Laserfiche WebLink
ATTACHMENT A 2011-DJ-BX-2532 <br />City: Huntington Beach <br />The City of Huntington Beach Police Department, Huntington Beach, California proposes to use <br />the 2011 Justice Assistance Grant funding as follows: <br />Purpose Areas: <br />This grant funding will be used to purchase new software to enhance our current security access to <br />California Law Enforcement Telecommunications Systems (CLETS) data to comply with new <br />Department of Justice (DOJ) requirements. The proposed purpose area is Program Planning, Evaluation <br />& Technology Improvement. <br />Program Narrative: <br />Outline the Proposed program activities - <br />To secure the mobile data computers (MDC's) used to access DOJ related information. <br />Provide a brief Analysis of the need for the programs - <br />This technology improvement is a requirement by the Federal Bureau Investigations (FBI) California <br />Justice Information System (CJIS) Security policy, section 5.6.2.1. <br />Goals of the proiect: <br />Require all officers and officials who require access to CLETS data to use a strong two-factor <br />authentication method. <br />Improve security to all data communication from the MDC's located in the police vehicles. <br />Allow the officers to take the MDC's out of the vehicles for more effective police reporting <br />writing. <br />Strategies to be used for proiect: <br />The Huntington Beach Police Department has numerous Mobile Data Computers (MDC) in its fleet of <br />vehicles and remote access computers both of which access CLETS data. These systems use Sprint EV- <br />DO for remote connectivity to the police data network. In order to comply with the aforementioned FBI <br />security policy, the police department is required to use a secondary method to authenticate the identity of <br />personnel using a MDC or remote access computer to access protected data. An example of this is using a <br />secondary long-in requirement that will be required by personnel every time they access the network. By <br />requiring this secondary authentication the department is further ensuring the identity of the personnel <br />using the system. Currently, the network is protected by only a single log-in password which could be <br />compromised by individuals who do not have authority to access the system. The solution to correct this <br />vulnerability is by requiring both knowledge (password) and possession of authorized device to access the <br />data network. <br />2011-DJ-BX-2532 Page 18 of 38 <br />20A-26