often responsible for performing youth risk assessments and State Educational Agencies (SEA). The JEHQRS allows a requesting juvenile ...
Cover Page
Offender Tracking Record Transfer Service Specification, Version 1.0
Offender tracking systems generate vast amounts of data; however, community corrections agencies that operate offender tracking programs report that it is often difficult to share this data. This problem is most clearly manifested in cases where an agency is ending its contractual relationship with one offender tracking ...
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Health Security: Public Health and Medical Integration for Fusion Centers
This document identifies the recommended actions for state and major urban area fusion centers to integrate the public health and healthcare (PH/HC) community into the fusion process.
Cover Page
NIEM - The National Information Exchange Model
NIEM—the National Information Exchange Model—is a community-driven, government-wide, standards-based approach to exchanging information. NIEM may sound complex, but the premise of it is simple: NIEM connects communities of people who share a common need to exchange information in order to advance their ...
Cover Page
A Call To Action: A Unified Message Regarding the Need to Support Suspicious Activity Reporting and Training
This Unified Message was created to help clarify a unified approach to the process of reporting and sharing of information related to suspicious activity.
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Web Address Icon
Nationwide Suspicious Activity Reporting (SAR) Concept of Operations
Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
Web Address Icon
Final Report: Information Sharing Suspicious Activity Reporting (SAR) Evaluation Environment
Provides lessons learned, best practices, and implementation steps identified during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Web Address Icon
Suspicious Activity Reporting (SAR) Line Officer Training
The Suspicious Activity Reporting (SAR) Line Officer Training was developed to assist law enforcement line officers in understanding what kinds of suspicious behaviors are associated with pre-incident terrorism activities, documenting and reporting suspicious activity, and protecting privacy, civil rights, and civil ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
This document assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identifies the high-liability areas of concern that ...
Web Address Icon
DHS/DOJ Privacy and Civil Liberties Web Portal
Through a joint effort among DHS, DOJ, and BJA, this collaborative Web portal, accessible at it.ojp.gov/PrivacyLiberty, provides access to a wide range of resources and training materials available in the Information Sharing Environment that address privacy and civil liberties protections, including many of the Global ...
Cover Page
Navigating Your Agency’s Path to Intelligence-Led Policing
Serves as an overview for implementing the Intelligence-Led Policing (ILP) framework within a law enforcement agency and provides insight regarding the challenges of ILP implementation. Law enforcement executives can use this document as a resource to assist in the successful implementation of the ILP framework within their ...