Criminal Justice Information System (CJIS) Vendor Policy Guidelines
|
|
|
- Sarah Dawson
- 10 years ago
- Views:
Transcription
1 Criminal Justice Information System (CJIS) Vendor Policy Guidelines Last Updated: 08/17/2015 Massachusetts Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200 Chelsea, MA Tel : Fax: Web: www.
2 CJIS VENDOR POLICY GUIDELINES... 3 ABOUT THIS DOCUMENT... 3 OVERVIEW... 3 STEPS TO BECOME A CJIS-APPROVED VENDOR... 3 ONGOING RESPONSIBILITIES FOR APPROVED VENDORS ADDITIONAL SUPPORTING MATERIALS REVISION HISTORY DCJIS CJIS Vendor Policy Guidelines Page 2 of 14
3 CJIS Vendor Policy Guidelines About this Document The purpose of this document is to establish guidelines for vendors and law enforcement/criminal justice agencies who wish to propose the use of hardware equipment and/or software on the Criminal Justice Information System (CJIS) network. This includes agencies who wish to exchange criminal justice information via the CJIS Broker. It also includes guidelines for the ongoing use and maintenance of approved hardware equipment and/or software on the CJIS network. Overview The Department of Criminal Justice Information Services (DCJIS) is charged by Massachusetts General Laws chapter 6, 168 with the responsibility of providing for and exercising control over the installation, operation, and maintenance of data processing and data communications systems referred to by said statute as the criminal offender record information system. This system is commonly known as the Criminal Justice Information System or CJIS. The DCJIS is further charged with designing the CJIS to ensure the prompt collection, exchange, dissemination, and distribution of information as may be necessary for the efficient administration and operation of criminal justice agencies, as well as for connecting with similar systems in this or other states. CONNECTING TO THE CJIS NETWORK The DCJIS recognizes that there may be instances where functionality desired by members of our user community is not, or cannot, be provided by standard, previously approved hardware or software. It is the purpose of these guidelines to provide a structure within which the staff of the DCJIS will work with agencies and their vendors to evaluate new types of hardware and software that the user community is interested in obtaining, but which deviate from currently approved and utilized technologies. Only technologies approved by the DCJIS may be connected to the CJIS network. Said technologies and associated maintenance services may only be purchased from vendors approved by the DCJIS. The DCJIS will evaluate proposals for new hardware and/or software when: A criminal justice agency has expressed interest in the technologies proposed by a vendor, and The DCJIS believes that the benefits of the proposed technologies would be of interest to one or more criminal justice agencies. A major consideration for the DCJIS in modifying the CJIS, or any of its components, is the security and integrity of the system. The CJIS Vendor Policy Guidelines are designed to optimize the DCJIS control of the system and to articulate the consequences if the system is compromised in any way. Steps to Become a CJIS-Approved Vendor The following diagram summarizes the process for vendors to become approved to provide hardware, software, and/or services on the CJIS network. Immediately following the diagram is additional information about each step in the process. DCJIS CJIS Vendor Policy Guidelines Page 3 of 14
4 Figure 1 Vendor Approval Process DCJIS CJIS Vendor Policy Guidelines Page 4 of 14
5 1. Submit Agency Letter and Proposed Scope Template (Agency/Vendor): The process begins when a criminal justice agency, such as a law enforcement agency, identifies a business need to connect new hardware and/or software to the CJIS network. The criminal justice agency summarizes its support in writing to the DCJIS. The agency support letter must: Describe what CJIS functionality is be being requested and why Be signed by the Police Chief or Agency Head Be submitted to the DCJIS in conjunction with the Proposed Scope of Services. Once signed by the Police Chief/Agency Head, the Agency Letter must be scanned and ed along with the completed Proposed Scope template to [email protected]. If submitting the Agency Letter and Proposed Scope template via is not possible, they should be mailed to the following: Massachusetts Department of Criminal Justice Information Services ATTN: CJIS Support Services 200 Arlington Street, Suite 2200 Chelsea, MA Note: If the proposal is for multiple different criminal justice agencies (e.g., multiple police departments) to use the proposed functionality, a joint letter of support must be provided. The joint letter of support must be signed by the Chief/Agency