My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Washington State Patrol WSP 11/3/2016
>
Contracts
>
Agreement
>
Interlocal Agreements
>
Washington State Patrol WSP 11/3/2016
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/26/2024 7:10:20 AM
Creation date
3/10/2017 3:34:08 PM
Metadata
Fields
Template:
Contracts
Contractor's Name
Washington State Patrol WSP
Approval Date
11/3/2016
Council Approval Date
11/2/2016
Department
Legal
Department Project Manager
Leslie Tidball
Subject / Project Title
WSP ACCESS User Acknowledgement
Tracking Number
0000503
Total Compensation
$0.00
Contract Type
Agreement
Contract Subtype
Interlocal Agreements
Retention Period
6 Years Then Destroy
Imported from EPIC
No
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
14
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Attachment D <br /> Management Control Agreement <br /> Management Control Agreement <br /> Must be completed by agencies who: <br /> A. Have a city or county Information Technology (IT) department handling IT services <br /> for the criminal justice agency. <br /> Pursuant to the CJIS Security Policy, it is agreed that with respect to administration of that <br /> portion of computer systems and network infrastructure interfacing directly or indirectly with A <br /> Central Computerized Enforcement Service System (ACCESS) for the interstate exchange of <br /> criminal history/criminal justice information, the Criminal Justice Agency shall have the authority, <br /> via managed control, to set and enforce: <br /> (1) Priorities. <br /> (2) Standards for the selection, supervision, and elimination of access to personnel who <br /> may be tasked with working on or interfacing with any of the telecommunication systems <br /> or criminal justice systems/computers enumerated in paragraph three below. <br /> (3) Policy governing operation of justice systems, computers, access devices, circuits, hubs, <br /> routers, firewalls, and any other components, including encryption, that comprise and <br /> support a telecommunications network and related criminal justice systems to include <br /> but not limited to criminal history record/criminal justice information, insofar as the <br /> equipment is used to process or transmit criminal justice systems information <br /> guaranteeing the priority, integrity, and availability of service needed by the criminal <br /> justice community. <br /> (4) Restriction of unauthorized personnel from access or use of equipment accessing the <br /> State network. <br /> (5) Compliance with all rules and regulations of the Criminal Justice Agency Policies and <br /> CJIS Security Policy in the operation of all information received. <br /> Responsibility for management of security control shall remain with the criminal justice agency, <br /> as required by the CJIS Security Policy. <br /> This agreement covers the overall supervision of all Criminal Justice Agency systems, <br /> applications, equipment, systems design, programming, and operational procedures associated <br /> with the development, implementation, and maintenance of any Criminal Justice Agency system <br /> to include NCIC Programs that may be subsequently designed and/or implemented within the <br /> Criminal Justice Agency. <br /> Agency Providing /l G� /% ,DCG�� �ti'/ <br /> IT Service(s): <br /> /6j <br /> Agency Head Name(printed): ' <br /> S L 14 e „ <br /> Agency Head Signature: Date: <br /> Criminal Justice Agency , <br /> Receiving IT Service(s): r •� �' G�% <br /> ORI: f9- 63/(13 / /t <br /> Agency Head Name(printed): <br /> s JJ. <br /> Agency Head Signature: h J Dfi is <br /> 2014 ACCESS User Acknowledgement 7-23-2015 <br /> 12 <br />
The URL can be used to link to this page
Your browser does not support the video tag.