CJIS Security Policy Sample Clauses

CJIS Security Policy. Motorola agrees to support DIR Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (“CJIS”) Security Policy and will comply with the terms of the CJIS Security Addendum for the term of the Addendum or Ordering Document for the applicable Product. DIR Customer hereby consents to Motorola screened personnel serving as the “escort” within the meaning of CJIS Security Policy for unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Product support and development.
AutoNDA by SimpleDocs
CJIS Security Policy. The CJIS Security Policy contains information security requirements, guidelines, and agreements reflecting the will of law enforcement and criminal justice agencies for protecting the sources, transmission, storage, and generation of Criminal Justice Information (CJI). The CJIS Security Policy integrates presidential directives, federal laws, FBI directives and the criminal justice community’s APB decisions along with nationally recognized guidance from the National Institute of Standards and Technology.
CJIS Security Policy. Section 0.
CJIS Security Policy. Described in the MCA. Section 7. VaaS Program Terms. All hardware provided by Motorola to Customer under the VaaS Program will be considered Equipment, as defined in the MCA and constitutes a purchase of Equipment subject to the terms and conditions contained therein. In addition, the following terms and conditions apply to any Equipment purchased under the VaaS Program:
CJIS Security Policy. RESPEC must follow, maintain, and adhere to all current requirements stated in the CJIS security policies and framework throughout the entire term of the Contract. The CJIS requirements can be found at xxxxx://xxx.xxx.xxx/about- us/cjis/cjis-security-policy-resource-center. RESPEC shall not allow any Employee to work on the TexasSure project until the Employee submits the following documentation and receives TDI’s approval: a) verification of CJIS security awareness training (Level 4) 1) within six (6) months of Contract Execution for existing Employees, and prior to work on the project for new Employees 2) biennially thereafter for the entire Contract Term, and 3) written documentation of the training provided to TDI within 14 calendar days of the training b) FBI fingerprint background check within 30 days of assignment c) signed and dated CJIS Security Addendum, and d) signed and dated TexasSure Non-Disclosure Agreement. TDI, in its sole discretion, may approve or disapprove of a RESPEC Employee if they have criminal activity that may prohibit them from working on the project.
CJIS Security Policy. Each CJCC Member is responsible for its own compliance with the Criminal Justice Information Services Security Policy published by the U.S. Department of Justice, Federal Bureau of Investigation (the “CJIS Policy”) and the activities to be performed by such CJCC Member in accordance with CJIS Policy. Without limiting the foregoing, each CJCC Member agrees as follows: 2.2.1. Each CJCC Member has executed, or will execute, appropriate information exchange agreements with third parties, including those agreements required by the CSA to implement the CJIS Policy. Those agreements include an Information Exchange Agreement template for the exchange of information between two criminal justice agencies, and a Management Control Agreement template for the exchange of information between a criminal justice agency and a contracted non-criminal justice entity. To properly implement the CJIS Policy, these agreements must be substantially in the form provided by the CSA, and may only be modified upon approval of all parties to the applicable agreement and the CSA. Copies of the CSA information exchange agreements are attached to Exhibit A. 2.2.2. Each CJCC Member will perform security awareness training as required by the CJIS Policy. The CJCC Members may elect to comply with such obligation by participating in MSHP training. 2.2.3. Each CJCC Member will implement appropriate audit and accountability controls with respect to their information systems that follow CJIS Policy standards. 2.2.4. Each CJCC Member will use its FBI authorized originating agency identifier (ORI) on each CJI transaction, Each agency that holds an ORI will have the responsibility to confirm compliance with the CJIS Policy with respect to its own information, including the requirement to enter into appropriate information exchange agreements with third parties. Organizations that do not have an ORI are not criminal justice agencies but can still receive CJI under certain conditions with the proper agreement in place. 2.2.5. CJCC Members may delegate one or more of the activities required by the CJIS Policy, but any delegate of such activities must comply with the CJIS Policy, and each CJCC Member will remain responsible for such compliance. The CJCC may establish acceptable mechanisms for the delegation of certain activities required by the CJIS Policy.
CJIS Security Policy. Peregrine has implemented procedures to allow for adherence to the CJIS Security Policy. The hosting facility for the Service uses state-of-the-art access control technologies that meet or exceed CJIS requirements. In addition, Peregrine has installed and configured solid network intrusion prevention appliances for adherence to CJIS requirements.
AutoNDA by SimpleDocs