Head of each participating agency. Along with the letter of support, the agency and its selected vendor must provide a proposal of the scope of the technology to be implemented using the CJIS Vendor Proposed Scope template available at. The scope template includes sections for: Contact Information For the agency(ies) and its vendor organization. This includes a key contact person from each participating agency and from the vendor assigned to work with the DCJIS on the evaluation of the proposed scope. Proposed Functionality A detailed description of the proposed hardware, software, and/or services to be provided to the end user community. This information is critical to the DCJIS understanding what CJIS functionality will be available to the criminal justice agency(ies) at the completion of the process. Should the scope proposal be approved for development, the proposed functionality will also be used by the DCJIS to design demonstration test scripts. o o CJIS Transactions For agencies/vendors proposing software/services that utilize one or more of the CJIS transactions available via the CJIS Broker, the agency/vendor must select which transactions are proposed to be implemented from the functionality checklist. See the CJIS Broker Documentation available at for additional information on CJIS transactions. Hardware Location and Specifications For agencies/vendors proposing hardware equipment, the agency/vendor must provide information about the intended DCJIS CJIS Vendor Policy Guidelines Page 5 of 14
6 hardware location, including whether the hardware will be fixed (e.g., installed in a car or a police station) or mobile (e.g., mobile tablet). Agencies/vendors also need to provide the specifications for the equipment to be connected, including proposed configurations. Finally, if the hardware will not be fixed in a secure location as defined in the latest version of the FBI CJIS Security Policy, the agency/vendor must describe how they intend to meet the authentication, encryption, and management requirements of the CJIS Security Policy. o Envisioned Benefits A written narrative describing the envisioned benefits to the end user community of the proposed hardware, software, and/or services. Security Approach Specific details about the proposed methods to comply with the CJIS security requirements and to maintain a high level of security within the network at all times. The security approach will vary based on the proposed hardware, software, and/or services (e.g., ipad versus Windows encryption). Testing Approach A detailed description of how the agency/vendor proposes to test the hardware, software, and/or services within the CJIS network including: o o Test Sites: The proposed agency site(s) for testing. The DCJIS will determine whether or not a site is an agreed upon test site based in part on that site's compliance with DCJIS and FBI regulations and policies, as well as on that site's history of working with the DCJIS. Uninterrupted Access: The plan for ensuring the agency has uninterrupted access to the production CJIS environment during all testing activities. Maintenance Approach A written explanation of how the vendor intends to ensure the long-term viability of the proposed hardware, software, and/or services. This includes a description of how the vendor will provide maintenance services on anything connected to the CJIS network. Maintenance services are required for compliance with DCJIS policies. The agency letter and proposed scope template must be submitted electronically via to the DCJIS. See the CJIS Vendor Proposed Scope template available at for additional information and submission instructions. 2. Evaluate Proposed Scope and Communicate Decision (DCJIS): Upon receiving the letter of agency support and the accompanying proposed scope template, the DCJIS will evaluate the scope proposal and make a determination as to whether or not the agency/vendor is approved to proceed with development and testing activities. If the DCJIS has any questions about the proposal or requires any additional information to make its decision, it will reach out to the contacts specified. Once the DCJIS has made an evaluation decision, it will inform the agency and vendor in writing via of its decision using the contact information specified. Approve: If the decision is to approve the proposal for development/testing, the DCJIS will also notify the Executive Office of Public Safety and Security's Office of Technology DCJIS CJIS Vendor Policy Guidelines Page 6 of 14
