CJIS Ready

GovTransfer is the first of its kind, CJIS Compliant workflow platform for government. We have taken the necessary steps to make sure that our application, our company, and our employees adhere to the FBI CJIS Security Policy.

We elected to use the CJIS experts at Diverse Computing to conduct an assessment of our organization, document our compliance, and draft our policies.

4 Ways we think about security

Hosting Security

Who hosts the data, where is it hosted, and how is it backed up.

Application Security

The proprietary code we use to build the network.

User Security

How we help your users keep their accounts secure.

Staff Security

The high levels of standards for partners, employees, and contractors.

Hosting Security.

Application Security.

Application standards we hold to.

NIST 800-53

CJIS

FBI Criminal Justice Services Security Policy. Written policies available upon request.

User Security.

Safeguards for your users

Most breaches still come from simple errors by users. We give you tools, install safeguards, and use monitoring to thwart these attacks.

Complex Passwords

Customizable, high standards for passwords. Requirements can be adjusted per your requirements.

Password Rotation

At a minimum, password resets are required every 6 months.

Role-Based Permissions

Role-based permissions make it easy to manage staff and limit their access to only what is necessary.

2-Factor Authentication

2-factor authentication to verify a user’s login attempt.

IP Address and Location Monitoring

We track the devices and locations to enhance security and detect malicious login attempts.

Verified Profiles

Domains can be faked. Emails can be spoofed. Letterheads are easy to copy. Manual, on-the-fly checks just don’t cut it.

When responding to requests, you need to know who you’re talking to. GovTransfer takes the guesswork out of responding to requests from outside agencies.

Ken Allen

Property & Evidence Manager at GTPD

  • NCIC Verified

  • Verified Domain

  • Law Enforcement Agency

Staff Security.

The standards we hold our staff to.

Background Checks

FBI background checks and ongoing monitoring of staff.

Access Controls

Staff are limited in their access to customer data based on JIT Access standards.

Compliance/Security Training

Compliance and security training based on CJIS, HIPAA, and other security standards and best practices.

Schedule an IT review.

Still have questions? We have answers. Let’s schedule an IT & security review.