CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security Sample Clauses

CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security. (a) Enrolled Affiliate appoints the CSA to perform, and will rely upon CSA’s completion of, personnel screening (i.e., background checks) for personnel in scope pursuant to Section 5.12 of the CJIS Security Policy. Enrolled Affiliate acknowledges and agrees that personnel screening determinations made by CSA are binding, and Enrolled Affiliate shall accept such decision as final. Enrolled Affiliate is responsible to confirm directly with the CSA that such personnel screening as the CSA or Enrolled Affiliate determines is required has been completed prior to initial processing of CJI Data in the Covered Services, and whenever rescreening shall be required under CJIS Security Policy. Adjudication by Enrolled Affiliate or other counties, cities, or other subdivisions or agencies of state government will not be permitted. To facilitate efficient and effective personnel screening: • The CSA will define adjudication criteria for personnel screening. • Microsoft will deliver to the CSA relevant information regarding Microsoft personnel in scope pursuant to Section 5.12 of the CJIS Security Policy. • Microsoft and the CSA will jointly define the process by which Microsoft will deliver to the CSA relevant information regarding personnel who may in the anticipated scope of their duties have logical or physical access to CJI in the Covered Services. • It is not anticipated that the CSA will deliver to Enrolled Affiliate confidential personal information pertaining to Microsoft personnel. However, if Enrolled Affiliate receives such confidential personal information it will be afforded the highest level of confidentiality available under applicable law. • If Enrolled Affiliate elects to obtain services from Microsoft in addition to the Covered Services (e.g. consulting services in connection with Enrolled Affiliates’ migration and onboarding to the Covered Services), such personnel will not be included in scope for personnel screening by the CSA unless separately agreed by Enrolled Affiliate, the CSA, and Microsoft.
AutoNDA by SimpleDocs

Related to CJIS Security Policy Section 5.12 Policy Area 12: Personnel Security

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • SUBSTANCE ABUSE POLICY 6.6.1. Labor and Management are committed to providing employees with a drug-free and alcohol-free workplace. It is the goal to protect the health and safety of employees and to promote a productive workplace, and protect the reputation of Labor and Management and the employees.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Changes to Privacy Policy Agreement The Tintstitute reserves the right to update and/or change the terms of our privacy policy, and as such we will post those change to our website homepage at xxxx://xxx.xxxxxxxxxxxxxx.xxx, so that our users and/or visitors are always aware of the type of information we collect, how it will be used, and under what circumstances, if any, we may disclose such information. If at any point in time The Tintstitute decides to make use of any personally identifiable information on file, in a manner vastly different from that which was stated when this information was initially collected, the user or users shall be promptly notified by email. Users at that time shall have the option as to whether or not to permit the use of their information in this separate manner.

  • Personnel Policy Employees of the Parties to this Agreement shall be subject to the personnel rules, laws and regulations of their respective agencies, unless they are employed temporarily by another Party to this Agreement and the authority under which such temporary employment is authorized provides that such employees shall be subject to the employing Party’s personnel laws and regulations.

  • Fair Use Policy Betty Blocks has a fair use policy in relation to accessing and using the Services. For the purpose of this fair use policy, Client may not vary from the average in a disproportionate manner, having regard to the amount of CPU power, data storage and data traffic used by Client. In such event, Betty Blocks is entitled to temporarily limit or restrict access to the Services and/or require that Client to purchase additional Services, such as extra storage capacity.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

Time is Money Join Law Insider Premium to draft better contracts faster.