The Pros And Cons Of Security Information Sharing Systems

Improved Essays
Introduction When determining what/how to share information between the private and public entities (federal, state, or local governments) it is necessary to identify what the laws and regulations apply. Some of the laws/regulations depend on which portion of government is attempting to share information. If the Federal government is attempting to share information then they must identify rules such as the Federal Guidance on the Cybersecurity Information Sharing Act of 2015 which encouraged information sharing and adding liability insurance to protect the private partners (Weiss, 2016). When it comes to the state governments sharing information it is necessary for them to not only identify the laws/regulations that the federal government has in place, but must also identify the state specific laws that apply. In attempt to simplify this process in terms of legal information that is shared, most states have developed a Justice Information Sharing governance body. This body helps share criminal information with all other levels of government and establishes privacy policies for this information (Hunter, 2009). Lastly, local governments have must follow both federal and state …show more content…
The specific organization that is recommended is the Electricity Information Sharing and Analysis Center (E-ISAC, 2016). The risks associated with this partnerships do not outweigh that benefits that the company would receive. For example, while it does cost resources (Time, manpower, etc…) to review information before it’s sent out and when it comes from other members, this practice allows risks to be identified and mitigated before they become a security incident. Also, the expertise that the company can draw on will reduce the time to mitigate risks by providing best practice/procedures for

Related Documents

  • Decent Essays

    In 2003, Sheriff Rupf wanted a system that would allow him to share jail data with the other law enforcement agencies within the County. The desire was to create a system whereby agencies could perform searches of who was currently in jail and what their booking numbers were - all items of information that investigators needed for each of their cases. At the same time, Sacramento County was exploring the development of their own regional computer system - allowing all the member agencies to exchange data from their Records Management Systems (RMS). As the idea to develop an exchange for jail data within the County was gaining ground, the SEARCH Organization authored a document that detailed how a regional information exchange had significant benefits to all of its members - allowing members to…

    • 329 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Each level deals with law enforcement activities, yet each activity has its own unique circumstances. At the local level, law enforcement personnel are the foremost agents of protecting and serving the citizens of the United States on a daily and highly visible basis. The state departments deal with enforcing state laws on the roads and causeways within the states’ jurisdiction, along with protecting the states property and assets. The federal government deals with the protection of federal assets, along with the investigation of federal crimes and support functions therein. Each agency also provides support and assistance to each other when needed.…

    • 1125 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The 9/11 Commission stated information sharing with local enforcement is vital for national security, but balance must be maintained to ensure this information does not violate federal civil liberty…

    • 906 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Resolved: The United States federal government should substantially curtail its domestic surveillance. Plan: The government will curtail its surveillance by only viewing collected data by means of a warrant. Intro-After the NSA reported their first transparency avowal, the publisher Omicron Technology Limited stated, “The report said 19,212 "national security letters"—administrative subpoenas that allow the FBI to collect information without a warrant—were issued last year, containing 38,832 requests for information.” These unwarranted leaks are why this problem needs to be solved. That is why we stand resolved that “The United States federal government should substantially curtain its domestic surveillance.…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The American Founders utilized federalism in order to both prevent tyrannical leadership and to try and incite more participation in government and politics. The Massachusetts Constitution of 1780 states “The body-politic is formed by a voluntary association of individuals: It is a social compact, by which the whole people covenants with each citizen...that all should be governed by certain laws for the common good. ”1 This is a perfect example of federalism, as there is not one singular person or entity in charge, but rather a group of groups working together in order to ensure that no one group becomes too powerful and that everyone has equal representation. Federalism is based on the principal that there is a central government made up of…

    • 1413 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    There are conflicts between the many agencies in the criminal justice system. When the police arrest and charge an individual with a crime, the…

    • 1596 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Capabilities and Limitations of Intelligence in Support of Homeland Security The Department of Homeland Security (DHS) is a cabinet department of the United States national government which was created in response to the September 11, 2001, attacks in the nation. The department was created to primarily deal with the issue of protecting and securing the territory of the United States. It was created with the goal to prepare for, prevent and respond to any kind of domestic emergencies and in this case particularly terrorism (National Intelligence Council, & United States of America, 2011). Being the third largest Cabinet department after the Veterans Affairs and the Departments of Defense, Homeland Security is a department having countless affairs…

    • 1655 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    When the United States first established the federal government with the Constitution, the fledgling country had many issues. The founding fathers faced opposition and were trying to figure out a way to alleviate some of the problems they had faced with the Articles of Confederation. The citizens of the young country did not want to give up their hard earned rights and live under a similar form of government that they just escaped from and Articles had left the country too weak. This is why the founding fathers created the Constitution: to protect their new country and all of the citizens within.…

    • 1411 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Industry Project Rebecca Smith Adv. – Investments Spring 2016 Industry Description The electric utility industry consists of companies, often regulated public utilities, that provide electricity services such as electricity generation, distribution, sales, and transmission. This definition is based on the six companies from the following peer group: Dominion Resources, Southern Company, Great Plains Energy, PPL Corporation, Exelon, and Ameren. These companies engage in natural gas, nuclear, and solar energies to produce their electricity.…

    • 1177 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Through the NIBRS, Law Enforcement Authorities (LEAs) reported data on each offense and arrest within 23 offense categories made up of 49 specific crimes called Group A offenses the law enforcement collect administrative, offense, property, victim, offender, and arrestee information and an additional 10 Group B offense category (Author Unknown, Jan 2013, p 6). By design, LEAs generate NIBRS data as a by-product of their respective Records Management Systems (RMS) (Author Unknown, Jan 2013, p 6). Therefore, an LEA builds its system to suit its own individual needs, including all of the information required for the administration and operation; then forwards only the data required by the NIBRS to participate in the FBI UCR Program (Author Unknown,…

    • 1193 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This information can be shared across local, state and federal levels. We showed how the National Crime Information Center (NCIC) has data input at a local level, but it is a national database that allows any agency to obtain information about a prior criminal, missing persons, stolen property, etc. We then reviewed how the Regional Information Sharing Systems Program (RISS), Financial Crime Enforcement Network (FinCEN), National Drug Pointer Index (NDPIX), and National Tracing Center are all beneficial for sharing data amongst local and federal agencies. Lastly, we determined that the reason for the arrest of Uncle Bob in our mock scenario was due to the fact that he was wanted for a…

    • 1290 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The relationship between the State and Federal governments is complex and they are broken up into many different parts. Also the State and Federal Governments have different amounts of influence over the economy and the citizens. Another thing is that the government system and relationship between the two is very complex and controversial. This paper will discuss the relationship between the State and Federal governments and the complexity of the systems of government.…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays