Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

5.10.1.2.1Encryption in Transit

>Control Description

When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via encryption. When encryption is employed, the cryptographic module used shall be FIPS 140-2 certified and use a symmetric cipher key strength of at least 128 bit strength to protect CJI. NOTE: Subsequent versions of approved cryptographic modules that are under current review for FIPS 140-2 compliancy can be used in the interim until certification is complete. EXCEPTIONS: 1. See Sections 5.13.1.2.2 and 5.10.2. 2. Encryption shall not be required if the transmission medium meets all of the following requirements: a. The agency owns, operates, manages, or protects the medium. b. Medium terminates within physically secure locations at both ends with no interconnections between. c. Physical access to the medium is controlled by the agency using the requirements in Sections 5.9.1 and 5.12. d. Protection includes safeguards (e.g., acoustic, electric, electromagnetic, and physical) and if feasible countermeasures (e.g., alarms, notifications) to permit its use for the transmission of unencrypted information through an area of lesser classification or control. e. With prior approval of the CSO. Examples: • A campus is completely owned and controlled by a criminal justice agency (CJA) – If line-of-sight between buildings exists where a cable is buried, encryption is not required. • A multi-story building is completely owned and controlled by a CJA – If floors are physically secure or cable runs through non-secure areas are protected, encryption is not required. • A multi-story building is occupied by a mix of CJAs and non-CJAs – If floors are physically secure or cable runs through the non-secure areas are protected, encryption is not required.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.