Laserfiche WebLink
1411 <br />While working with evidence, users will have the ability to review and playback video and <br />audio with our built-in media player. With basic controls that allow a user to play, stop, <br />rewind, fast forward, and control the speed at which evidence files are played, users can <br />quickly and thoroughly review their evidence. While reviewing evidence from the View <br />Evidence page, your users can also: <br />CREATE CLIPS AND MARKERS to focus on or separate certain parts of a video <br />VIEW METADATA OVERLAYS that display important information such as the time and <br />date <br />ADD METADATA, TAGS, NOTES, AND CATEGORIES to the evidence file <br />SHARE EVIDENCE FILES with other users or external partners <br />ACCESS AND DOWNLOAD THE AUDIT TRAIL to review actions taken on the evidence <br />VIEW LOCATION DATA AND AUTOMATED TRANSCRIPTIONS that may be associated with <br />the evidence file <br />CONTROLLING ACCESS TO EVIDENCE <br />Axon Evidence governs access to stored information through agency -defined access control <br />settings and configurations. Administrators will create roles for different users that dictate <br />levels of access. Each Axon Evidence user will then be assigned one of these roles, which <br />determines if they do or do not have access to particular DEMS features and functions. <br />Agencies can also create cases and groups to control evidence access lists and improve <br />sharing workflows. <br />Additionally, Axon Evidence provides many agency -customizable security features to secure <br />digital evidence, including password complexity requirements, failed login limits, and <br />enforced timeout settings. Multi -factor authentication options are also available to allow a <br />user to access the system without the need for an administrator's approval. <br />PROTECTING THE CHAIN OF CUSTODY <br />Robust evidence, device, and user audit trails help protect the chain of custody within the <br />system. For peace of mind, every action taken by your personnel when in the system is <br />tracked and recorded in a tamperproof audit trail. <br />Axon's compliance demonstrates our commitment to providing a trustworthy platform and <br />offers Lino Lakes Police Department a way to understand the controls put in place to secure <br />Axon Evidence and the data you store in it. <br />SECURING THE SYSTEM AND EVIDENCE <br />Axon Evidence was designed and operates to ensure compliance with the FBI CJIS Security <br />Policy. Lino Lakes Police Department can be assured that your digital data is protected by a <br />robust information security program designed to exceed the CJIS security requirements as <br />well as provide protection against current and emerging threats. <br />Additionally, all evidence data is encrypted at rest and in transit. Robust SSL/TLS is <br />implemented for data in transit using TLS 1.2 with a 256-bit connection and Perfect Forward <br />Secrecy. Evidence data stored at rest is encrypted with at least 256-bit AES. <br />9 <br />