Welcome to the Texas CJIS Security Policy Training Library. This area provides valuable links and presentations as a resource for Texas agencies, to download PowerPoint training presentations covering each major policy area of the CJIS Security Policy (CJISSECPOL).
Phase 2 of the library is now complete, with six modules available for immediate download. Each module is designed to help agencies train their personnel on specific controls and requirements — replacing the need for every agency to develop their own materials from scratch.
Library Status
The CJIS Security Policy Training Library was built in phases. As of April 2026, Phase 2 is complete — meaning six full training modules are now available for download. Phase 3 modules (9 additional policy areas) remain in the planning queue.

Who This Library Is For
- Local Agency Security Officers (LASOs) building training programs
- Training coordinators looking for ready-to-use content
- IT and security staff preparing role-based sessions
- Agency leadership onboarding new personnel
The Policy + Training Pairing
Each training module in this library corresponds to a sample policy template available on the CJIS Documents page. Agencies can download BOTH the training module and the matching policy template — giving them a complete package for each policy area:
- Training module — use this to TRAIN staff on the policy area
- NIST Policy Template — use this to FORMALIZE the policy at your agency
Train on it, write it down, adopt it. Simple and effective.
Available Training Modules
All six modules below are ready to download and use in your agency's training program. Each is delivered as a PowerPoint (PPTX) file that can be used as-is or customized for your agency's specific operations.
Incident Response Training
Training covering how to detect, report, contain, and recover from security incidents involving Criminal Justice Information. Includes defined roles, escalation procedures, notification timelines, and post-incident review practices.
(Training all agency personnel on how to recognize and respond to a security incident — whether they're the first to notice or the one coordinating the response.)
Access Control Training
18-slide training on user accounts, privileges, least-privilege principles, session controls, and how access must be authorized, reviewed, and revoked throughout the user lifecycle. Includes the four-phase Access Lifecycle and common audit findings.
(Training LASOs, IT administrators, and managers responsible for provisioning, reviewing, or revoking access to CJI systems.)
Identification & Authentication Training
18-slide training on multi-factor authentication (MFA), password standards, identity verification, and authentication requirements. Covers the three factors of authentication and what's changing under v6.0.
(Training all personnel with CJI access on how to authenticate correctly, when MFA applies, and what's coming under v6.0.)
Media Protection Training
17-slide training on handling, storage, transport, sanitization, and destruction of both digital and physical media containing CJI. Covers approved destruction methods, chain of custody, and documentation requirements.
(Training personnel who handle CJI-bearing media — hard drives, USB drives, paper records, backup tapes — from receipt through disposal.)
Personnel Security Training
17-slide training on background check requirements, access authorization, role changes, transfers, separations, and contractor onboarding/offboarding procedures. Includes the four-phase Personnel Lifecycle.
(Training LASOs, HR personnel, and supervisors on managing the security lifecycle of employees and contractors with CJI access.)
Awareness & Training
17-slide training on how personnel must protect Criminal Justice Information in their day-to-day work. Covers recognizing social engineering and phishing, protecting credentials, safe CJI handling, remote and mobile security, and recognizing/reporting incidents.
(Required annual security awareness training for all personnel with CJI access. Satisfies the §5.2 awareness training requirement.)
Phase 3: Future Modules (Planned)
These 9 modules cover the remaining CJIS Security Policy areas. They are planned for development but a release schedule has not yet been announced. Agencies needing immediate content for these areas should use the corresponding NIST Policy Templates from the CJIS Documents page as a reference.

Have a training topic suggestion or priority request? Contact the TX CJIS Security Office — agency feedback helps shape the release schedule.
Training + Policy Pairing Reference
Every training module in this library is paired with a sample NIST Policy Template from the CJIS Documents page. Use BOTH together for a complete package — training content for your people, written policy for your records.

NIST Policy Templates are available in the Sample Agreements + NIST Policies Reference Guide or individually on the CJIS Documents page. CJIS Documents Page