Laserfiche WebLink
California Department of Justice <br />City of Santa Ana <br />Memorandum of Understanding <br />Mobile device must be owned and managed by a Government entity to connect with <br />JusticeMobile. <br />Advanced Authentication Requirement <br />CJIS information on mobile devices must be protected with Advanced Authentication. <br />Currently, advance authentication must be provided at the VPN gateway, prior to <br />accessing any CJIS information. <br />Formal Security and Privacy Policy <br />Policy documents that govern the protection of the information included within this MOU <br />are contained in the FBI Criminal Justice Information System (CJIS) Security Policy, <br />August 2013, Ver, 5.2. This document is located at the following URL: <br />tga.'/—/-w--w—w—fb—!.,qo—v—/a—b—ou—t--u--s/­c'Lis—i—cji,;--security-policy-resource-center/view - under <br />Publications, <br />Security Incident Reporting, <br />CA DOJ must be notified immediately of the loss or theft of a mobile device. <br />Agencies shall immediately notify CA DQJ1 of security incidents or data breaches, This <br />information will be reported to CA DOJ on the CLETS IT Security Incident Response <br />Form (reference Exhibit M for instructions) and email or call to CA DOJ Computer <br />Operations. <br />• CAL DOJ Security Incident Reporting contacts: <br />Computer Operations <br />(916) 227-3000 <br />Audits <br />Periodic unannounced site inspections and scheduled audits may be performed by the <br />CA DOJ or the FBI to ensure compliance with CA DOJ/FBI policies and regulations. <br />Authorized personnel performing inspections or audits shall have access to review <br />and/or inspect case files and any records identified in the inspection/audit process, <br />excluding active investigations or cases. The agency being inspected shall produce such <br />records, <br />Notifications <br />Technical staff will immediately notify their designated counterparts by telephone and e- <br />mail when a security incident(s) is detected, so the other party may take steps to <br />determine whether its system has been compromised and to take appropriate security <br />precautions. The system owner will receive formal notification in writing within five (5) <br />business days after detection of the incident(s), <br />Contacts for such notification are listed in the Representatives section, <br />Justice MUM Mou V3A - <br />DOXCIty of Santa Aria — November 2416 Page 14 of 16 <br />