CJIS Compliance Sample Clauses

CJIS Compliance. Xxxxxxxxx maintains policies and procedures for securely storing, handling, and transmitting data. By default, Peregrine encrypts all data both in transit and at rest in accordance with CJIS standards. The Peregrine system adheres to FIPS 140-2 cryptographic standards along with all the underlying cryptographic modules as mandated by the AWS government cloud platform. Encryption key management uses FIPS 140-2 security modules with 256-bit strength and follows password policies outlined in the CJIS security policy. The Peregrine system isolates boundaries using techniques such as security groups, policies, access controls, network firewalls, ACLs, intrusion systems, and IPSec within its virtual private cloud (VPC). Monitoring and controls are in place to ensure that any connections or data transmissions are through authorized mediums. Public and private networks are allocated to ensure that unauthorized access is restricted. The cloud infrastructure uses server-side encryption for both blob and block storage to provide an additional layer of protection.
AutoNDA by SimpleDocs
CJIS Compliance. Customer is responsible for its own adherence to the FBI Criminal Justice Information Services (CJIS) Security Policy, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) (to the extent applicable) and any other applicable security and privacy laws and regulations. Motorola will reasonably cooperate with Customer in connection therewith. Section 6: SAA and Support Contact Requirements
CJIS Compliance. This agreement incorporates by reference the requirements of the most current version of the Criminal Justice Information Services Security Policy (see “Appendix H”) issued by the Federal Bureau of Investigation, Criminal Justice Information Services Division, as in force as of the date of this Agreement and as may, from time to time hereafter, be amended. CrossWind Technologies, Inc. warrants that it has the technological capability to handle Criminal Justice Information, as that term is defined by the CJIS Policy, in the manner required by the Policy. Agency shall ensure, and hereby warrants, that it and all persons it authorizes to access or use the Services or Law Enforcement Data will comply with the Policy, maintain the confidentiality and integrity of the Law Enforcement Data, and will not take any steps to access, interfere with, jeopardize the confidentiality or integrity of the Valcour services.
CJIS Compliance. Please provide a statement that confirms the Vendor shall provide an ALPR System that shall adhere to all guidelines set forth by the Criminal Justice Information Services (“CJIS”) Agency. These guidelines were established by the U.S. Department of Justice, Federal Bureau of Investigation and can be found utilizing the following link: xxxxx://xxx.xxx.xxx/services/cjis/cjis-security-policy-resource-center. This shall include all data in transit and at rest.
CJIS Compliance. Contractor represents and warrants that Contractor shall exercise commercially reasonable efforts to comply with the Criminal Justice Information Services Security Policy for Purchasers that collect, process, store, and/or share CJIS data.

Related to CJIS Compliance

  • FERPA Compliance In connection with all FERPA Records that Contractor may create, receive or maintain on behalf of University pursuant to the Underlying Agreement, Contractor is designated as a University Official with a legitimate educational interest in and with respect to such FERPA Records, only to the extent to which Contractor (a) is required to create, receive or maintain FERPA Records to carry out the Underlying Agreement, and (b) understands and agrees to all of the following terms and conditions without reservation:

  • PCI Compliance A. The Acquiring Bank will provide The Merchant with appropriate training on PCI PED and/or DSS rules and regulations in respect of The Merchants obligations. Initial training will be provided and at appropriate intervals as and when relevant changes are made to such rules and regulations.

  • HIPAA Compliance If this Contract involves services, activities or products subject to the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Contractor covenants that it will appropriately safeguard Protected Health Information (defined in 45 CFR 160.103), and agrees that it is subject to, and shall comply with, the provisions of 45 CFR 164 Subpart E regarding use and disclosure of Protected Health Information.

  • Standards Compliance DNS. Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn--ndk061n”).

Time is Money Join Law Insider Premium to draft better contracts faster.