JIDS was archived on May 12, 2021. Only state Compact Offices can access JIDS through May 17, 2022.

How does JIDS prevent unauthorized access?

Authorized users are uniquely identified to the system by their e-mail address authenticated with a password. In addition, all data is properly secured with specific rights customized to a group, project or user based on their role. The workflow set up in JIDS requires review and sign-off at several levels to ensure processes are reviewed and approved as they progress through the system. For more detailed information on JIDS’ security, click the document link below.

Powered by Zendesk