7 and Information Services (OTIS) of the approval decision. The DCJIS will provide the agency/vendor with information for individuals at OTIS to contact to establish connectivity to the test CJIS environment. In addition, the DCJIS will designate a primary contact person to work with the agency/vendor and OTIS to provide assistance when required, to conduct spot audits of the vendor's pre-implementation use of the system, and to report on the progress of the implementation. Do Not Approve: If the decision is to deny the proposal, the DCIJS will notify the agency/vendor as to why the proposal was denied. Please note, the Commissioner/designee of the DCJIS reserves the right to deny or delay the processing of requests under these guidelines based upon technical staff availability or in consideration of other priorities within the DCJIS. 3. Ensure Vendor Compliance with CJIS Standards (Agency/Vendor and DCJIS): If the DCJIS approves the proposal for development/testing, it will initiate the process for clearing vendor personnel for access to CJIS and agency systems. This includes both initial vendor personnel and personnel changes over time. Prior to those persons having access to any agency or CJIS system or data, the DCJIS will require the following from the vendor and its personnel: Signed Authorization Agreements: In accordance with 803 C.M.R. 3.02(3), all vendor personnel who will be working on the proposed project must complete and sign the Individual Agreement of Non-Disclosure (AOND). The criminal justice agency will ensure compliance with this requirement, will keep completed AOND forms on file, and will provide them to DCJIS personnel upon request. In addition, the vendor must execute the Vendor Agreement of Non-Disclosure. This agreement is signed on behalf of the vendor and must be provide along with any Individual AONDs. FBI CJIS Security Addendum: Vendor personnel will be required to execute the FBI CJIS Security Addendum. The criminal justice agency will ensure compliance with this requirement, will keep completed forms on file, and will provide them to DCJIS personnel upon request. Fingerprint-Supported Criminal Record Checks: The DCJIS will fingerprint all vendor personnel who will work on the project and conduct state, national, and state-of-residence fingerprint-supported criminal record checks. Fingerprints will be taken at the DCJIS location in Chelsea Massachusetts. The DCJIS will make a suitability decision on each individual based upon the results of these checks. Fingerprint-supported criminal record checks will be conducted annually for each person who continues to work on the project. See the Annual Reporting Requirements section for additional information. DCJIS CJIS Vendor Policy Guidelines Page 7 of 14
8 CJIS Security Awareness Training: All vendor personnel must complete the CJIS Security Awareness Training. Testing will be conducted via the CJISonline.com security awareness testing tool. Note: Any individual who has a current certification that he/she obtained using the CJISonline.com tool will not be required to be recertified until his/her current certification expires. Vendor Personnel List: The criminal justice agency must maintain an up-to-date list of all vendor personnel working with the agency on the project, including initial personnel and changes over time. At a minimum, this must include the person s name, state of residence, the date he/she started on the project, the date he/she signed the security agreement and individual disclosure agreement, the date fingerprinted, the date of last background record check/result, the date he/she successfully completed the CJIS security training, and the date he/she left the project (if applicable). The criminal justice agency must also maintain a list of vendor personnel who requested but were denied access and why. The agency must be prepared to provide this information to the DCJIS before demonstration testing, annually, and upon request. See the Vendor Personnel template available at for additional information. 4. Establish Connectivity to the Test CJIS Environment (Agency/Vendor and OTIS) When ready to begin development and testing activities, the agency/vendor must reach out to the OTIS contacts provided to establish connectivity to a CJIS test environment at the test site(s) specified. OTIS and the agency/vendor will work closely to establish technical connectivity. The following items must be completed: What Who Comments 1. Send the VPN User Application to OTIS (if needed) 2. Establish VPN access (if needed) 3. Provide CJIS Broker Connection and Transaction Specific Information (if needed) Agency/Vendor OTIS OTIS Used if the vendor requires external access independent of the agency for which the vendor is providing services. The Virtual Private Network (VPN) User Application form can be found on. OTIS will create a VPN account. Accounts are typically created within 10 business days after approval. For those approved to implement CJIS transactions, OTIS will collect and provide the information required to connect to the test CJIS Broker environment including: Test Server IP Web Server URL Access to CJIS Broker WSDL OTIS will also provide access to any additional technical documentation available for the specific CJIS DCJIS CJIS Vendor Policy Guidelines Page 8 of 14
