Search icon

Search

Product Type

Discipline / Community

Business Process Lifecycle

Role

Focus Area

Triggering Process

National Program

Emerging Product / Emerging Topic

Global Standards Package (GSP)

Business Problem / Need

Non-GSP, but closely associated resources

Maturity of Product

Support Needs

Search Ranking

Committee

Medium

ON GFIPM.NET

Refine Results
48 Products Found
Cover Page
Analyst Professional Development Road Map
This document identifies suggested minimum competencies, knowledge/skills/abilities, and education/trainng for the basic, intermediate, and advanced analytic levels.
Cover Page
Cover Page
Establishing a Privacy Officer Function Within a Justice or Public Safety Entity: Recommended Responsibilities and Training
A privacy policy is a written, published statement that articulates the policy position of an organization on how it handles the personally identifiable information and other personal, sensitive information it seeks or receives and uses in the normal course of business.  A privacy policy protects the agency, the individual, ...
Cover Page
Health Security: Public Health and Medical Integration for Fusion Centers
This document identifies the recommended actions for state and major urban area fusion centers to integrate the public health and healthcare (PH/HC) community into the fusion process.
Cover Page
Submit Suspicious Activity - Suspicious Activity Reporting Service Specification, Version 1.0
The purpose of the service is to allow law enforcement and public safety agencies to submit information related to suspicious activity to fusion centers. The scope includes electronic system-to-system exchange of information related to suspicious activity between law enforcement/public safety agencies and fusion centers. The ...
Cover Page
Minimum Criminal Intelligence Training Standards
The document Minimum Criminal Intelligence Training Standards for United States Law Enforcement and Other Criminal Justice Agencies explains the recommended development of minimum training standards for all affected levels of law enforcement personnel, including core training objectives in six areas: General Law Enforcement ...
Cover Page
Suspicious Activity Reporting (SAR) Process Implementation Checklist
Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.
Web Address Icon
Nationwide Suspicious Activity Reporting (SAR) Concept of Operations
Provides a common understanding of the NSI process so that implementation activities can be planned, executed, and measured.
Web Address Icon
Final Report: Information Sharing Suspicious Activity Reporting (SAR) Evaluation Environment
Provides lessons learned, best practices, and implementation steps identified during the ISE-SAR Evaluation Environment that can be utilized while implementing the NSI.
Web Address Icon
Information Sharing Environment-Suspicious Activity Reporting (ISE-SAR) Functional Standard
Builds upon, consolidates, and standardizes nationwide aspects of those ISE-relevant activities already occurring at the federal, state, and local levels with respect to the processing, sharing, and use of suspicious activity information.
Cover Page
Findings and Recommendations of the Suspicious Activity Reporting (SAR) Support and Implementation Project
In accordance with the National Criminal Intelligence Sharing Plan and the National Strategy for Information Sharing(NSIS), the Findings and Recommendations of the SAR Support and Implementation Project was developed to describe the all-crimes approach to gathering, processing, reporting, analyzing, and sharing of suspicious ...
Cover Page
Why Law Enforcement Agencies Need an Analytical Function
Why Law Enforcement Agencies Need an Analytical Function explains how the analytical function benefits law enforcement agencies.
Cover Page
National Criminal Intelligence Sharing Plan
The National Criminal Intelligence Sharing Plan (NCISP), the first of its kind in the country, provides a blueprint to help agencies establish criminal intelligence sharing policies, procedures, standards, technologies, and training. The Plan was assembled with close input and cooperation from local, state, tribal, and ...
Cover Page
Fusion Center Technology Resources Road Map
This document provides guidance on how information, technology infrastructure, applications, performance metrics, and business processes align with the core business capabilities of a fusion center. The document leverages best practices of enterprise architecture, business process, information flow, and exchange ...
Cover Page
Fusion Center Technology Guide
The Fusion Center Technology Guide was developed collaboratively by technology subject matter experts. It provides a methodology for fusion center directors and managers that can be used to facilitate technology planning and provides a practical perspective on the value of technology as an enabler to the fusion center ...
Cover Page
Defining Fusion Center Technology Business Process: A Tool for Planning
The purpose of this document is to provide a tool to fusion center directors/managers to assist with understanding and implementing the fundamental business requirements of the center and planning for the underlying components for each of the business processes the particular fusion center is or will be undertaking (e.g., ...
Cover Page
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
The document Fusion Center Guidelines addresses the development of guidelines for fusion centers as well as the foundation for the development of fusion center guidelines for law enforcement intelligence, public safety, and private sector entities. These guidelines and related materials will provide assistance to centers as ...
Cover Page
Fire Service Integration for Fusion Centers
This document identifies recommended actions and guidance for state and major urban area fusion centers (fusion centers) to effectively integrate the fire service into the fusion process. Within the context of this document, the fire service is defined as including fire and emergency operations, emergency medical service ...
Cover Page
Critical Infrastructure and Key Resources: Protection Capabilities for Fusion Centers
This document identifies the capabilities necessary for state and major urban area fusion centers (fusion centers) to establish a critical infrastructure and key resources (CIKR) protection analytic capability that supports infrastructure security activities at the state and local levels. This document is an appendix to the ...
Cover Page
Law Enforcement Analytic Standards
The booklet Law Enforcement Analytic Standards discusses the standards created by the International Association of Law Enforcement Intelligence Analysts (IALEIA) as a result of the National Criminal Intelligence Sharing Plan (NCISP) recommendations. The analytic standards consist of 25 standards that explain the requirements ...
