skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 49110 Find in a Library
Title: PRIVACY AND SECURITY OF CRIMINAL HISTORY INFORMATION A GUIDE TO ADMINISTRATIVE SECURITY
Author(s): ANON
Corporate Author: National Criminal Justice Information & Statistics Service
United States of America

Theorem
United States of America
Date Published: 1978
Page Count: 32
Sponsoring Agency: National Criminal Justice Information & Statistics Service
Washington, DC 20531
National Institute of Justice/
Rockville, MD 20849
Theorem
San Jose, CA 95110
Contract Number: J-LEAA-0342-8
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: THIS GUIDE DESCRIBES IN GENERAL TERMS THOSE REQUIREMENTS OF LEAA REGULATIONS GOVERNING PRIVACY AND SECURITY OF CRIMINAL HISTORY INFORMATION WHICH PERTAIN TO ADMINISTRATIVE SECURITY.
Abstract: SECTION 20.21 (F) OF THE LEAA REGULATIONS (28CFR PART 20) SETS FORTH THE ADMINISTRATIVE, COMPUTER, AND PHYSICAL SECURITY REQUIREMENTS NECESSARY TO ENSURE THE CONFIDENTIALITY AND INTEGRITY OF CRIMINAL HISTORY INFORMATION. THE PROCEDURES MANDATED BY THOSE SECTIONS OF THE REGULATIONS DEALING WITH ADMINISTRATIVE SECURITY ARE OUTLINED, ALONG WITH COMPUTER SECURITY/PHYSICAL SECURITY REQUIREMENTS. FOLLOWING A BRIEF REVIEW OF THE IMPACT AND SCOPE OF THE REGULATIONS WITH RESPECT TO THE AGENCIES AND INFORMATION COVERED, THE PROCEDURAL REQUIREMENTS ARE DETAILED, WITH ATTENTION TO GENERAL CONSIDERATIONS, AUTHORIZED ACCESS, EMPLOYEE SCREENING, TRAINING AND ACCOUNTABILITY, DISCIPLINE, AND SECURING THE SHARED COMPUTER SYSTEM. A MODEL MEMO OF UNDERSTANDING IS INCLUDED. A LIST OF OTHER PUBLICATIONS IN THE PRIVACY AND SECURITY DOCUMENT SERIES IS ALSO PROVIDED. SEE ALSO NCJ-40000, 48125, 48981, 49544, 41992, 34411, 47049, AND 44787.
Index Term(s): Computer privacy and security; Criminal histories; Data security; Law Enforcement Assistance Administration (LEAA); Personnel administration; Public administration; Regulations; Right of privacy; Security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=49110

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.