CJIS Sample Clauses

CJIS. The terms and conditions of this SectionArticle VI.B. apply when Covered Data involved in a Project includes criminal justice information.
CJIS. Motorola agrees to support the Customer’s obligation to comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy and must comply with the terms of the CJIS Security Addendum for the Term of this Agreement and such CJIS Security Addendum is incorporated herein by reference. Customer hereby consents to allow Motorola “screened” personnel as defined by the CJIS Security Policy to serve as an authorized “escort” within the meaning of CJIS Security Policy for escorting unscreened Motorola personnel that require access to unencrypted Criminal Justice Information for purposes of Tier 3 support (e.g. troubleshooting or development resources). In the event Customer requires access to Service Use Data for its compliance with the CJIS Security Policy, Motorola must make such access available following Customer’s request. Notwithstanding the foregoing, in the event the Agreement or applicable Ordering Document terminates, Motorola must carry out deletion of Customer Data in compliance with Section 10 herein and may likewise delete Service Use Data within the time frame specified therein. To the extent Customer objects to deletion of its Customer Data or Service Use Data and seeks retention for a longer period, it must provide written notice to Motorola prior to expiration of the 30 day period for data retention to arrange return of the Customer Data and retention of the Service Use Data for a specified longer period of time.
CJIS. Contractor is permitted to use Criminal Justice Information (CJI) solely for the purposes of performing the services as described in the Authorized User Agreement, and for no other purpose. At no time shall the Contractor access any criminal justice information (including criminal history record information or other sensitive criminal justice information) as defined by CJIS Security Policy, contained on Authorized User systems or media without complying with this section. Any access to computer media/systems which contain criminal justice information including criminal history record information and other sensitive criminal justice information is subject to the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy, specifically the Security Addendum (SA). (xxxx://xxx.xxx.xxx/about- us/cjis/cjis-security-policy-resource-center) The purpose of the SA is to provide adequate security for criminal justice systems and information while under the management or control of a private entity or contractor. The SA strictly limits the authorized access to criminal justice information (including criminal history record information), limits the use of the information to the specific purposes for which it is being provided, ensures the security and confidentiality of the information consistent with applicable laws and regulations, provides for sanctions, and contains such other provisions as required by the FBI Director. The Contractor, as a condition precedent for providing Project Services for the benefit of the Authorized Users, and as evidenced by the Contractor signing this Aggregate Agreement, agrees:

Related to CJIS

  • Cornerstone shall notify the LLC and confirm such advice in writing (i) when the filing of any post-effective amendment to the Registration Statement or supplement to the Prospectus is required, when the same is filed and, in the case of the Registration Statement and any post-effective amendment, when the same becomes effective, (ii) of any request by the Securities and Exchange Commission for any amendment of or supplement to the Registration Statement or the Prospectus or for additional information and (iii) of the entry of any stop order suspending the effectiveness of the Registration Statement or the initiation or threatening of any proceedings for that purpose, and, if such stop order shall be entered, Cornerstone shall use its best efforts promptly to obtain the lifting thereof.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • RDDS Registration Data Directory Services refers to the collective of WHOIS and Web-­‐based WHOIS services as defined in Specification 4 of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.