<img alt="" src="https://secure.wine9bond.com/223206.png" style="display:none;">
Skip to content
Request a Demo Log In
Blog > Compliance   10 min read

Mastering CJIS Security Policy: Your Guide to Physical and Environmental Protection (PE) Compliance

September 10, 2024

Starting October 1, 2024, several new requirements outlined in the CJIS Security Policy (CJISSECPOL) will become enforceable by audit. These changes mark a significant shift in how law enforcement agencies and other organizations handling Criminal Justice Information (CJI) must manage physical access and visitor records.

Failure to comply with these new standards could expose your organization to security vulnerabilities, reputational damage, and operational inefficiencies. This blog post will focus specifically on the updated requirements related to physical access and visitor management, as detailed in Section 5.9, Physical and Environmental Protection (PE) of the CJISSECPOL.

Whether you’re a compliance officer, security director, or IT manager, understanding these changes is crucial for your organization’s security posture. Let’s dive into what these new requirements entail and how you can effectively prepare for them.

Key Takeaways:

New requirements starting October 1, 2024:

  • Maintain visitor access records for one year
  • Conduct quarterly reviews of visitor records
  • Report unusual activity immediately
  • Minimize collection of Personally Identifiable Information (PII)
  • Restrict access to visitor records to authorized personnel only

Important notes:

  • Who This Applies To: These new requirements impact law enforcement agencies and any organizations handling Criminal Justice Information (CJI).
  • Prepare for Zero-Cycle Status: These new requirements will enter zero-cycle status on October 1, 2024 until September 30, 2027.
  • Leverage Digital Management Systems: Digital systems can simplify compliance with the new requirements and enhance overall security.

CJIS requirements that iLobby can help with include: keep detailed visitor records for at least one year, regularly analyze visitor patterns and anomalies, implement a system for flagging investigating irregularities, keep visitor access records to the minimum PII necessary, ensure only authorized individuals enter secure areas, verify visitor credentials at every entry point, and many more mandated requirements.

Understanding CJIS Security Policy: Who Needs to Pay Attention?

The Criminal Justice Information Services (CJIS) Security Policy is a crucial framework for protecting sensitive data and enhancing security at facilities that handle CJI.

The policy applies to:

  • Reception Managers: Overseeing visitor check-ins and maintain accurate logs.
  • Facilities Supervisors: Ensuring secure areas meet stringent access control requirements.
  • Security Directors: Implementing and maintaining compliant security protocols.
  • IT Managers: Safeguarding digital aspects of physical security systems.
  • Compliance Officers: Ensuring adherence to CJIS standards across the organization.

For security professionals overseeing high-stakes facilities in law enforcement, government, or finance, these updates directly impact your operations.

Why October 1st Should Be Circled on Your Calendar

The approaching October 1, 2024 deadline marks a significant shift in compliance requirements. After this date, visitor access records requirements will enter zero-cycle status, with potential consequences for non-compliance.

Potential consequences:

  • Security Vulnerabilities: Failing to meet standards leaves your facility exposed to potential breaches.
  • Reputational Risk: In the age of information, a security lapse can irreparably damage your organization's standing.
  • Operational Inefficiencies: Non-compliant systems often lead to slower, more cumbersome processes.

Breaking Down the New Requirements

Let's dive into the heart of the new requirements focusing on PE-8 Visitor Access Records.

PE-8 Visitor Access Records

1. Maintain Comprehensive Logs: Keep detailed visitor records for at least one year.

  • Log visitor names, organizations, dates, times of entry and exit, and visit purposes.
  • Store logs in a secure yet accessible format for easy retrieval during audits.

2. Conduct Quarterly Reviews: Regularly analyze visitor patterns and anomalies.

  • Perform reviews every three months to identify potential security risks.
  • Ensure all logged information is complete and accurate.
  • Consider using data analytics tools to enhance the review process.

3. Report and Address Anomalies: Implement a system for flagging and investigating irregularities.

  • Immediately report anomalies to relevant personnel responsible for physical and information security.
  • Establish clear protocols for escalating and addressing significant security threats.
  • Implement a structured process to document, investigate, and resolve all reported anomalies.

PE-8 (3) Visitor Access Records | Limit Personally Identifiable Information Elements

1. Visitor Data Capture: Limit personally identifiable information (PII).

  • Keep visitor access records to the minimum PII necessary to achieve the purpose for which it is collected.
  • Ensure access to visitor access records is restricted to authorized agency personnel.

While these new requirements may seem daunting, the right technology can make implementation smooth and efficient. Let's explore how iLobby's FacilityOS can help you easily meet these requirements.

Source: Federal Bureau of Investigation. "CJIS Security Policy Resource Center." U.S. Department of Justice, https://le.fbi.gov/cjis-division/cjis-security-policy-resource-center.