9 What Who Comments transactions the agency/vendor has been approved to develop, such as sample XML schemas. The content of the information will vary by transaction and should supplement the Broker Documentation available on. 4. CJIS Broker Authorization Form to OTIS (if needed) 5. Complete server configurations Agency/Vendor OTIS Used to request authorization to access the CJIS Broker web service via the CJIS network. Information provided by the agency/vendor on this form will be used by the Commonwealth to authenticate and authorize requests and responses to and from the CJIS Broker. The CJIS Broker Authorization Form is available on OTIS will make any server configurations necessary to support connectivity based on the information provided. This may include coordinating with MassIT regarding any required firewall changes. 5. Complete Internal Development/Testing (Agency/Vendor): Once able to access the test CJIS environment, the agency/vendor will complete their internal development and testing activities using the approach described in the approved scope proposal. 6. Request Demonstration Test from the DCJIS (Agency/Vendor): When an agency/vendor has completed its internal testing and is confident that it is production ready, they should contact the DCJIS to schedule a demonstration test. The agency/vendor must their CJIS demonstration test request to the DCJIS at [email protected]. The subject of the should be "Request for DCJIS Demonstration Test" and the must include a certification that the agency/vendor is in compliance with DCJIS and FBI security standards and policies, which will initially be evaluated during the testing phase and monitored on an ongoing basis. 7. Conduct Demonstration Test and Communicate Decision (DCJIS and Agency/Vendor): Upon receiving a CJIS demonstration test request , the DCJIS will reach out to the vendor contact identified to schedule a time to demonstrate the approved functionality. The DCJIS will provide specific guidelines for system use during all testing. This may involve the use of test or restricted network addresses or physical locations, during which time the DCJIS may monitor the activities of the vendor to ensure compliance with the approved scope. DCJIS CJIS Vendor Policy Guidelines Page 9 of 14
10 A full demonstration of the system is expected and appropriate DCJIS staff will make a determination of the system's full compliance with the approved scope. The DCJIS will prepare a series of test scripts the agency/vendor will be asked to demonstrate based on the specific functionality and sites for which they were approved. Upon completion of the demonstration test, the DCJIS will make a determination as to whether or not the system complies with DCJIS and FBI standards and policies and that it functions properly in the current technology environments. The DCJIS will notify the agency/vendor in writing of the results including: Pass: If an agency/vendor is found to be in compliance, the DCJIS will also notify the Executive Office of Public Safety and Security's Office of Technology and Information Services DCJIS & FBI Security Standards (OTIS) that the agency/vendor is approved to connect to the production CJIS environment for the approved scope. Do Not Pass: If the agency/vendor fails to demonstrate the ability of the hardware/software to satisfy the functionality contained in the scope proposal, the DCJIS will work with the agency/vendor to identify the problem areas. The agency/vendor will be given an opportunity to continue testing in accordance with the provisions of this section for the purpose of bringing the system into full compliance. The agency/vendor may then request an additional demonstration as outlined in step 6 Request Demonstration Test from the DCJIS. The DCJIS will conduct a maximum of two (2) demonstration visits for the purpose of determining full compliance. After two failed attempts, further evaluation will be at the discretion of the DCJIS Commissioner/designee. Please note, the DCJIS reserves the right to delay or terminate the testing at any time under conditions including, but not limited to: The DCJIS determines that the testing is interfering with the normal operations of the CJIS system or network; The DCJIS determines that the agency/vendor is in violation of any provision of these guidelines; The DCJIS determines that the agency/vendor is not performing its testing in accordance with the approved scope; The agency/vendor requests that the DCJIS suspend testing activities; During demonstration testing, the DCJIS may ask agencies/vendors to demonstrate how they comply with DCJIS and FBI security standards from a technical and operational perspective. The DCJIS determines that the agency/vendor is utilizing the CJIS system in an inappropriate way, or in such a way as to cause the user agency to be in violation of its CJIS user agreement; DCJIS CJIS Vendor Policy Guidelines Page 10 of 14
