Share this article

CJIS Security Policy Checklist
Accelerating security solutions for small businesses Tagore offers strategic services to small businesses. | A partnership that can scale Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. | Standing out from competitors Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market. |
The Criminal Justice Information Services (CJIS) Security Policy is a set of guidelines and requirements that organizations must follow to protect criminal justice information (CJI) until it’s released to the public through authorized channels or destroyed according to retention rules.
Similarly to how organizations working with protected health information must comply with HIPAA, any organization that deals with CJI—such as biometric data or case history—needs to comply with the CJIS Security Policy.
If you work—or plan to work—with law enforcement or related government agencies, this checklist is for you. It covers the basics of the policy and who it applies to, the steps to achieve compliance, and how to maintain your compliance status.
What is the CJIS Security Policy?
The goal of the CJIS Security Policy is to provide organizations with minimum security practices they must follow to work with CJI responsibly so it maintains its confidentiality, integrity, and availability.
CJI refers to information used by law enforcement and related agencies to perform their missions. CJI encompasses several types of data, including:
- Biometric data: Information about a person’s unique physical or behavioral characteristics used to identify or authenticate them
- Identity history data: Text-based data that corresponds with someone’s biometric data and provides a chronological record of their criminal and/or civil events
- Biographic data: Information about a person associated with a criminal justice case or incident
- Property data: Any information about vehicles and property associated with a crime that includes personally identifiable information
- Case or incident history: Records and information related to criminal incidents, investigations, arrests, and warrants
- Criminal history record information (CHRI): A compilation of a person’s interactions with the criminal justice system*
*Note: CHRI is a highly sensitive subset of CJI, sometimes referred to as “restricted data.” As a result, it often requires additional, stricter controls for its access, use, and dissemination than other types of CJI.
The CJIS Security Policy was formalized in 1998 by the CJIS, a division of the Federal Bureau of Investigation (FBI) responsible for managing criminal justice information and related initiatives.
The CJIS Security Policy has been updated regularly over the years to accommodate evolving technologies, threats, and policies. For example, CJIS Policy Version 6.0 was released in December 2024 and consolidates updates around cloud services, encryption standards, and remote access.
Who needs to comply with the CJIS Security Policy?
Any organization or individual that accesses, stores, transmits, or processes CJI must comply with the CJIS Security Policy. This includes:
- Law enforcement agencies: Including federal, state, county, and local police departments
- Criminal justice agencies: Such as courts and district attorneys’ offices
- Other government organizations: Including public safety organizations like fire services or 911 dispatch centers
- Government contractors, subcontractors, and vendors: Encompasses private companies, such as SaaS and cloud vendors, that handle CJI on behalf of government agencies
As a U.S. federal mandate, the CJIS Security Policy generally applies to U.S. organizations. However, international entities that do business in the U.S. and access CJI must also comply.
How is the CJIS Security Policy enforced?
The CJIS follows a shared-management philosophy when it comes to enforcing CJIS Security Policy compliance. For example, the CJIS Audit Unit (CAU) audits all CJIS Systems Agencies (CSAs) and repositories every three years. Each state has its own CSA that oversees the administration and usage of CJIS programs within that state. In other words, while the CJIS Security Policy is a federal framework, it’s largely enforced at the state and local level.
Non-compliance with the CJIS Security Policy can result in revoked access to CJIS systems and data, contractual penalties, or other disciplinary actions.
Why should non-government organizations pursue CJIS Security Policy compliance?
Pursuing CJIS Security Policy compliance is a strategic move for non-government organizations aiming to serve the public safety and law enforcement sectors. It signals readiness to handle sensitive CJI, opening doors to state, local, and education (SLED) contracts that require or strongly prefer compliance.
Aligning with CJIS standards de-risks the procurement process, making it easier to gain trust and accelerate sales cycles with law enforcement agencies. Beyond contracts, compliance also enhances an organization’s overall security posture, reinforcing data privacy practices and demonstrating a commitment to safeguarding critical information.
CJIS Security Policy compliance checklist:
{{cjis-readiness="/checklists"}}





FEATURED VANTA RESOURCE
The ultimate guide to scaling your compliance program
Learn how to scale, manage, and optimize alongside your business goals.