How iLobby Can Help You with New CJIS Requirements

iLobby's FacilityOS platform is equipped to assist law enforcement and government agencies in meeting the new requirements outlined in the CJIS Security Policy (CJISSECPOL), particularly focusing on the updated requirements for Visitor Access Records (PE-8). Here's how our solutions can help:

Automated Visitor Data Capture

Automated check-in in FacilityOS helps ensure accurate and efficient visitor data collection, directly supporting the PE-8 requirement for maintaining comprehensive visitor logs. With our system, you can:

  • Streamline visitor check-ins by capturing essential information, such as names, organizations, entry and exit times, and visit purposes, reducing the risk of manual entry errors.
  • Customize data capture fields to collect only the minimum necessary Personally Identifiable Information (PII), adhering to PE-8 (3) requirements to limit PII in visitor access records.
  • Securely store visitor information in a digital format that is easily retrievable, ensuring compliance with the one-year retention requirement for visitor logs.

Real-Time Analytics and Reporting

FacilityOS provides powerful analytics tools that offer insights into visitor patterns and help identify potential security risks, aligning with the need for regular reviews under PE-8. Our platform allows you to:

  • Visualize visitor data through intuitive dashboards, making it easier to spot unusual patterns or potential security threats.
  • Conduct quarterly reviews of visitor logs to identify and investigate anomalies, enhancing your ability to proactively manage security risks.
  • Generate detailed reports for CJIS audits and internal security assessments, helping to ensure that visitor data is comprehensive, accurate, and ready for review.

Secure Digital Visitor Logs

FacilityOS helps ensure that your visitor access records are not only secure but also easily accessible for audits, complying with PE-8 requirements. With our solution, you can:

  • Store visitor logs in a secure digital format, protecting sensitive information and ensuring compliance with data retention policies.
  • Restrict access to visitor records to authorized personnel only, safeguarding PII and maintaining compliance with CJIS policies.
  • Quickly generate and access historical logs for quarterly reviews or in response to security incidents, making your records audit-ready.

Existing CJIS Requirements for Physical & Environmental Protection (PE)

Along with the new requirements outlined above, CJIS also mandates existing requirements for Physical and Environment Protection. The following requirements are sanctionable by audit today and non-compliance may lead to loss of access to CJI and legal ramifications. The requirements include:

PE-2 Physical Access Authorizations

1. Develop and Maintain Access Lists: Create a living document of authorized personnel.

  • Regularly update a comprehensive list of individuals with facility access rights.
  • Include both employees and visitors requiring access to sensitive areas.
  • Ensure designated personnel review and approve the list to maintain accuracy.

2. Issue Secure Credentials: Implement state-of-the-art identification systems.

  • Provide secure, difficult-to-forge credentials (e.g., ID badges, smart cards, biometric identifiers).
  • Implement a robust system for tracking credential issuance and return.

3. Conduct Annual Reviews: Regularly audit and update your access lists.

  • Perform thorough annual reviews to verify the accuracy of access lists.
  • Update lists promptly when personnel changes occur.
  • Consider using automated systems to streamline this process and reduce human error.

4. Implement Prompt Removal Procedures: Ensure swift action for departed personnel.

  • Immediately revoke access for individuals who no longer require it.
  • Implement a rigorous deactivation process for lost or stolen credentials.
  • Include multiple verification steps to confirm access removal.

PE-3 Physical Access Control

1. Enforce Strict Authorization Checks: Verify credentials at every entry point.

  • Security personnel or automated systems are used to check credentials before granting entry.
  • Ensure only those with valid credentials can access secure areas.

2. Control Entry and Exit: Implement systems for movement regulation.

  • Utilize turnstiles, security barriers, or controlled doors to manage facility ingress and egress.
  • Monitor entry and exit points with surveillance cameras and security guards.

3. Maintain Detailed Audit Logs: Keep a digital trail of all access events.

  • Use digital logging systems to record and securely store access events automatically.
  • Regularly review logs to identify anomalies or unauthorized access attempts.

4. Secure Non-Public Areas: Utilize access control technologies.

  • Implement physical barriers to segregate secure areas from publicly accessible zones.
  • Use advanced technologies like biometric readers or smart card systems for access control.

5. Escort Visitors: Implement a visitor management system.

  • Monitor and control visitor activity in all physically secure locations.
  • Ensure visitors are always escorted by authorized personnel in secure areas.

6. Safeguard Access Devices: Protect the keys to your kingdom.

  • Store keys, combinations, and other access devices in secure locations.
  • Limit access to these devices to authorized personnel only.
  • Implement procedures for reporting and replacing lost or stolen access devices.

7. Conduct Annual Inventories: Regularly account for all access control elements.

  • Perform yearly checks of all access devices to ensure they're accounted for and functional.
  • Maintain detailed records of inventory checks and updates.

8. Update Controls Proactively: Stay ahead of potential security gaps.

  • Change combinations and keys when compromised or when authorized personnel change.
  • Document and communicate all updates to relevant personnel.