11 The DCJIS becomes aware of a problem in the approved scope which represents a possible or real breach of security, or which would otherwise jeopardize the proper functioning of the network. 8. Establish Connectivity to Production CJIS Environment (OTIS and Agency/Vendor): For agencies/vendors approved by the DCJIS, OTIS will work with the agency/vendor to enable access to the production CJIS environment at the agreed upon sites. This may involve the establishment of additional user credentials as well as modifying server/firewall configurations. Once the system is live in the production environment, the DCJIS expects that, except for agreed upon maintenance windows as described in the scope proposal, the criminal justice agency will have uninterrupted access to the functionality. Thirty (30) days after go live, the contact person at the sponsoring agency must inform the DCJIS via whether the functionality was available without interruption for a period of at least 30 days and to confirm whether the agency is satisfied with overall performance. If satisfactory performance has not been achieved, the DCJIS will work the criminal justice agency and vendor contacts regarding a mitigation plan. Ongoing Responsibilities for Approved Vendors Criminal justice agencies and their approved vendors have an ongoing responsibility to comply with the provisions of these guidelines, including, but not limited to, ensuring that they continue to meet DCJIS and FBI security standards and policies. The DCJIS will not provide an endorsement for use of the vendor's products, but it will provide a statement of compliance with current agency technologies and policies upon request. The vendor name and contact information will also be posted to the DCJIS Extranet. DCJIS and FBI Security Standards and Policies Agencies and their approved vendors are responsible for ensuring ongoing compliance with DCJIS and FBI security standards and policies from both a technical and operational perspective. This includes ensuring that the approved hardware/software meets the latest DCJIS and FBI security standards and working with the DCJIS using the process described in the Steps to Become an Approved CJIS Vendor section if any changes are required to the approved scope to comply with security standards. See for additional information on DCJIS and FBI security standards and policies. The criminal justice agency is responsible for maintaining information about changes to vendor personnel working on the project over time. When a new person joins the project, the criminal justice agency must complete the following steps prior to allowing those persons to have access to any agency hardware or software containing, or allowing access to, criminal justice information (CJI) and/or connected to the CJIS network. Signed Authorization Agreements: The criminal justice agency must ensure that all vendor personnel complete and sign the Individual Agreement of Non Disclosure (in accordance with 803 C.M.R. 3.02(3)) as well as the FBI CJIS Security Addendum. The agency must keep a copy of the fully executed agreements on file and be prepared to provide the information to the DCJIS upon request. Fingerprint Supported Record Checks: The criminal justice agency must notify the DCJIS of any vendor personnel changes so that the DCJIS can conduct fingerprint-supported criminal DCJIS CJIS Vendor Policy Guidelines Page 11 of 14
12 record checks on those individuals at its office in Chelsea Massachusetts. Notifications must be made to the CJIS Support Services Unit either via to or via written correspondence to the DCJIS address listed under step one in the Steps to Become a CJIS-Approved Vendor section of this document. Fingerprint-supported criminal record checks will be conducted annually for each person who continues to work on the project. See the Annual Reporting Requirements section for additional information. CJIS Security Awareness Training: The criminal justice agency must ensure that all vendor personnel have completed the CJIS Security Awareness Training. Vendor Personnel List: The criminal justice agency must maintain an up-to-date list of all vendor personnel working with the agency on the project, including changes over time. At a minimum, this must include the person s name, state of residence, the date he/she started on the project, the