U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Safeguarding Sensitive Data: IT Administrators Adopt New Solutions to Protect Government-Hosted Information

NCJ Number
226214
Journal
Law Enforcement Technology Volume: 36 Issue: 2 Dated: February 2009 Pages: 20,22,25
Author(s)
Tabatha Wethal
Date Published
February 2009
Length
5 pages
Annotation
This article discusses how information technology systems within the law enforcement community are safeguarding sensitive data with the adoption of new solutions and new standards of security.
Abstract
If a breach is detected in government data, in addition to notifying people, in some areas, punitive damage monies may be allowable under law for the leaked data. Factoring in the many essential mobile workstations in patrol vehicles as well as laptop units that cannot be kept behind constant lock and key, how can management protect data without limiting its utility? Law enforcement information technology (IT) administrators continue to find ways to integrate policy and technology to protect data without limiting useful access. This article briefly describes ways in which IT administrators from several law enforcement agencies have adopted solutions to protect government-hosted information, such as Canada’s smartcard-based e Token and South Carolina’s McAfee’s Endpoint Encryption.