PE-6 Monitoring Physical Access

1. Monitor Physical Access: Track who accesses your facility

  • Detect and respond to physical security incidents.
  • Review physical access logs quarterly and upon occurrence of any physical environmental, or security-related incidents involving CJI or systems used to process, store, or transmit CJI.
  • Coordinate results of reviews and investigations with the organizational incident response capability.

2. Intrusion Alarms and Surveillance Equipment: Leverage technology to enhance security.

  • Monitor physical access to the facility where the system resides using physical intrusion alarms and surveillance equipment.

Source: Federal Bureau of Investigation. "CJIS Security Policy Resource Center." U.S. Department of Justice, https://le.fbi.gov/cjis-division/cjis-security-policy-resource-center.

Meeting Existing Requirements: How iLobby Can Help

iLobby's FacilityOS provides tailored solutions to assist organizations in complying with the existing requirements outlined in sections PE-2, PE-3, and PE-6 of the CJIS Security Policy (CJISSECPOL). While FacilityOS does not address all CJIS requirements, our platform offers valuable tools that enhance security and help meet compliance needs in several key areas. Here’s how:

Visitor and Temporary Guest Access Control

FacilityOS allows users to manage access for visitors and temporary guests, ensuring that only authorized individuals enter secure areas. Our platform helps maintain an up-to-date list of all visitors, aligning with CJIS requirements for maintaining access lists (PE-2). With iLobby, you can:

  • Automate the registration and check-in process for visitors and temporary guests, ensuring they are properly vetted and before being granted access to the premises.
  • Issue secure visitor passes that can be customized to include necessary information and security features, enhancing physical access authorizations.
  • Integrate with existing security systems to provide a seamless access experience for temporary guests, ensuring strict control over who can enter secure areas.

Centralized Visitor Management and Watchlist Integration

iLobby’s visitor management system centralizes the process of monitoring and controlling visitor access, which helps comply with the CJIS requirements for controlling entry and exit (PE-3). This system also integrates with watchlists, enabling:

  • Real-time screening of visitors against watchlists to prevent unauthorized access and enhance security.
  • Immediate notifications to security personnel when a visitor matches a watchlist entry, ensuring swift action to mitigate potential threats.
  • Comprehensive logs of visitor check-ins and movements within the facility, which can be reviewed to identify unauthorized access attempts or policy violations.

Automated Reporting and Audit Trails

iLobby's FacilityOS simplifies the management of compliance-related documentation by providing detailed visitor history reports, which are essential for meeting CJIS audit requirements. Our platform allows you to:

  • Automatically generate reports that document visitor activity, including entry and exit times, which supports the maintenance of detailed audit logs (PE-3).
  • Store visitor history securely to facilitate easy access during audits, ensuring that your organization can quickly provide necessary documentation.
  • Set up customizable workflows to enhance the check-in process, including automated notifications and approvals, helping to ensure compliance with access control procedures.

By leveraging FacilityOS features, organizations can effectively manage visitor access and enhance their security posture, helping to comply with CJIS requirements for Physical and Environmental Protection. While our solutions are focused on visitor and temporary guest management, they provide a robust foundation for improving overall security and meeting many critical compliance needs.

Your Roadmap to CJIS Compliance Success

Here's how to get started:

  1. Assess Your Current State: Conduct a thorough audit of your existing security measures and compare your current practices with CJIS requirements. By working with a vendor like iLobby, we can help you pinpoint where and how FacilityOS can bridge those gaps most effectively.
  2. Explore FacilityOS in Action: See how our integrated platform can enhance your compliance efforts. Request a personalized demo tailored to your facility's unique needs.
  3. Implementation and Training: Our expert team will guide you through a smooth implementation process, ensuring your staff is fully trained and confident in using FacilityOS.
  4. Ongoing Support and Updates: Stay ahead of evolving CJIS requirements with our continuous updates and ongoing support.

Don't let CJIS compliance be a roadblock to your operations. With FacilityOS, you can turn it into a catalyst for improved security, efficiency, and peace of mind.

Don't wait for the October 1st deadline to catch you off guard. Let iLobby's FacilityOS be your partner in helping to achieve and maintaining CJIS compliance, ensuring your facility remains secure, efficient, and ahead of the curve.

Contact us today to schedule your personalized FacilityOS demo. Together, let's build a safer, more secure future for your organization.


Legal Disclaimer

This article is for informational purposes only and does not constitute legal advice. Readers should consult their legal advisors to ensure compliance with applicable laws and regulations.

Bradley Boudreau

Brad is a dynamic Account Executive at iLobby, bringing a unique blend of hands-on technical experience and sales expertise to the table. After years working as an HVAC technician, Brad transitioned into sales following his business degree from the University of Maryville. Specializing in uncovering new business opportunities and managing complex government sales cycles, Brad is dedicated to delivering outstanding client service and fostering meaningful relationships. Outside of work, you can often find Brad mentoring hockey players or enjoying time on the golf course.

Related Posts

View All Posts