date he/she signed the security addendum and individual disclosure agreement, the date fingerprinted, the date of last background record check/result, the date he/she successfully completed the CJIS security training, and the date he/she left the project (if applicable). The criminal justice agency must also maintain a list of vendor personnel who requested but were denied access and why. The agency must be prepared to provide this information to the DCJIS before demonstration testing, annually, and upon request. Vendor Name Changes Agencies and their approved vendors are responsible for ensuring that the DCJIS has up-to-date information about the vendor organization. If the legal name, location, or primary contact of the vendor changes for any reason (e.g., merger, acquisition, rebranding, etc.), the agency/vendor are to an updated scope proposal to the DCJIS at [email protected]. The subject of the should be "Vendor Information Change for {Previous Vendor Name}." See the CJIS Vendor Proposed Scope template available on for additional information. Additional Sites Approved vendors are authorized to offer the approved system to additional user sites in accordance with the approved scope without further approval by the DCJIS. New/Changed Functionality If the vendor wishes to make improvements or changes in the way the system operates, including implementing additional CJIS transactions, a revised scope proposal must be submitted to the DCJIS for review and testing prior to implementation. The revised scope proposal must be submitted and will be evaluated using the process described in the Steps to Become an Approved CJIS Vendor section above. The DCJIS may, at its sole discretion, approve the changes for immediate implementation without further review, may require an informal technical review/demonstration of the function(s) prior to implementation, or may, if the changes appear significant enough, require a formal demonstration test as outlined above. DCJIS CJIS Vendor Policy Guidelines Page 12 of 14
13 CJIS System Changes The DCIS may periodically make changes to the CJIS system to provide enhanced functionality to the end user community and/or to comply with current laws, regulations, or policy requirements. The DCJIS is not responsible for any impact that changes to the CJIS system may have on vendor systems approved under these guidelines. The DCIJS will make every effort to provide advanced notice to agencies/vendors of all CJIS changes that may impact their systems. Annual Reporting Requirements By January 15 th of each year, the vendor must report the following to the DCJIS. This information must be ed to with a subject of Annual Vendor Report for {VENDOR NAME}. Current Agency List: A list of Massachusetts criminal justice agency sites using hardware and/or software approved under these guidelines. Potential Agency List: A list of Massachusetts criminal justice agencies the vendor believes may be considering using the vendor's product(s). This information will be used by the DCJIS for planning purposes only and will not be disclosed by the agency in any way. Contact Information: Any changes to the contact information for the vendor organization and/or sponsoring agency, including the key contact person assigned to work with the DCJIS. By January 15 th of each year, criminal justice agencies must also report the following to the DCJIS. This information should be ed to [email protected] with a subject line of Annual Vendor Report for {CITY/TOWN NAME}. Vendor Personnel List: An up-to-date list of vendor personnel as described above. At a minimum, this must include the person s name, state of residence, the date he/she started on the project, the date he/she signed the security addendum and individual disclosure agreement, the date fingerprinted, the date of last background record check/result, the date he/she successfully completed the CJIS security training, and the date he/she left the project (if applicable). See the Vendor Personnel List template available on for additional information. Spot Audits and Site Visits The DCJIS will conduct on-site audits of every CJIS agency on a triennial basis. As part of the audit, the DCJIS auditor(s) will check to ensure that the functionality being provided by the installed system(s) is in compliance with the currently approved scope, and to verify that all provisions of these guidelines are being met. This includes compliance with DCJIS and FBI security standards and policies. Systems found to be out of compliance shall be subject to suspension of service, in addition to any and all sanctions that may be imposed by the DCJIS pursuant to state law and regulations, as well as to the terms and conditions of the CJIS User Agreement. In addition, if systems are found to be out of compliance, the DCJIS reserves the right to prevent the use of the product(s) in question at additional new sites. Finally, if systems are found to be out of compliance, the DCJIS reserves the right to terminate any further testing, and/or revoke the vendor s privileges to work with the DCJIS on future projects. DCJIS CJIS Vendor Policy Guidelines Page 13 of 14
