CJIS Security Policy definition
Examples of CJIS Security Policy in a sentence
However, at all times, Axon will comply with its obligations pursuant to the Axon Cloud Services Terms of Use Appendix to maintain a comprehensive data security program (including compliance with the CJIS Security Policy for Criminal Justice Information), privacy program, and data governance policy, including high industry standards of de-identifying Personal Data, to enforce its security and privacy obligations for the ACEIP.
The BCA will conduct all vendor personnel screening on behalf of Agency as is required by the FBI CJIS Security Policy.
Axon will not treat Customer Data in accordance with FBI CJIS Security Policy requirements and does not agree to the CJIS Security Addendum for this engagement or any other security or privacy related commitments that have been established between Axon and Customer, such as ISO 27001 certification or SOC 2 Reporting.
The goal of this document is to augment the CJIS Security Policy to ensure adequate security is provided for criminal justice systems while (1) under the control or management of a private entity or (2) connectivity to FBI CJIS Systems has been provided to a private entity (contractor).
The Entity or Affiliate acquiring the data or system is hereby ultimately responsible for compliance with the CJIS Security Policy and will be subject to an audit by the State of Oklahoma CJIS Systems Officer (“CSO”) and the FBI CJIS Division’s Audit Staff.
The BCA will conduct all vendor personnel screening on behalf of Governmental Unit as is required by the FBI CJIS Security Policy.
The use and maintenance of all items of software or equipment offered for purchase herein must be in compliance with the most current version of the U.S. Department of Justice, Federal Bureau of Investigation (“FBI”), Criminal Justice Information Services (CJIS) Division’s CJIS Security Policy (“CJIS Security Policy” or “Security Policy” herein).
CJIS SECURITY POLICY REQUIREMENTS GENERALLY The CJIS Security Policy outlines a number of administrative, procedural, and technical controls agencies must have in place to protect Criminal Justice Information (“CJI”).
A Criminal Justice Agency (“CJA”) and certain other governmental agencies procuring technology equipment and services that could be used in hosting or connecting or transmitting or receiving CJI data may need to use the check list herein to make sure that the software, equipment, location, security, and persons having the ability to access CJI will meet the CJIS requirements per the then current CJIS Security Policy.
In the event that any action, suit or proceeding shall be brought against the Trustee or any of its officers, directors, employees or agents (each, a “Trustee Indemnitee”), it shall notify the Master Servicer of the commencement thereof and the Trustee Indemnitee shall have the right to employ its own counsel in any such action at the expense of the Master Servicer.