CJIS Compliance For File Sharing

What is it about?

Section 5.10.1.2.2 of the CJIS Security Policy focuses on safeguarding Criminal Justice Information (CJI) when it’s not actively in use.

Why does it matter?

When CJI is stored digitally outside of a highly secure location, it needs protection to prevent unauthorized access or tampering.

What does it require?

The policy mandates that CJI stored in less secure digital environments must be encrypted using a robust standard. Specifically, the encryption method should be as strong as the AES cipher, which is certified by FIPS 197 and has a minimum strength of 256 bits.

Why is this important?

This requirement ensures that even if CJI is not actively being transmitted or processed, it remains safe from potential threats and breaches.

LEEP's Security Measures

LEEP provides a secure solution tailored for government entities, emphasizing secure document sharing without direct access to sensitive data. Our encryption service, utilizing robust 256-bit encryption, ensures confidentiality, demonstrating our commitment to stringent security standards and regulatory adherence.

Key Features

Data Servers

Our servers are strategically located within the United States, aligning with rigorous domestic standards and regulations. This deliberate choice underscores our unwavering dedication to compliance and jurisdictional integrity, providing peace of mind in an ever-evolving legal landscape.

Data Encryption

Utilizing 256-bit encryption ensures that data remains secure both during transmission and while at rest. This robust encryption method converts sensitive information into unreadable code, making it extremely difficult for unauthorized parties to access or decipher.

Access Control

Implementing multi-factor authentication (MFA) adds an extra layer of security to the authentication process. In addition to requiring a username and password, MFA prompts users to provide another form of verification, such as a unique code sent to their mobile device. This significantly reduces the risk of unauthorized access even if login credentials are compromised.

Background Checks

We conduct thorough personnel security screenings and background checks on employees. Some staff members hold TS/SCI clearances.

Audit Logging

We maintain comprehensive audit logs that enable organizations to track and monitor all activities within the system. Detailed records of user actions, including access attempts and changes made to data, provide valuable insight into potential security breaches or unauthorized activity.

Incident Response

Our incident response plan outlines the steps and procedures that will be followed in the event of a security breach or incident. By having a well-defined plan in place, we can respond promptly and effectively to mitigate the impact of breaches and minimize disruption to operations.

Training

We provide comprehensive security awareness training to all employees and help to foster a culture of security awareness within the organization. By educating staff about potential security threats, best practices for data protection, and their role in maintaining security, organizations can significantly reduce the risk of human error or negligence leading to security incidents.

Secure Data Centers

Hosting our cloud servers within the United States ensures compliance with domestic regulations and enhances data security by aligning with rigorous standards and maintaining jurisdictional integrity.

Account Monitoring

Extensive monitoring features track and analyze user activities within the system. Monitoring login attempts, access patterns, geographical data, and device information.

Additional Security Measures

Download Notifications

Notifications for downloads to ensure data is being accessed by the intended recipient.

Account Lockout

Accounts are locked out after multiple failed login attempts to prevent unauthorized access.

Frequent Backups

Servers are backed up frequently to ensure data integrity and availability.

24/7 Monitoring

Our technology stack is monitored around the clock to detect and respond to any security incidents promptly.

Staff Access

No one has access to your encrypted data. End-to-end encryption ensures that all your documents, including file and folder names, are fully encrypted both at rest and in transit, maintaining strict confidentiality.