CJIS Sample Clauses

CJIS. The terms and conditions of this Article VI.B. apply when Covered Data involved in a Project includes criminal justice information.
AutoNDA by SimpleDocs
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event Customer requires access to Service Use Data for its compliance with the CJIS Security Policy, Motorola must make such access available following Customer’s request. Notwithstanding the foregoing, in the event the Agreement or applicable Ordering Document terminates, Motorola must carry out deletion of Customer Data in compliance with Section 10 herein and may likewise delete Service Use Data within the time frame specified therein. To the extent Customer objects to deletion of its Customer Data or Service Use Data and seeks retention for a longer period, it must provide written notice to Motorola prior to expiration of the 30 day period for data retention to arrange return of the Customer Data and retention of the Service Use Data for a specified longer period of time.
CJIS. Contractor is permitted to use Criminal Justice Information (CJI) solely for the purposes of performing the services as described in the Authorized User Agreement, and for no other purpose. At no time shall the Contractor access any criminal justice information (including criminal history record information or other sensitive criminal justice information) as defined by CJIS Security Policy, contained on Authorized User systems or media without complying with this section. Any access to computer media/systems which contain criminal justice information including criminal history record information and other sensitive criminal justice information is subject to the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy, specifically the Security Addendum (SA). (xxxx://xxx.xxx.xxx/about- us/cjis/cjis-security-policy-resource-center) The purpose of the SA is to provide adequate security for criminal justice systems and information while under the management or control of a private entity or contractor. The SA strictly limits the authorized access to criminal justice information (including criminal history record information), limits the use of the information to the specific purposes for which it is being provided, ensures the security and confidentiality of the information consistent with applicable laws and regulations, provides for sanctions, and contains such other provisions as required by the FBI Director. The Contractor, as a condition precedent for providing Project Services for the benefit of the Authorized Users, and as evidenced by the Contractor signing this Aggregate Agreement, agrees:
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event Customer requires access to Service Use Data for its compliance with the CJIS Security Policy, Motorola must make such access available following Customer’s request. Notwithstanding the foregoing, in the event the MCA or applicable Ordering Document terminates, Motorola must carry out deletion of Customer Data in compliance with Section 10 herein and may likewise delete Service Use Data within the time frame specified therein. To the extent Customer objects to deletion of its Customer Data or Service Use Data and seeks retention for a longer period, it must provide written notice to Motorola prior to expiration of the 30 day period for data retention to arrange return of the Customer Data and retention of the Service Use Data for a specified longer period of time.

Related to CJIS

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Přetrvávající platnost Tento odstavec 1.3 “Zdravotní záznamy a Studijní data a údaje” zůstane závazný i v případě zániku platnosti či vypršení platnosti této Smlouvy.

  • Summer School SUCCESS employees are not eligible for this provision. Employees engaged in teaching summer school shall be granted two summer school days of absence in a single term for either sick leave or emergency leave, or a combination of both, non-accumulative.

  • Cardiff Capital Region has secured a deal worth £1.2 billion. Over its lifetime, local partners expect the City Deal to deliver up to 25,000 new jobs and leverage an additional £4 billion of private sector investment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!