CJIS Security Policy Sample Clauses

CJIS Security Policy. Motorola agrees to support DIR Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (“CJIS”) Security Policy and will comply with the terms of the CJIS Security Addendum for the term of the Addendum or Ordering Document for the applicable Product. DIR Customer hereby consents to Motorola screened personnel serving as the “escort” within the meaning of CJIS Security Policy for unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Product support and development.
AutoNDA by SimpleDocs
CJIS Security Policy. The CJIS Security Policy contains information security requirements, guidelines, and agreements reflecting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The CJIS Security Policy integrates presidential directives, federal laws, FBI directives and the criminal justice community’s APB decisions along with nationally recognized guidance from the National Institute of Standards and Technology. CJIS Systems Agency (CSA) — A duly authorized, state, federal, international, tribal, or territorial criminal justice agency on the CJIS network providing statewide (or equivalent) service to its criminal justice users with respect to the CJI from various systems managed by the FBI CJIS Division. the LSP is the CSA for Louisiana Criminal Justice Agency (CJA) — The courts, a governmental agency, or any subunit of a governmental agency which performs the administration of criminal justice pursuant to a statute or executive order and which allocates a substantial part of its annual budget to the administration of criminal justice. State and Federal Inspectors General Offices are included.
CJIS Security Policy. Each CJCC Member is responsible for its own compliance with the Criminal Justice Information Services Security Policy published by the U.S. Department of Justice, Federal Bureau of Investigation (the “CJIS Policy”) and the activities to be performed by such CJCC Member in accordance with CJIS Policy. Without limiting the foregoing, each CJCC Member agrees as follows:
CJIS Security Policy. Peregrine has implemented procedures to allow for adherence to the CJIS Security Policy. The hosting facility for the Service uses state-of-the-art access control technologies that meet or exceed CJIS requirements. In addition, Peregrine has installed and configured solid network intrusion prevention appliances for adherence to CJIS requirements.
CJIS Security Policy. Section 0.0.0.0: State and Federal Agency User Agreements Microsoft shall design, test and operate the Covered Services to ensure they are free of common security vulnerabilities. Microsoft shall regularly conduct penetration testing to evaluate the security controls at the application, host, and networks layers used to provide the Covered Services. Microsoft shall take commercially reasonable steps to remediate significant weaknesses discovered. Assessment of penetration testing will be done by independent third party auditors and included in the scope of audit relevant to Covered Service certification or accreditation. Neither CSA nor Enrolled Affiliate may conduct penetration testing on such Covered Services. Microsoft agrees to provide the CSA with reports summarizing the test results and status of corrective actions arising from all penetration testing and vulnerability assessments performed by Microsoft and its third party auditors and agents.
CJIS Security Policy. RESPEC must follow, maintain, and adhere to all current requirements stated in the CJIS security policies and framework throughout the entire term of the Contract. The CJIS requirements can be found at xxxxx://xxx.xxx.xxx/about- us/cjis/cjis-security-policy-resource-center. RESPEC shall not allow any Employee to work on the TexasSure project until the Employee submits the following documentation and receives TDI’s approval:

Related to CJIS Security Policy

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • City Policy THE CITY OPPOSES DISCRIMINATION ON THE BASIS OF RACE AND SEX AND URGES ALL OF ITS CONTRACTORS TO PROVIDE A FAIR OPPORTUNITY FOR MINORITIES AND WOMEN TO PARTICIPATE IN THEIR WORK FORCE AND AS SUBCONTRACTORS AND VENDORS UNDER CITY CONTRACTS.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Security Provisions Order 1600.72A, Contractor and Industrial Security Program applies to all Contractors, subcontractors, consultants, or any other persons (not visitors) who have access to FAA facilities, sensitive unclassified information, and resources. See Security Guidelines (Attachment J-9) for more details. The Government will update the document periodically to reflect the current FAA security policy. The Government designates all eFAST labor categories as enumerated in Attachment J-3 as low risk for the Risk/Sensitivity Level. Program office CORs will review labor category designations and indicate changes to the contractually designated default Risk/Sensitivity Level Designations as appropriate for their specific contracts or task orders. This would require a submission of a “Contractor Position Risk/Sensitivity Level Designation Record” form (FAA Form 1600-77).

  • Pet Policy 🞎 Pets are prohibited 🞎 Up to pets are permitted The following pet requirements apply [insert requirements including type, size and quantity,ifapplicable: ] The above-described pet policy is a material provision of this Lease. Violation of the pet policy may lead to damages, deposit, and/or fees or additional rent assessed to Tenant and constitutes a default under this Lease.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

Time is Money Join Law Insider Premium to draft better contracts faster.