The Information Technology Division is dedicated to serving TJJD staff with technology and customer service that ensures a reliable, sustainable environment for all TJJD departments and facilities.
Information Technology provides dependable, proactive technological and administrative support, helping agency personnel access the technical resources they need to effectively perform their duties.
The Information Technology Division strives for excellence in technology leadership and customer service.
The Information Technology Division is responsible for developing specialized applications that support the work of juvenile justice professionals. If you have questions about the following applications, please contact the Help Desk.
- Administrative Disbursement System (ADM)
- Board Portal
- Behavioral Health Sciences Online
- Compliance Monitoring and Enforcement Tracking System (COMETS)
- Contact Activity Tracking System (CATS)
- Contract Providers
- Contracts and Procurement
- Cost Efficiency Suggestions and Ideas (CESNI)
- Facility Registry
- Final Orders & Decisions
- Grant Manager (GRANTMGR)
- Integrated Certification Information System (ICIS)
- Juvenile Justice Alternative Education Program System (JJAEP)
- Juvenile Medicaid Tracker (JMT)
- Program Registry (PROGREG)
- Regional Training Programs
- Regional Training System (login)
- Research and Analytical Testing System (RATS)
- TCOOMI Special Needs System
- Texas Juvenile Probation Directory
- Texas Juvenile Sex Offender Risk Assessment Instrument (TJSORAI)
- Title IV-E Approved Facilities
- Title IV-E Program Systems (TPS)
- Traumatic Brain Injury Tracking System (TBITS)
All web based applications use a secure server for conducting online transactions. All information transmitted to IT will be protected at a minimum by 128-bit encryption technology, provided the employee's browser is properly configured and their computer is operating properly. Security technology requires that staff have a reasonably current browser that is capable of supporting 128-bit encryption. Current browsers such as these will activate the appropriate security features when one enters an online transaction through this site. In general, staff can determine whether they're on a secure site by looking at the symbol at the bottom of the browser screen. A user is on a secure server if the key is unbroken or the lock is locked.
For information about our website, please visit the Web Policies page »
Chief Information Officer
Nate Jackson, Jr.