Microsoft Partners with Federal Tax Administrators at Annual Conference

Microsoft hosts Commissioners, Top Deputies, and Legal Staff at Redmond Campus The Federal Tax Administration (FTA) Annual Conference was host to over 250 Policy leaders such as economists, top deputies, commissioners, budget directors and legal staff assembling to discuss state and federal tax policy. A foundation for regulatory policy is the requirement for a secure…


Microsoft Signs CJIS Security Addendum with New Jersey

Microsoft has now contractually committed to CJIS requirements in 29 states. Meeting the applicable regulatory controls of the CJIS Security Policy is a long-term commitment for Microsoft. We don’t consider it a checkbox, it is a commitment. As part of this commitment, Microsoft recently signed the CJIS Security Addendum with New Jersey. This brings the…


How to prepare for one – The CJIS Security Audit

In Microsoft’s continuous effort to provide resources and guidance to agencies to help them meet their CJIS regulatory requirements, Microsoft collaborated with Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing and former CJIS Information Security Officer (ISO), to ponder the following question: “What is a CJIS…


Microsoft hosts Justice & Public Safety leaders at the 2nd annual CJIS Summit

Transparency is the foundation of Microsoft’s commitment to CJIS Compliance Founded on our commitment of transparency, Microsoft hosted the 2nd annual CJIS Summit, offering leaders in law enforcement the opportunity to collaborate directly with our compliance engineers, executives, and our Justice and Public Safety team. Attendees included law enforcement leaders from sixteen states, representation from…


The CJIS Security Policy – Analyzing the 13 Policy Areas: Part III

Better than a sleeping pill or a riveting read? Welcome back to the third and final post in this series on the CJIS Security Policy. Our last post ended with Policy Area 7 of section 5 concerning Network Diagrams. Policy Area 8 covers Media Protection and how to protect it both in transit and at…


The CJIS Security Policy – Analyzing the 13 Policy Areas: Part II

 Better than a sleeping pill or a riveting read? In our last blog post, Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing, and I covered the first four sections of the CJIS Security Policy. We will continue with Section 5 and its thirteen Policy areas and…


The CJIS Security Policy – Analyzing the 13 Policy Areas: Part I

Better than a sleeping pill or a riveting read? Recently Alan Ferretti and I were talking about compliance for agencies and lamented on the fact that most people malign  the CJIS Security Policy as a good cure for insomnia. It seems you can’t attend a conference where a speaker doesn’t make a joke about it….


Microsoft Signs CJIS Information Agreements with Indiana and Iowa

Microsoft has signed agreements with 28 states – now over 50% of the states are covered representing 70% of U.S. sworn officers. Microsoft contractually committed to the applicable controls of the CJIS Security Policy by signing a CJIS Information Agreements with Indiana and Iowa. This commitment allows CJIS Systems Agencies to background check our employees…


A former CJIS ISO perspective: Microsoft’s commitment to law enforcement from top to bottom

“I have worked with hundreds of vendors in my twelve years as CJIS ISO in Texas, and never have I found any vendor more committed to law enforcement.”  Alan Ferretti, Former CJIS ISO in Texas  Alan Ferretti, former Texas CJIS Information Security Officer (ISO), and I have been working together for nearly five years. He recently…