Part I — FERPA: Family Educational Rights and Privacy Act

The Family Educational Rights and Privacy Act (20 U.S.C. § 1232g; 34 CFR Part 99) is a federal law that protects the privacy of student education records. FERPA applies to educational agencies and institutions that receive funding under programs administered by the U.S. Department of Education. It restricts disclosure of personally identifiable information (PII) from education records without prior written consent of the parent or eligible student.

When FERPA Applies in Emergency Response

MayDay-IC's Facility Census and Roster Management System enables emergency responders to import and manage roster data from educational institutions (schools, colleges, and universities) during incidents such as fires, evacuations, active threat events, and mass casualty incidents. These rosters contain education records protected by FERPA. By importing such records into MayDay-IC, the educational institution must have a lawful basis for disclosure.

FERPA permits disclosure of education records without consent in the following emergency-relevant circumstances:

How MayDay-IC Protects FERPA-Covered Data

When roster data is imported from an educational institution into MayDay-IC's Facility Census system:

FERPA Data Breach Notification

FERPA does not contain a standalone breach notification requirement equivalent to HIPAA's Breach Notification Rule. However, unauthorized access to or disclosure of FERPA-protected education records:

Retention and Destruction of FERPA Records

School roster data imported into MayDay-IC is retained for the incident period plus 3 years (consistent with standard educational records retention under FERPA) unless a longer retention period is required by applicable law. Upon expiration of the retention period, records are cryptographically purged from the system and the purge event is audit-logged.

Part II — PREA: Prison Rape Elimination Act

The Prison Rape Elimination Act of 2003 (34 U.S.C. § 30301 et seq.) and implementing regulations (28 CFR Part 115) address the detection, prevention, reduction, and punishment of prison rape. PREA applies to all public and private institutions that house adult or juvenile offenders, including federal and state prisons, local jails, police lockups, community confinement facilities, and juvenile facilities. PREA establishes confidentiality requirements for information related to sexual abuse allegations and victim information.

When PREA Applies in Emergency Response

MayDay-IC's Facility Census and Roster Management System supports incidents involving correctional facilities, including evacuations, fires, natural disasters, and disturbances. Inmate census data and related records imported into MayDay-IC may contain information subject to PREA's confidentiality requirements, including:

PREA Confidentiality Requirements

Under 28 CFR 115.61, all information concerning allegations of sexual abuse is kept confidential and is not disclosed to other inmates. Under 28 CFR 115.86, investigators are prohibited from disclosing information related to an allegation except to the extent necessary to make treatment, investigation, and management decisions. MayDay-IC implements the following controls to support PREA compliance:

PREA Breach Notification

Unauthorized access to or disclosure of PREA-protected information is treated as a High or Critical severity breach under MayDay-IC's Breach Response Plan. In addition to standard breach response procedures, MayDay-IC will:

Part III — CJIS: Criminal Justice Information Services Security Policy

The FBI's Criminal Justice Information Services (CJIS) Division manages the nation's criminal justice databases and establishes a security policy — the CJIS Security Policy — governing access to and use of Criminal Justice Information (CJI). CJI includes biometric, identity history, person, organization, and property information collected by criminal justice agencies and stored in CJIS Division databases, as well as information derived from those databases.

Current Scope of CJIS Within MayDay-IC

MayDay-IC does not currently serve as a CJIS Authorized Recipient and does not have direct access to CJIS Division databases (such as NCIC, NICS, or III). However, MayDay-IC acknowledges the following:

CJIS-Aligned Security Controls

Although not currently a CJIS Authorized Recipient, MayDay-IC implements security controls that align with CJIS Security Policy requirements to support law enforcement users and prepare for potential future CJIS integration:

