MicroPact Blog

Replacing Legacy CJIS Systems? Think MicroPact

Don’t Be Held Prisoner by Your Legacy CJIS. Choose Agile, Affordable Case Management

Morgan Shannon's avatar

By: Morgan Shannon

July 2, 2018 | Justice and Law Enforcement

Time, money, resources. These are frequently the most common reasons for not replacing a legacy system. If your current criminal justice information system (CJIS) seems to be falling behind the times, it’s likely because it is. Whether it is a paper based system, a system built on old technology, or the consolidation of multiple systems, many legacy law enforcement systems remain outdated and never standardize. That’s the bad news. The good news is, there’s a path forward.

The CTA Technology Summit

I recently attended the Criminal Technology Association’s (CTA) Annual Summit in Daytona Beach, Florida. I was struck by how many law enforcement offices are dealing with the prospect of having to replace legacy CJIS systems. There were of course funding and budget concerns but equally, many were holding off because they were comfortable with old processes and technology and were fearful of having to learn a new system. I understand that. It can be easy to get into the mindset that “If it ain’t broke, don’t fix it.”

For agencies that “don’t fix it” the challenge is that they can’t take advantage of emerging technologies, can’t easily share information with other agencies, and may not be able to meet emerging compliance standards. These are all signs that their system may in fact be very, very broken. Additionally, when organizations hold on to a legacy system, not only do they risk falling behind the times technologically, but also with respect to how they track crimes that demand the electronic investigative capabilities that advanced technology delivers, such as identity theft.

I gave a number of summit attendees our Ultimate CJIS brochure, and walked them through exactly how we would go about reducing the many pain points they are experiencing by implementing a system that provides more options, functionality, and integration capabilities. With a new system, departments will be able to enter more detail more quickly, save time assigning cases, and improve the analysis done during an active case.

We’ve Got You Covered

The MicroPact JLE team includes former public safety officers and trainers; criminal, military, and internal affairs investigators; secret service and intelligence agents; and background investigators. We know a case can turn on any piece of data and that no agency or office can afford for that data to be inaccessible. With our help your office can enjoy a smooth transition from a legacy system to a smart, configurable, and easy to use and maintain CJIS that will give you the flexibility to work quickly and comfortably and stay current with technology.

If you would like to learn more or schedule a demo, please contact me.

About the Author

Morgan Shannon has more than 25 years of public safety experience, including 20 years in the U.S. Air Force as a program training manager and criminal investigator. As a local deputy sheriff - lieutenant he served as Intel coordinator, patrol commander, and community service liaison. Morgan has also served as a training instructor for the U.S. Coast Guard at the Federal Law Enforcement Training Center, Charleston, SC and was the Training Coordinator for the Emergency Operation Center, Centers for Disease Control and Prevention, Atlanta, GA. He has a master’s in education from The Citadel.

Build the ultimate CJIS

Related Solution

Background Investigation

While conducting background investigations, organizations must accurately track all elements to ensure that candidates are properly vetted — and to determine which facilities, systems, and information they can access. entellitrak meets strict reporting and accountability standards, and facilitates the case investigator’s job by managing all data elements and creating a secure personnel folder for each candidate.

Explore this solution

Powered By:

Justice and Law Enforcement

When it comes to public safety and national security technology, to protect and defend means to track, analyze, and share information.

Learn More