14 Additional Supporting Materials The following materials are available to supplement the information provided in these CJIS Vendor Policy Guidelines. Please contact the CJIS Support Services Unit via phone at or via at if you have questions or require additional information. What Scope Proposal Template (including the Agency Support Letter) FBI CJIS Security Policy Information FBI Security Addendum Vendor Agreement of Non-Disclosure Individual Agreement of Non-Disclosure Form Authorized Vendor Personnel List Template VPN User Access Application Form CJIS Overview Broker Documentation CJIS Broker Authorization Form Additional CJIS Broker Documentation (WSDL, Schemas, etc.) Frequently Asked Questions Where To be provided based to approved vendors (if required) based on approved scope. Revision History The CJIS Vendor Policy Guidelines document is a living document that is updated as required over time. Following is a summary of key changes made, including the date and nature of changes. Date Nature of Changes 08/17/2015 Updated guidelines to reflect current process and templates. 11/04/2014 Initial version. DCJIS CJIS Vendor Policy Guidelines Page 14 of 14
Criminal Offender Record Information (CORI) Attorney Request Form
THE COMMONWEALTH OF MASSACHUSETTS EXECUTIVE OFFICE OF PUBLIC SAFETY AND SECURITY Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200, Chelsea, MA 02150 TEL: 617-660-4640
Frequently Asked Questions. Version 2.0 07/20/2015
CJIS Broker Appendix Frequently Asked Questions THE COMMONWEALTH OF MASSACHUSETTS EXECUTIVE OFFICE OF PUBLIC SAFETY AND SECURITY Department of Criminal Justice Information Services 200 Arlington Street,
803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)
803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS) Section 7.01: Purpose and Scope 7.02: Definitions 7.03: Criminal Justice Agency (CJA) Access to Criminal Justice Information System (CJIS) 7.04:
1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION
1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
APPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
On Behalf Of/Child Care Provider Criminal Offender Record Information (CORI) Request Form
THE COMMONWEALTH OF MASSACHUSETTS EXECUTIVE OFFICE OF PUBLIC SAFETY AND SECURITY Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200, Chelsea, MA 02150 TEL: 617-660-4640
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS (By authority conferred on the Department of State Police by 1974 PA 163, MCL 28.214, and Executive Reorganization
GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject CJIS Security Topic Series Number SPT 302 12 Effective Date March 28, 2014 Related to: GO-SPT-302.08 (Metropolitan Police Department (MPD) Wide Area Network)
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT I. PURPOSE STATEMENT The TENNESSEE FUSION CENTER (TFC) is an initiative of the Tennessee Bureau of Investigation (TBI) and the Department of
INTERNATIONAL SOCIETY OF ARBORICULTURE (ISA) CERTIFICATION PROGRAM ETHICS CASE PROCEDURES
INTERNATIONAL SOCIETY OF ARBORICULTURE (ISA) CERTIFICATION PROGRAM ETHICS CASE PROCEDURES INTRODUCTION. The ISA Certification Board develops and promotes high ethical standards for the Certified Arborist
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications
Quincy Police Department One Sea Street Quincy, MA 02169 (617) 479-1212 TTY: (617) 376-1375
PAUL KEENAN CHIEF OF POLICE Quincy Police Department One Sea Street Quincy, MA 02169 (617) 479-1212 TTY: (617) 376-1375 Please complete the attached Firearms Application. All questions must be answered
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
Reclamation Manual Directives and Standards
PRA Process 1. Introduction. A. Additional information and requirements supplementing the PRA process are defined in the Directive and Standard (D&S). Terms used within this Appendix can be found in the
Justice Information Sharing Division ( ND CJIS ), and
Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES (MUNICIPAL POLICY) POLICY ENF-97.003 I. INTRODUCTION A. PURPOSE AND INTENT This policy sets forth how the Department of Environmental Protection (DEP)
esnc ACCESS AGREEMENT
FEDERAL RESERVE BOARD Shared National Credit Function esnc ACCESS AGREEMENT A. Introduction This agreement (Agreement) sets forth the terms for your Institution s use of our Electronic Shared National
When HHS Calls, Will Your Plan Be HIPAA Compliant?
