CJIS. The terms and conditions of this Article VI.B. apply when Covered Data involved in a Project includes criminal justice information.
CJIS. All parties shall comply with all rules and regulations in relation to access Criminal Justice Information Services (CJIS).
CJIS. Contractor is permitted to use Criminal Justice Information (CJI) solely for the purposes of performing the services as described in the Authorized User Agreement, and for no other purpose. At no time shall the Contractor access any criminal justice information (including criminal history record information or other sensitive criminal justice information) as defined by CJIS Security Policy, contained on Authorized User systems or media without complying with this section. Any access to computer media/systems which contain criminal justice information including criminal history record information and other sensitive criminal justice information is subject to the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy, specifically the Security Addendum (SA). (xxxx://xxx.xxx.xxx/about- us/cjis/cjis-security-policy-resource-center) The purpose of the SA is to provide adequate security for criminal justice systems and information while under the management or control of a private entity or contractor. The SA strictly limits the authorized access to criminal justice information (including criminal history record information), limits the use of the information to the specific purposes for which it is being provided, ensures the security and confidentiality of the information consistent with applicable laws and regulations, provides for sanctions, and contains such other provisions as required by the FBI Director. The Contractor, as a condition precedent for providing Project Services for the benefit of the Authorized Users, and as evidenced by the Contractor signing this Aggregate Agreement, agrees:
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event Customer requires access to Service Use Data for its compliance with the CJIS Security Policy, Motorola must make such access available following Customer’s request. Notwithstanding the foregoing, in the event the Agreement ]or applicable Ordering Document terminates, Motorola must carry out deletion of Customer Data in compliance with Section 10 herein and may likewise delete Service Use Data within the time frame specified therein. To the extent Customer objects to deletion of its Customer Data or Service Use Data and seeks retention for a longer period, it must provide written notice to Motorola prior to expiration of the 30 day period for data retention to arrange return of the Customer Data and retention of the Service Use Data for a specified longer period of time.
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and will comply with the terms of the CJIS Security Addendum for the Term of this Agreement. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event Customer requires access to Service Use Data for its compliance with the CJIS Security Policy, Motorola will make such access available following Customer’s request. Notwithstanding the foregoing, in the event the Agreement or applicable ordering document terminates, Motorola will carry out deletion of Customer Data in compliance with Section 10 herein and may likewise delete Service Use Data within the time frame specified therein. To the extent Customer objects to deletion of its Customer Data or Service Use Data and seeks retention for a longer period, it will provide written notice to Motorola prior to expiration of the 90 day period for data retention to arrange return of the Customer Data and retention of the Service Use Data for a specified longer period of time.