CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security Sample Clauses

CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security. (a) Enrolled Affiliate appoints the CSA to perform, and will rely upon CSA’s completion of, personnel screening (i.e., background checks) for personnel in scope pursuant to Section 5.12 of the CJIS Security Policy. Enrolled Affiliate acknowledges and agrees that personnel screening determinations made by CSA are binding, and Enrolled Affiliate shall accept such decision as final. Enrolled Affiliate is responsible to confirm directly with the CSA that such personnel screening as the CSA or Enrolled Affiliate determines is required has been completed prior to initial processing of CJI Data in the Covered Services, and whenever rescreening shall be required under CJIS Security Policy. Adjudication by Enrolled Affiliate or other counties, cities, or other subdivisions or agencies of state government will not be permitted. To facilitate efficient and effective personnel screening: • The CSA will define adjudication criteria for personnel screening. • Microsoft will deliver to the CSA relevant information regarding Microsoft personnel in scope pursuant to Section 5.12 of the CJIS Security Policy. • Microsoft and the CSA will jointly define the process by which Microsoft will deliver to the CSA relevant information regarding personnel who may in the anticipated scope of their duties have logical or physical access to CJI in the Covered Services. • It is not anticipated that the CSA will deliver to Enrolled Affiliate confidential personal information pertaining to Microsoft personnel. However, if Enrolled Affiliate receives such confidential personal information it will be afforded the highest level of confidentiality available under applicable law. • If Enrolled Affiliate elects to obtain services from Microsoft in addition to the Covered Services (e.g. consulting services in connection with Enrolled Affiliates’ migration and onboarding to the Covered Services), such personnel will not be included in scope for personnel screening by the CSA unless separately agreed by Enrolled Affiliate, the CSA, and Microsoft. (b) In the event the CSA approves a process under which a federal law enforcement agency or other suitable body conducts screening of personnel who have access to Customer Data in the Covered Services compliant with requirements of the CJIS Security Policy in lieu of CSA- conducted screening, Enrolled Affiliate will abide by the CSA’s approval of personnel screening being conducted in this manner.
AutoNDA by SimpleDocs

Related to CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Standard Hazard and Flood Insurance Policies For each Mortgage Loan (other than a Cooperative Loan), the Master Servicer shall maintain, or cause to be maintained by each Servicer, standard fire and casualty insurance and, where applicable, flood insurance, all in accordance with the provisions of this Agreement and the related Servicing Agreement, as applicable. It is understood and agreed that such insurance shall be with insurers meeting the eligibility requirements set forth in the applicable Servicing Agreement and that no earthquake or other additional insurance is to be required of any Mortgagor or to be maintained on property acquired in respect of a defaulted loan, other than pursuant to such applicable laws and regulations as shall at any time be in force and as shall require such additional insurance. Pursuant to Section 4.01, any amounts collected by the Master Servicer, or by any Servicer, under any insurance policies maintained pursuant to this Section 9.16 or any Servicing Agreement (other than amounts to be applied to the restoration or repair of the property subject to the related Mortgage or released to the Mortgagor in accordance with the applicable Servicing Agreement) shall be deposited into the Collection Account, subject to withdrawal pursuant to Section 4.02. Any cost incurred by the Master Servicer or any Servicer in maintaining any such insurance if the Mortgagor defaults in its obligation to do so shall be added to the amount owing under the Mortgage Loan where the terms of the Mortgage Loan so permit; provided, however, that the addition of any such cost shall not be taken into account for purposes of calculating the distributions to be made to Certificateholders and shall be recoverable by the Master Servicer or such Servicer pursuant to Section 4.02.

  • SUBSTANCE ABUSE POLICY See applicable administrative policy.

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Changes to Privacy Policy Agreement Passive Plus, Inc. reserves the right to update and/or change the terms of our privacy policy, and as such we will post those change to our website homepage at xxx.xxxxxxxxxxx.xxx, so that our users and/or visitors are always aware of the type of information we collect, how it will be used, and under what circumstances, if any, we may disclose such information. If at any point in time Passive Plus, Inc. decides to make use of any personally identifiable information on file, in a manner vastly different from that which was stated when this information was initially collected, the user or users shall be promptly notified by email. Users at that time shall have the option as to whether or not to permit the use of their information in this separate manner.

  • Standard Hazard Insurance and Flood Insurance Policies (a) For each Mortgage Loan, the Master Servicer shall enforce any obligation of the Servicers under the related Servicing Agreements to maintain or cause to be maintained standard fire and casualty insurance and, where applicable, flood insurance, all in accordance with the provisions of the related Servicing Agreements. It is understood and agreed that such insurance shall be with insurers meeting the eligibility requirements set forth in the applicable Servicing Agreement and that no earthquake or other additional insurance is to be required of any Mortgagor or to be maintained on property acquired in respect of a defaulted loan, other than pursuant to such applicable laws and regulations as shall at any time be in force and as shall require such additional insurance. (b) Pursuant to Section 4.01 and 4.02, any amounts collected by the Servicers or the Master Servicer, or by any Servicer, under any insurance policies (other than amounts to be applied to the restoration or repair of the property subject to the related Mortgage or released to the Mortgagor in accordance with the applicable Servicing Agreement) shall be deposited into the Master Servicer Collection Account, subject to withdrawal pursuant to Section 4.02 and 4.03. Any cost incurred by the Master Servicer or any Servicer in maintaining any such insurance if the Mortgagor defaults in its obligation to do so shall be added to the amount owing under the Mortgage Loan where the terms of the Mortgage Loan so permit; provided, however, that the addition of any such cost shall not be taken into account for purposes of calculating the distributions to be made to Certificateholders and shall be recoverable by the Master Servicer or such Servicer pursuant to Section 4.02 and 4.03.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • NMHS Governance, Safety and Quality Requirements 2.1 Participates in the maintenance of a safe work environment. 2.2 Participates in an annual performance development review. 2.3 Supports the delivery of safe patient care and the consumers’ experience including participation in continuous quality improvement activities in accordance with the requirements of the National Safety and Quality Health Service Standards and other recognised health standards. 2.4 Completes mandatory training (including safety and quality training) as relevant to role. 2.5 Performs duties in accordance with Government, WA Health, North Metropolitan Health Service and Departmental / Program specific policies and procedures. 2.6 Abides by the WA Health Code of Conduct, Occupational Safety and Health legislation, the Disability Services Act and the Equal Opportunity Act.

  • Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!