Cover Page
Law Enforcement Analyst Certification Standards
This document provides guidance to agencies and organizations that offer analyst certification. The first section provides guidance to agencies and organizations that offer analyst certification. Recommendations include the development of a code of ethics, development of policies and procedures for the certification process, ...
Cover Page
Common Competencies for State, Local, and Tribal Intelligence Analysts
The Common Competencies for State, Local, and Tribal Intelligence Analysts identifies common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in state or major urban area fusion centers or similar analytic law enforcement entities. These competencies are essential for ...
Cover Page
Analyst Toolbox
This document aims to provide intelligence analysts with information on the tools they need to effectively and efficiently perform their duties and produce useful intelligence products. The tools examined in this document represent the basic toolbox that the intelligence analyst will need to provide the vital intelligence ...
Web Address Icon
Suspicious Activity Reporting (SAR) Line Officer Training
The Suspicious Activity Reporting (SAR) Line Officer Training was developed to assist law enforcement line officers in understanding what kinds of suspicious behaviors are associated with pre-incident terrorism activities, documenting and reporting suspicious activity, and protecting privacy, civil rights, and civil ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
This document assists agencies in determining whether they are in compliance with applicable privacy-related policies, procedures, rules, and guidelines. The document includes a suggested methodology for conducting the review of an agency’s intelligence enterprise and identifies the high-liability areas of concern that ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM) 2007 Users Conference Summary Briefing
This PowerPoint presentation was submitted by the Georgia Tech Research Institute (GTRI) to provide an introduction and status of the GFIPM project.  These slides were delivered during the Chicago Users' Conference on August 21, 2007.
Cover Page
Global Federated Identity and Privilege Management (GFIPM) Security Interoperability Demonstration
It is clear that the entire justice and law enforcement community stands to benefit from a solution that allows user management processes (vetting, permissioning, and credentialing) to be efficiently and effectively leveraged and reused across trust domains, thereby facilitating interoperability between SBU information ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
Web Address Icon
SEARCH Podcast: The Global Federated Identity & Privilege Management Initiative
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice credential. This standards-based justice credential ...
Cover Page
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...
Cover Page
Implementing Privacy Policy in Justice Information Sharing: A Technical Framework
This document is intended to provide guidelines for supporting the electronic expression of privacy policy and how to convert privacy policy so that it is understandable to computers and software. This report is intended as a resource for a technical audience, including National Information Exchange Model (NIEM) and Global ...
Cover Page
IQ Series Overview: Global Information Quality Series Improves the Quality of Justice Information
This flyer provides an overview of the U.S. Department of Justice’s (DOJ) Global Privacy and Information Quality Working Group's (GPIQWG) information quality (IQ) resource series which provides practical guidance on how to develop and implement an agencywide information quality program.  Using a progressive “step” approach, ...
Cover Page
Information Quality Program Guide
This Guide is intended to help justice managers develop an information quality program for their organizations and is designed to support managers who must analyze their justice entity’s information and determine what is needed to ensure good quality information. In support of that effort, the Guide features a step approach ...
Cover Page
Information Quality Self-Assessment Tool
The purpose of this tool is to provide practitioners with guidance in evaluating the information quality of justice information reports associated with justice events by way of a self-administered worksheet, designed to provide practical, hands-on assistance to information systems personnel. Evaluating the quality of agency ...
Cover Page
9 Elements of an Information Quality Program
Developed for high-level, managerial, and administrative personnel within an organization, 9 Elements of an Information Quality Program provides a brief outline of the nine key steps that should be followed when developing and implementing an agencywide information quality (IQ) program.
Cover Page
Information Quality: The Foundation for Justice Decision Making
This document provides an overview of information quality; problems associated with it; and its framework, dimensions, and scenarios.  It also explains what can be done to promote information quality within electronic data exchanges.
Web Address Icon
DHS/DOJ Privacy and Civil Liberties Web Portal
Through a joint effort among DHS, DOJ, and BJA, this collaborative Web portal, accessible at www.it.ojp.gov/PrivacyLiberty, provides access to a wide range of resources and training materials available in the Information Sharing Environment that address privacy and civil liberties protections, including many of the Global ...
Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Cover Page
Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
Practitioners are provided a framework with which to examine the privacy implications of their information systems and information sharing collaborations so they can design and implement privacy policies to address vulnerabilities identified through the assessment process. Privacy policies emerge as a result of the analysis ...
Cover Page
Baseline Capabilities for State and Major Urban Area Fusion Centers
Provides fusion centers with the baseline capabilities and operational guidelines necessary to achieve each of the capabilities. By achieving a baseline level of capability, a fusion center will have the necessary structures, processes, and tools in place to support the gathering, processing, analysis, and dissemination of ...
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Policy Review Checklist
The checklist is a companion piece to the SLT Policy Development Template and serves both as a self-assessment tool to assist privacy policy authors, project teams, and agency administrators in evaluating whether the provisions contained within their draft policy have met the core concepts recommended in the SLT Policy ...