Related content
-
Don’t Be a Target: Your Hardware
Poor physical security can often defeat the best IT security controls. Printouts, unattended computers, phones and devices are at risk of being stolen or misused.
-
Protecting Federal Tax Information (No Exercises)
This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.
-
CJIS Policy: Dissemination & Destruction
This module outlines how to properly dispose of CJI, how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.