Related to CJIS Security Policy

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • R&W Insurance Policy (a) Buyers have negotiated the R&W Insurance Policy. Immediately following the execution and delivery of this Agreement, Buyers shall bind coverage in respect of the R&W Insurance Policy to incept as of the execution and delivery of this Agreement and shall timely pay that portion of any premium and underwriting fee, in each case then due and payable, to the R&W Insurer to bind and incept coverage under the R&W Insurance Policy. Buyers shall take commercially reasonable action to pay the R&W Insurer the remainder of premium and all other costs required for issuance of the R&W Insurance Policy when due. Buyers shall take commercially reasonable action to execute and cause to be executed and delivered all documents attached to the R&W Insurance Policy or as otherwise may be required by the R&W Insurer in connection with: (a) binding coverage under the terms of the R&W Insurance Policy on the date of this Agreement and (b) issuing the final R&W Insurance Policy. The R&W Insurance Policy shall include a provision whereby insurer expressly irrevocably waives, and agrees not to pursue, directly or indirectly, any subrogation rights against the Sellers or any of their Affiliates or representatives with respect to any claim made by any insured thereunder unless such claims were the result of fraud prior to the Closing by any Seller or any of its Affiliates or representatives. The Sellers shall use commercially reasonable efforts to assist and cooperate with the Buyers in connection with any claim by any Buyer under, or recovery by any Buyer with respect to, the R&W Insurance Policy. Buyers shall not take affirmative action to amend the subrogation or third party beneficiary provisions contained in such R&W Insurance Policy benefiting any Seller without the consent of such Seller. (b) Notwithstanding any other provision of this Agreement, the Sellers, jointly and severally, shall reimburse and indemnify Buyers and their respective Affiliates, directors, officers, managers, members, employees and agents for any and all loss, liability, demand, claim of any kind, action, cause of action, cost, damage, fee, deficiency, tax, penalty, fine, assessment, interest or expense (including attorney’s fees, consultant fees, expert fees and any other reasonable fees including the reasonable fees, costs, charges and expenses of attorneys, accountants, brokers, consultants and/or other experts and/or other professionals in each case at their then-prevailing rates) arising out of or resulting from a breach of the representations and warranties in Article III of this Agreement up to an aggregate amount not to exceed $3,300,000.00 (being an amount representing one-half of the initial retention amount under the R&W Insurance Policy). Sellers’ obligation in this Section 10.23(b) shall remain in full force and effect until the latest of 45 days after the expiration of the R&W Insurance Policy, 60 days after all pending claims under the R&W Insurance Policy are fully and finally resolved, or the satisfaction in full of all outstanding obligations of the Sellers under this Section 10.23(b).

  • Security Plan The Business Continuity Plan and the Disaster Recovery Plan may be combined into one document. Additionally, at the beginning of each State Fiscal Year, if the MCO modifies the following documents, it must submit the revised documents and corresponding checklists for HHSC’s review and approval:

  • Credit Policy Subject to Section 6.01(h), the Borrower will not consent to Regional Management’s amendment, modification, restatement or replacement, in whole or in part, of the Credit Policy, which change could adversely affect the interests or the remedies of the Secured Parties under the Basic Documents, without the prior written consent of the Administrative Agent (acting at the direction of the Required Lenders) (and the Required Lenders shall use commercially reasonable efforts to respond to such consent request within five Business Days of their receipt thereof).

  • Security Bond The security bond provides protection to Owner if Contractor presents an acceptable guaranteed maximum price (“GMP”) to Owner but is unable to deliver the required payment and performance bonds within the time period stated below.

  • Alcohol Policy Where contractually bound, the employer will apply the Drug and Alcohol Management Program (DAMP) as contained at Appendix M.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!