Criminal Justice Information Services Security Policy Sample Clauses

Criminal Justice Information Services Security Policy. As a service to the courts and as a precaution, council’s staff have implemented a policy of conducting CLETS-level background checks for any of its contractors who would be working in Restricted Areas.2 The council’s Executive Office delegated to EPSCU oversight of background checks for non-council employees working under contract with the council in Restricted Areas. EPSCU worked with the CA DOJ and several council offices to define Restricted Areas, establish a procedure for providing related services, and identify the evaluation criteria that are listed in this policy. WHAT IS THE APPLICATION PROCESS? Council staff are responsible for requesting EPSCU’s services when needed. As part of the initial set‑up process, they will be required to provide EPSCU the following: A project code for chargeback of CA DOJ billing costs; A designated council contact or Contractor contact; and A designated council authorizer (ideally a manager or supervisor). EPSCU and the council’s Human Resources (HR) office share a single Originating Agency Identifier (ORI) number. HR receives the CA DOJ invoices and uses the project code that council staff provide to do chargebacks for the cost of the Contractor background checks. EPSCU will send the EPSCU program procedure to the designated council contact and Contractor contact, as applicable. The council contact and Contractor contact are responsible for explaining the restrictions to the “Applicants.” They are also responsible for providing EPSCU with the following: A background check authorization signed by the Applicant; A completed badge form, authorized by the council authorizer; and A digital photograph of the Applicant that meets the requirements on the badge form. EPSCU will send the council contact or Contractor contact an “Applicant Packet” with the appropriate instructions and forms. The forms are prefilled with the council routing and billing information. The council contact or the Contractor contact gives the Applicant the paperwork so he or she can be fingerprinted. The Applicant should fingerprint within two weeks. It usually takes two weeks to three months for the CA DOJ to provide the background check results. Delays sometimes occur due to poor fingerprint quality, criminal information hits, or erroneous information submitted on the fingerprint transaction. EPSCU will provide the council contact and Contractor contact with information about how Applicants can check the status of their submissions with the CA DOJ. ...
AutoNDA by SimpleDocs
Criminal Justice Information Services Security Policy. As a service to the courts and as a precaution, council’s staff have implemented a policy of conducting CLETS-level background checks for any of its contractors who would be working in Restricted Areas.2 The council’s Executive Office delegated to EPSCU oversight of background checks for non-council employees working under contract with the council in Restricted Areas. EPSCU worked with the CA DOJ and several council offices to define Restricted Areas, establish a procedure for providing related services, and identify the evaluation criteria that are listed in this policy.
Criminal Justice Information Services Security Policy. 1 Depending on the type and location of their work, contractors may be subject to additional requirements, which will be specified by the Judicial Council’s Agency CLETS Coordinator (ACC) who can be reached at Xxxxxx.Xxxx@xxx.xx.

Related to Criminal Justice Information Services Security Policy

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • EDD Independent Contractor Reporting Requirements Effective January 1, 2001, the County of Orange is required to file in accordance with subdivision (a) of Section 6041A of the Internal Revenue Code for services received from a “service provider” to whom the County pays $600 or more or with whom the County enters into a contract for $600 or more within a single calendar year. The purpose of this reporting requirement is to increase child support collection by helping to locate parents who are delinquent in their child support obligations. The term “service provider” is defined in California Unemployment Insurance Code Section 1088.8, subparagraph B.2 as “an individual who is not an employee of the service recipient for California purposes and who received compensation or executes a contract for services performed for that service recipient within or without the state.” The term is further defined by the California Employment Development Department to refer specifically to independent Contractors. An independent Contractor is defined as “an individual who is not an employee of the ... government entity for California purposes and who receives compensation or executes a contract for services performed for that ... government entity either in or outside of California.” The reporting requirement does not apply to corporations, general partnerships, limited liability partnerships, and limited liability companies. Additional information on this reporting requirement can be found at the California Employment Development Department web site located at xxxx://xxx.xxx.xx.xxx/Employer_Services.htm

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Contractor Responsibility and Debarment 14.1 A responsible contractor is a contractor who has demonstrated the attribute of trustworthiness, as well as quality, fitness, capacity and experience to satisfactorily perform the contract. It is the COUNTY’s policy to conduct business only with responsible contractors.

  • Confidentiality and Data Protection 12.1 Buyer undertakes that it shall not at any time disclose to any person any confidential information concerning (i) the business, affairs, customers, clients or suppliers of Seller or any of its affiliates and (ii) the operations, processes, product information, recipes and formulae, know-how, designs, trade secrets of Seller or any of its affiliates, except as permitted by Condition 12.2 (“Confidential Information”).

Time is Money Join Law Insider Premium to draft better contracts faster.