CJIS Security Policy

The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual—contractor, private entity, non-criminal justice agency representative, or member of a criminal justice entity with access to, or who operates in support of, criminal justice services and information.

Anything less than complete protection of CJI records for their full lifecycle (years or decades) from any unauthorized access can result in potentially severe penalties.

The KOMpliance secure software solution provides organizations of all sizes an easily-implemented, economical and efficient means of addressing central requirements of the Security Policy, automatically enforcing privacy and protection rules and ensuring compliance.

 

Learn More

First Name Required

Last Name Required

Invalid Input

Required

Invalid Phone Number

Please enter a valid business email address

Invalid Input

Invalid URL - must include http(s)://

Invalid Input

You must authorize KOM Software to contact you.

 

What Our Clients Say

  • KOMpliance provides us with functionality that wasn’t available before. We no longer have to worry about meeting different regulatory requirements for different types of studies or patients.

  • 1
  • 2
  • 3
  • 4
  • 5