{"id":108160,"date":"2023-03-02T09:31:10","date_gmt":"2023-03-02T17:31:10","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=108160"},"modified":"2025-12-14T16:27:39","modified_gmt":"2025-12-15T00:27:39","slug":"what-is-the-cjis-security-policy","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/","title":{"rendered":"What Is the CJIS Security Policy?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-108161\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png\" alt=\"A decorative image of a computer displaying a lock with a magnifying glass hovering over the screen. Also a title that reads What is CJIS?\" width=\"1440\" height=\"820\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788-768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788-560x319.png 560w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p id=\"bzdropcap\">It\u2019s always been the case that specific industries are subject to their own security standards when it comes to protecting sensitive data. You\u2019ve probably heard of the complex rules and regulations around personal health information and credit card data, for example. Law enforcement agencies do some of the most specialized work possible, so the entire world of criminal justice is subject to its own policies and procedures. Here\u2019s what you need to know about Criminal Justice Information Services and the CJIS Security Policy.<\/p>\n<h2>The History of Criminal Justice Information Services<\/h2>\n<p>Criminal Justice Information Services (CJIS) is the largest division of the FBI. It was originally established in 1992 to give law enforcement agencies, national security teams, and the intelligence community shared access to a huge repository of highly sensitive data like fingerprints and active case reports. The <a href=\"https:\/\/le.fbi.gov\/cjis-division-resources\/cjis-security-policy-resource-center\" target=\"_blank\" rel=\"noopener\">CJIS Security Policy<\/a> exists to safeguard that information by defining protocols for the entire data life cycle wherever it exists, both at rest and in transit. It\u2019s easy to see how important it is for law enforcement agencies to need quick and secure access to this case critical data, but it\u2019s also clear just how detrimental that data could be if it got into the wrong hands.<\/p>\n<h2>What Is Criminal Justice Information?<\/h2>\n<p>To get a better sense of the CJIS Security Policy and how it works, let\u2019s start by looking at the data it covers. These are the five types of data that qualify as criminal justice information (CJI):<\/p>\n<ul>\n<li><strong>Biometric data:<\/strong> Data points that can be used to identify a unique individual, like fingerprints, palm prints, iris scans, and facial recognition data.<\/li>\n<li><strong>Identity history data:<\/strong> A text record of an individual\u2019s civil or criminal history that can be tied to the biometric data that identifies them.<\/li>\n<li><strong>Biographic data:<\/strong> Information about individuals associated with a particular case, even without unique identifiers or biometric data attached.<\/li>\n<li><strong>Property data:<\/strong> Information about vehicles or physical property associated with a particular case and accompanied by personally identifiable information.<\/li>\n<li><strong>Case\/Incident history:<\/strong> Data about the history of criminal incidents.<\/li>\n<\/ul>\n<h2>How Does CJIS Compliance Work?<\/h2>\n<p>The sensitivity of the types of data that qualify as CJI is an indication of just how complicated the CJIS Security Policy is. To complicate matters further, CJIS (under the FBI and in turn the U.S. Department of Justice) issues regular updates to the Security Policy. The complexity inherent in the national policy, in combination with the pressure of keeping pace with constant changes, has meant that many law enforcement, national security, and intelligence agencies opt not to share data between agencies in lieu of taking the necessary steps to keep it safe in compliance with CJIS.<\/p>\n<p>Each individual government agency is responsible for managing their own CJIS compliance. And the Security Policy applies to anyone interacting with that data, regardless of what system they use to do so or how they are associated with the agency that owns it. That means law enforcement representatives, lawyers, contractors, and private entities, for example, are all subject to the rules laid out in the CJIS Security Policy. What\u2019s more, state governments and their respective CJIS Security Officers are responsible for managing the application of the Security Policy at the state level.<\/p>\n<p>One thing to note is that there is no central CJIS authorization body, no accredited pool of independent assessors, nor a standardized assessment approach to determining whether a particular solution is considered CJIS compliant. Backblaze is committed to helping customers meet CJIS requirements.