CJIS Security Policy Sample Clauses

CJIS Security Policy. Motorola agrees to support a law enforcement Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (“CJIS”) Security Policy and will comply with the terms of the CJIS Security Addendum for the term of the Addendum or Ordering Document for the applicable Product. Customer hereby consents to Motorola screened personnel serving as the “escort” within the meaning of CJIS Security Policy for unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Product support and development.
CJIS Security Policy. The CJIS Security Policy contains information security requirements, guidelines, and agreements reflecting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The CJIS Security Policy integrates presidential directives, federal laws, FBI directives and the criminal justice community’s APB decisions along with nationally recognized guidance from the National Institute of Standards and Technology.
CJIS Security Policy. Motorola agrees to support Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (“CJIS”) Security Policy, incorporated herein, and will comply with the terms of the CJIS Security Policy available at ▇▇▇▇▇://▇▇.▇▇▇.▇▇▇/cjis-division/cjis-security-policy-resource-center for the term of the Addendum or Ordering Documents for the applicable Product(s). Customer hereby consents to Motorola screened personnel serving as the “escort,” and/or “virtual escort” within the meaning of CJIS Security Policy for unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Product support and development.
CJIS Security Policy. Peregrine has implemented procedures to allow for adherence to the CJIS Security Policy. The hosting facility for the Service uses state-of-the-art access control technologies that meet or exceed CJIS requirements. In addition, Peregrine has installed and configured solid network intrusion prevention appliances for adherence to CJIS requirements.
CJIS Security Policy. RESPEC must follow, maintain, and adhere to all current requirements stated in the CJIS security policies and framework throughout the entire term of the Contract. The CJIS requirements can be found at ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/about- us/cjis/cjis-security-policy-resource-center. RESPEC shall not allow any Employee to work on the TexasSure project until the Employee submits the following documentation and receives TDI’s approval: a) verification of CJIS security awareness training (Level 4) 1) within six (6) months of Contract Execution for existing Employees, and prior to work on the project for new Employees 2) biennially thereafter for the entire Contract Term, and 3) written documentation of the training provided to TDI within 14 calendar days of the training b) FBI fingerprint background check within 30 days of assignment c) signed and dated CJIS Security Addendum, and d) signed and dated TexasSure Non-Disclosure Agreement. TDI, in its sole discretion, may approve or disapprove of a RESPEC Employee if they have criminal activity that may prohibit them from working on the project.
CJIS Security Policy. Section ▇.
CJIS Security Policy. Described in the MCA. Section 7. VaaS Program Terms. All hardware provided by Motorola to Customer under the VaaS Program will be considered Equipment, as defined in the MCA and constitutes a purchase of Equipment subject to the terms and conditions contained therein. In addition, the following terms and conditions apply to any Equipment purchased under the VaaS Program:
CJIS Security Policy. Each CJCC Member is responsible for its own compliance with the Criminal Justice Information Services Security Policy published by the U.S. Department of Justice, Federal Bureau of Investigation (the “CJIS Policy”) and the activities to be performed by such CJCC Member in accordance with CJIS Policy. Without limiting the foregoing, each CJCC Member agrees as follows: 2.2.1. Each CJCC Member has executed, or will execute, appropriate information exchange agreements with third parties, including those agreements required by the CSA to implement the CJIS Policy. Those agreements include an Information Exchange Agreement template for the exchange of information between two criminal justice agencies, and a Management Control Agreement template for the exchange of information between a criminal justice agency and a contracted non-criminal justice entity. To properly implement the CJIS Policy, these agreements must be substantially in the form provided by the CSA, and may only be modified upon approval of all parties to the applicable agreement and the CSA. Copies of the CSA information exchange agreements are attached to Exhibit A. 2.2.2. Each CJCC Member will perform security awareness training as required by the CJIS Policy. The CJCC Members may elect to comply with such obligation by participating in MSHP training. 2.2.3. Each CJCC Member will implement appropriate audit and accountability controls with respect to their information systems that follow CJIS Policy standards. 2.2.4. Each CJCC Member will use its FBI authorized originating agency identifier (ORI) on each CJI transaction, Each agency that holds an ORI will have the responsibility to confirm compliance with the CJIS Policy with respect to its own information, including the requirement to enter into appropriate information exchange agreements with third parties. Organizations that do not have an ORI are not criminal justice agencies but can still receive CJI under certain conditions with the proper agreement in place. 2.2.5. CJCC Members may delegate one or more of the activities required by the CJIS Policy, but any delegate of such activities must comply with the CJIS Policy, and each CJCC Member will remain responsible for such compliance. The CJCC may establish acceptable mechanisms for the delegation of certain activities required by the CJIS Policy.

Related to CJIS Security Policy

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.