CJIS Handling CJI
The Infosec IQ training content library offers industry- and role-based training modules that personalize and contextualize education. Training modules prepare your workforce to defend against the cyber threats they’re most likely to face. Training is mapped to one of nine core security behaviors outlined in the NIST security awareness and training guidelines. Book a demo to learn more about our many interactive training modules, or create a free account to preview every Infosec IQ training resource.
Sign up for a free account to preview every Infosec IQ training module, poster, infographic and campaign tool.

About this Training Module
This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of non-compliance.
Accessibility
Each module has Closed Captions (CC), an Audio Descriptive Track (ADT), and a downloadable PDF
Duration
09:02 minutes Training Module
Languages
Vocally translated
- English (US)
Closed caption (CC) only:
- English (US)
We've helped Fortune 500 companies and can help you as well
Infosec IQ's SCORM-as-a-Service
Traditional SCORM packages contain a single, static training module that must be manually replaced after each update. SCORM as a Service training modules stream directly from Infosec IQ, ensuring your LMS always delivers the most recent version of each training module.
Infosec IQ SCORM packages are available in multiple languages for instant download from the AwareEd™ content library, meaning you can upload the security training you need to your LMS when you need it. Speak with a representative to learn more or register for an account to explore Infosec IQ.

Browse our featured security awareness training content and series
Related content

Comprehensive Guide to DFARS Training: Everything You Need to Know
This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

Comprehensive Guide to HIPAA HITECH Compliance: Protecting Patient Data
Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.

Core Concepts CMMC 2.0: Understanding the Key Elements for Compliance
Explore the challenges of defense spending and government contracting with this look at the Cybersecurity Maturity Model Certification, or CMMC.