Justice Information Sharing
Justice Information Sharing: Explore policy, technology, and up-to-the-minute resources to help promote the implementation of Justice Information Sharing nationwide.
Global Justice
Global Justice: Learn about the definitive justice advisory group that promotes best practices and effective solutions to improve information sharing nationwide.
Global Information Sharing Toolkit
Global Information Sharing Toolkit (GIST): The Global Justice Information Sharing Toolkit (GIST) provides a way for users to explore, discover, and learn about beneficial Global solutions. Whether tackling a justice information sharing business problem, targeting a general area of interest, or looking for a specific Global publication, the GIST has an answer.
National Initiatives
National Initiatives: Review key information sharing programs rooted in national objectives and long-term missions that benefit justice agencies across the country.
Privacy & Civil Liberties
Privacy & Civil Liberties: Find training, resources, and legislation on Privacy and Civil Liberties protections in information sharing.
Policy & Practice
Policy & Practice: Examine legislative, financial, and policy issues in information sharing, including examples and templates to help you get started.
Implementation Assistance
Implementation Assistance: Get help implementing your own information sharing program through technical resources and training opportunities.
Previous Next

Information Sharing News new

SUBSCRIBE:

Subscribe to E-mail Subscribe to RSS

TSA to Network Boarding Pass Scanners to Terrorist Watch List

2/13/2013 8:00 AM
U.S. Department of Homeland Security logo
The Transportation Security Administration (TSA) plans to roll out fraudulent document technology scanners to airports which will be networked with the no-fly list. The scanners are meant to replace the current system in which a TSA officer called the "travel document checker" looks intently at a boarding pass and passenger identification under ultraviolent light before scrawling an assent for the passenger to proceed. In a January 18, 2013, privacy impact assessment, TSA says it plans to connect the scanners to watch lists via its Secure Flight program, which matches passenger data to databases of suspected terrorists. TSA announced a three U.S. airports pilot of the scanners--dubbed the Credential Authentication Technology/Boarding Pass Scanning System--in April 2012.
 

Virginia Releases Emergency Preparation Smartphone App

2/12/2013 8:00 AM
Palm Computer image
Virginia has gone mobile in its effort to keep citizens informed about statewide emergencies and disaster planning. The Virginia Department of Emergency Management (VDEM) launched the Ready Virginia mobile app earlier this month, featuring a variety of notification and planning amenities that can be used in the event of a flood, hurricane, or other catastrophe. The app includes location-specific weather watches and warnings and flood information issued by the National Weather Service; disaster news from the VDEM; maps detailing where open American Red Cross shelters are; evacuation routes and storm surge zones; a template to create family emergency plans; and various informational links.

NASCIO Releases Federal Priorities: Modernizing Regulations, Cybersecurity, and Collaboration are Essential for States

2/11/2013 8:00 AM
NASCIO logo
The National Association of State Chief Information Officers (NASCIO) has released 2013 Federal Advocacy Priorities. Through this report, NASCIO hopes to put a spotlight on modernizing outdated federal rules and regulations, bolstering nation’s cybersecurity, building a public safety broadband network, and pushing greater collaboration to expand the maturity and use of information exchange models and secure identities in cyberspace. With technology and telecommunications evolving faster than federal rules and regulations, NASCIO is looking to work with federal partners to ensure citizens’ tax dollars are not being wasted due to regulations that do not complement current technologies and best practices in information technology management.
SourceNASCIO


This Web site is funded in whole or in part through a grant from the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Neither the U.S. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this Web site (including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided).
Amber Alert logo COPS logo Bureau of Justice Assistance logo Department of Homeland Security logo E-Gov logo USA dot gov logo