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-108175\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969.jpg\" alt=\"A woman with multi-colored, digital lights projected on her face. \" width=\"1440\" height=\"960\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969.jpg 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969-300x200.jpg 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969-1024x683.jpg 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969-768x512.jpg 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969-1248x832.jpg 1248w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/pexels-thisisengineering-3861969-560x373.jpg 560w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<h2>How To Meet CJIS Requirements<\/h2>\n<p>Despite all this complexity, CJIS doesn\u2019t issue any official compliance certifications. Instead, compliance with the Security Policy falls under the purview of each individual organization, agency, or government body. Having the right technical controls in place to satisfy all standardized areas of the policy\u2014and managing those controls on an ongoing basis\u2014is the best (and the only) way to achieve CJIS compliance. These are the 13 key areas listed in the Security Policy:<\/p>\n<h3>Area 1: Information Exchange Agreements<\/h3>\n<p>The information shared through communication mediums shall be protected with appropriate security safeguards. The agreements established by entities sharing information across systems and communications mediums are vital to ensuring all parties fully understand and agree to a set of security standards.<\/p>\n<h3>Area 2: Awareness &amp; Training<\/h3>\n<p>Any individuals interacting with CJI have to participate in annual specialized training about how they are expected to comply with the Security Policy.<\/p>\n<h3>Area 3: Incident Response<\/h3>\n<p>Every agency interacting with CJI must have an Incident Response Plan (IRP) in place to ensure their ability to identify security incidents when they occur. IRPs also outline plans to contain and remediate damage as quickly and efficiently as possible.<\/p>\n<h3>Area 4: Auditing &amp; Accountability<\/h3>\n<p>Organizations have to monitor who accesses CJI, when they access it, and what they do with it. Establishing visibility into interactions like file access, login attempts, password changes, etc. helps dissuade bad actors from accessing data they shouldn\u2019t and also gives agencies the forensic information they need to investigate incidents if breaches do occur.<\/p>\n<h3>Area 5: Access Control<\/h3>\n<p>Another way to ensure that only authorized users interact with CJI is to limit access based on specific attributes like job title, location, and IP address. Implementing role-based access controls helps limit the availability of CJI, so only the people who need to use that data can access it (and only when absolutely necessary).<\/p>\n<h3>Area 6: Identification &amp; Authentication<\/h3>\n<p>Because of the rules around auditing, accountability, and access control, the Security Policy also stipulates the importance of authenticating every user\u2019s identity. CJIS\u2019 identification and authentication rules include the use of multifactor authentication, regular password resets, and revoked credentials after a certain number of unsuccessful login attempts.<\/p>\n<h3>Area 7: Configuration Management<\/h3>\n<p>Only authorized users should be allowed to change the configuration of the systems that store CJI. This includes simple tasks like performing software updates, but it also extends to the hardware realm, for example when it comes to adding or removing devices from a network.<\/p>\n<h3>Area 8: Media Protection<\/h3>\n<p>Compliant agencies must establish policies to protect all forms of media, including putting procedures in place for the secure disposal of that media once it is no longer in use.<\/p>\n<h3>Area 9: Physical Protection<\/h3>\n<p>Any physical spaces (like on-premises server rooms, for example) should be locked, monitored by camera equipment, and equipped with alarms to prevent unauthorized access.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-108171\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg\" alt=\"A wall of black and white security cameras. \" width=\"2560\" height=\"1721\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-scaled.jpg 2560w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-300x202.jpg 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-1024x688.jpg 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-768x516.jpg 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-1536x1033.jpg 1536w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-2048x1377.jpg 2048w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/lianhao-qu-LfaN1gswV5c-unsplash-560x376.jpg 560w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<h3>Area 10: System &amp; Communications Protection<\/h3>\n<p>Cybersecurity best practices should be in place, including perimeter protection measures like Intrusion Prevention Systems, firewalls, and anti-virus solutions. In the category of encryption, FIPS 140-2 certification and a minimum of 128 bit strength are required.<\/p>\n<h3>Area 11: Formal Audits<\/h3>\n<p>Although the CJIS doesn\u2019t issue compliance certifications, agencies still have to be available for formal audits by CJIS representatives (like the CJIS Audit Unit and the CJIS Systems Agency) at least once every three years.<\/p>\n<h3>Area 12: Personnel Security<\/h3>\n<p>Any personnel with access to CJI have to undergo a screening process and background checks (including fingerprinting) to ensure their fitness to handle sensitive data.<\/p>\n<h3>Area 13: Mobile Devices<\/h3>\n<p>In order to remain in compliance, organizations have to develop acceptable use policies that govern how mobile devices are used, how they connect to the internet, what applications they can have on them, and even what websites they can access. In this case, mobile devices include smartphones, tablets, and laptops that can access CJI. When representatives use mobile devices to access CJI, those devices (and that access) are subject to all the areas of the Security Policy.