CJIS Policy AreaMayDay-IC Control
Advanced Authentication (Policy Area 6)TOTP multi-factor authentication enforced for all admin and law enforcement accounts
Configuration Management (Policy Area 10)Version-controlled infrastructure; access changes are audit-logged
Incident Response (Policy Area 9)Documented Breach Response Plan; 24-hour incident escalation procedures
Auditing and Accountability (Policy Area 2)Immutable audit logs with user identity, timestamp, and action for all data access events
Access Control (Policy Area 5)Role-based access controls with principle of least privilege; session timeouts enforced
Identification and Authentication (Policy Area 6)Unique user IDs; password complexity requirements; brute-force lockout after failed attempts
Mobile Device Security (Policy Area 13)AES-256 encryption for all data at rest on mobile devices; remote wipe capability
Encryption (Policy Area 12)AES-256-GCM for data at rest; TLS 1.2+ for data in transit

Future CJIS Integration

If MayDay-IC seeks to obtain direct access to CJI or to become a CJIS Authorized Recipient, the following additional requirements will be implemented prior to any such access:

Law enforcement agencies using MayDay-IC are responsible for ensuring that their use of MayDay-IC complies with any applicable CJIS requirements, including their own Security Addendums and their CJIS Agency Coordinator's (CAC) requirements.

Part IV — NEMSIS 3.5.0: National EMS Information System

The National EMS Information System (NEMSIS) is the national database that is used to store, share, and analyze EMS data from across the United States. NEMSIS defines a standard format for collecting and transmitting EMS patient care data. MayDay-IC supports export of patient care records in NEMSIS version 3.5.0 XML format.

Purpose and Legal Authority for NEMSIS Data Collection

NEMSIS data collection is authorized and encouraged under the Emergency Medical Services Systems Act and the Public Health Service Act. States are required to submit NEMSIS-compliant data to the National EMS Database as a condition of receiving certain federal grants administered by NHTSA and HRSA. NEMSIS data is used for:

NEMSIS Data and PHI

NEMSIS patient care records contain Protected Health Information (PHI) as defined by HIPAA, including patient demographics, vital signs, assessment findings, treatment information, and outcome data. All NEMSIS data generated by or exported from MayDay-IC is subject to HIPAA's Privacy and Security Rules in addition to NEMSIS data governance requirements.

How MayDay-IC Handles NEMSIS Exports

Data Elements Included in NEMSIS Exports

NEMSIS SectionData Included
ePatientPatient demographics: age, gender, race/ethnicity, home county, home state (exact address is excluded from standard exports)
eDispatchIncident number, dispatch date/time, dispatch reason, response priority
eSituationChief complaint, primary impression, secondary impressions
eVitalsAll vital signs recorded during the incident
eProtocolsProtocols followed, medication administered, procedures performed
eOutcomeDisposition, destination, patient acuity on arrival
eRecordRecord creation and submission metadata

NEMSIS Data Retention

NEMSIS-compliant patient care records are retained for a minimum of 6 years from the date of the incident, consistent with HIPAA requirements (45 CFR 164.530(j)). State-specific retention requirements may be longer; MayDay-IC's configurable Retention Settings allow agencies to set retention periods consistent with their state's requirements.

Part V — Regulatory Applicability Matrix

The following matrix summarizes which regulations apply to each category of data managed within MayDay-IC's Facility Census and Roster Management System:

Data CategoryPrimary Regulation(s)Key Restriction
Patient/EMS recordsHIPAA, NEMSIS, 42 CFR Part 2 (if SUD)PHI — AES-256, BAA required, NEMSIS disclaimer
School/university rostersFERPA, HIPAA (if medical records)Consent required; emergency exception only during active incident
Correctional facility censusPREA, HIPAANo inmate-to-inmate disclosure; vulnerability data segregated
Law enforcement-generated recordsCJIS (agency responsibility), HIPAAAgency-level CJIS compliance required; MayDay-IC provides aligned controls
Substance use treatment records42 CFR Part 2 (stricter than HIPAA)Separate consent required; no re-disclosure; no use in criminal proceedings
Displaced persons recordsHIPAA, state privacy lawsAES-256; privacy gate before caller identity disclosure

Contact

For questions about FERPA, PREA, CJIS, or NEMSIS compliance within MayDay-IC:
Email: info@maydayic.com

For urgent security or breach concerns:
Email: info@maydayic.com

Blue Beard Solutions Inc.
Privacy & Compliance Officer