X hits on this document

PDF document

INDIANA DATA AND COMMUNICATIONS SYSTEM - page 5 / 9

33 views

0 shares

0 downloads

0 comments

5 / 9

able to be archived onto another server, for example, on

CD’s or

floppies,

etc.

Is

IDACS

already

addressing

the

security

issues

and audits on those particular items, will that policy

be coming

out in the near future?

Mr. Dearinger said it is probably covered under the CJIS

Security

Policy.

He

will

do

some

research

on

it,

to

be

sure.

Michael Paxton added, the logs are encrypted and they

are tamper

evidenced

if

anyone

tries

to

get

into

them.

There

are

all kinds

of digital things that go on inside that will reveal

tampering, and

they are encrypted as well.

Mr. Williams said his concerns were about the Security

Officer or

FBI be present for an audit and seeing the discs lying

around and

being told they should be properly secured.

Major Pryor pointed out that if some were missing,

unless someone

had the Client, they would not be able to read the CD,

etc.

Mr. Williams also asked, if an agency goes down on the

new system,

how

are

they

re-routed.

Mr.

Dearinger

stated

agencies

can still

be re-routed, the same as they are currently.

Mr. Williams was not sure all agencies are aware that if

they have

MDD’s they will need to maintain the old system line if

they want to

access

system

data.

This

will

be

true

until

February

2004. Prior

to this, MDD users will need to have their vendors write

to the

new

interface.

There

is

no

MDD

Client

in

the

new

system.

rewrite of

Mr. Williams suggested IDACS issue a statement regarding

agencies are

a new password every thirty (30) days as a reminder as

not accustomed to doing this.

The next Area I meeting will be held at Purdue University Police Department on March 20th , at 10:00 a.m. EST.

Document info
Document views33
Page views33
Page last viewedSat Dec 03 17:57:31 UTC 2016
Pages9
Paragraphs479
Words2330

Comments