<\/p>\n<h2>CJIS Compliance, Encryption, and Cloud Storage<\/h2>\n<p>Encrypting data prior to uploading it to cloud storage like <a href=\"https:\/\/www.backblaze.com\/cloud-storage\" target=\"_blank\" rel=\"noopener\">Backblaze B2<\/a> is a great tool that can be applied to protect CJI data and help ensure compliance with the vast majority of the CJI requirements. Our team will work with your team to evaluate any remaining CJIS requirements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Different industries require different compliance standards\u2014which only makes sense because of the different types of sensitive data. In the world of criminal investigations, the Criminal Justice Information Services&#8217; (CJIS) security policy is the standard. Here&#8217;s some things you need to know. <\/p>\n","protected":false},"author":188,"featured_media":108161,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[468],"class_list":["post-108160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CJIS Security Policy: Ensuring Data Compliance and Protection<\/title>\n<meta name=\"description\" content=\"Discover the CJIS Security Policy&#039;s role in law enforcement data protection and how organizations can ensure compliance for sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CJIS Security Policy: Ensuring Data Compliance and Protection\" \/>\n<meta property=\"og:description\" content=\"Discover the CJIS Security Policy&#039;s role in law enforcement data protection and how organizations can ensure compliance for sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T17:31:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T00:27:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mary Ellen Cavanagh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mary Ellen Cavanagh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CJIS Security Policy: Ensuring Data Compliance and Protection","description":"Discover the CJIS Security Policy's role in law enforcement data protection and how organizations can ensure compliance for sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"CJIS Security Policy: Ensuring Data Compliance and Protection","og_description":"Discover the CJIS Security Policy's role in law enforcement data protection and how organizations can ensure compliance for sensitive data.","og_url":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2023-03-02T17:31:10+00:00","article_modified_time":"2025-12-15T00:27:39+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","type":"image\/png"}],"author":"Mary Ellen Cavanagh","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Mary Ellen Cavanagh","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/"},"author":{"name":"Mary Ellen Cavanagh","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/bd6dcea2ad6301102946e17f52ab188b"},"headline":"What Is the CJIS Security Policy?","datePublished":"2023-03-02T17:31:10+00:00","dateModified":"2025-12-15T00:27:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/"},"wordCount":1303,"commentCount":2,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","keywords":["B2Cloud"],"articleSection":["Cloud Storage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/","url":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/","name":"CJIS Security Policy: Ensuring Data Compliance and Protection","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","datePublished":"2023-03-02T17:31:10+00:00","dateModified":"2025-12-15T00:27:39+00:00","description":"Discover the CJIS Security Policy's role in law enforcement data protection and how organizations can ensure compliance for sensitive data.","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","width":1440,"height":820,"caption":"A decorative image of a computer displaying a lock with a magnifying glass hovering over the screen. Also a title that reads What is CJIS?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/what-is-the-cjis-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is the CJIS Security Policy?"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/bd6dcea2ad6301102946e17f52ab188b","name":"Mary Ellen Cavanagh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/ME_Headshot-150x150.jpeg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/ME_Headshot-150x150.jpeg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/ME_Headshot-150x150.jpeg","caption":"Mary Ellen Cavanagh"},"description":"Mary Ellen Cavanagh is a seasoned technologist specializing in data protection and storage. After 25 years of experience as a partner ecosystem solutions engineer, she now tells it like it is as a Sr. Partner Marketing Manager at Backblaze. When she's not busy developing go-to-market strategies and campaigns with Backblaze's channel partners, she can be found doing Sunday New York Times crossword puzzles\u2014in pencil\u2014with her wasband and cuddling with her five fur babies. Connect with her on LinkedIn","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/maryellen\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/03\/bb-bh-What-is-CJIS_-_Design-A-e1677700450788.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/108160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=108160"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/108160\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/108161"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=108160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=108160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=108160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}