When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS IMPORTANT INFORMATION: Complete this application if you are applying to the Board for a pharmacy technician registration. You must answer all questions on
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES
TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
RULES GOVERNING COMPLIANCE OFFICERS OF DEALING MEMBER FIRMS 1
RULES GOVERNING COMPLIANCE OFFICERS OF DEALING MEMBER FIRMS 1 1. INTRODUCTION: These rules are made pursuant to Article 15 of the Rules and Regulations Governing Dealing Members (the Rules) and Section
DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT
DATA CENTER UNIVERSITY by AMERICAN POWER CONVERSION (APC) CANDIDATE AGREEMENT 1. DEFINITIONS For purposes of this Agreement, the terms defined in this Section shall have the meanings set forth below: 1.1
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Payment Card Industry (PCI) Data Security Standard Validation Requirements
Payment Card Industry (PCI) Data Security Standard Validation Requirements For Qualified Security Assessors (QSA) Version 1.1a April 2008 Table of Contents 1 Introduction... 1 1.1 Terminology...1 1.2 Goal...2
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Enclosure. Dear Vendor,
Dear Vendor, As you may be aware, the Omnibus Rule was finalized on January 25, 2013 and took effect on March 26, 2013. Under the Health Insurance Portability & Accountability Act (HIPAA) and the Omnibus
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
Kamala D. Harris Attorney General California Department of Justice
Electronic Recording Delivery System Addendum to the following ERDS Handbooks: Baseline Requirements and Technology Standards System Certification Computer Security Auditor Kamala D. Harris Attorney General
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Submission of the Criminal Offender Record Information Request Form (CORI).
COMMONWEALTH OF MASSACHUSETTS EXECUTIVE OFFICE OF HEALTH AND HUMAN SERVICES DEPARTMENT OF PUBLIC HEALTH DIVISION OF HEALTH PROFESSIONS LICENSURE 239 CAUSEWAY STREET, SUITE 500, 5TH FLOOR, BOSTON, MA 02114
CCMS Software Provider Business Assurance Statement Deed Poll
CCMS Software Provider Business Assurance Statement Deed Poll I, the of (Name of CCMS Software Provider s representative) (insert position/title) ( the Software Provider ), (insert legal entity name and
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use
ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
FOR SHARING LAW ENFORCEMENT INFORMATION
INTERLOCAL AGREEMENT BETWEEN COLLIN COUNTY TEXAS AND The City of Austin, Texas; the City of El Paso, Texas; the City of Houston, Texas; and the City of San Antonio, Texas FOR SHARING LAW ENFORCEMENT INFORMATION
NC CJIN Governing Board. 13 October, 2011. George A. White
Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements
SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS
COMPLIANCE AND INDUSTRY REGULATIONS INTRODUCTION Multiple federal regulations exist today requiring government organizations to implement effective controls that ensure the security of their information
WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015
WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Document Title: System Administrator Policy
Document Title: System REVISION HISTORY Effective Date:15-Nov-2015 Page 1 of 5 Revision No. Revision Date Author Description of Changes 01 15-Oct-2015 Terry Butcher Populate into Standard Template Updated
Handbook For The Airport Screening Services Pre- Qualification Program 2015-09-29
Handbook For The Airport Screening Services Pre- Qualification Program 2015-09-29 Table of Contents Purpose... 1 Scope... 1 Outline... 1 1. Phase 1: Application... 2 2. Phase 2: Management System Documentation
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
INDEPENDENT TESTING LABORATORY
INDEPENDENT TESTING LABORATORY CERTIFICATION PROCESS ITL CERTIFICATION CHECKLIST QUALIFICATIONS and CONDITIONS of CERTIFICATION MGC Gaming Technology Laboratory March 2015 Rev 3 9 15 Version 12.0 Independent
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
