Demonstrating our commitment to the ongoing protection of the privacy and security of your data.
ISO/IEC 27001:2013 “Information technology — Security Techniques — Information Security Management Systems – Requirements
ISO 27017 and 27018
ISO/IEC 27017:2015 (Information Security Controls based on ISO/IEC 27002 for Cloud Services) and ISO/IEC 27018:2019 (Protection of PII in Public Clouds Acting as PII Processors)
ISO/IEC 27701:2019 Security techniques - Extension of ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - requirements and guidelines
Service Organization Control (SOC) reports
Comprehensive evaluation of key development and support operations have been completed and those operations have achieved AICPA SOC2 Type 2 reporting. Supplemental SOC2 Type 2 reports for development and support operations at satellite locations will be complete throughout 2022.
We ensure that all Motorola Solutions personnel interacting with CJI are screened in accordance with the CJIS Security Policy requirements.
CJIS audit assistance
We assist you with the critical documentation needed to demonstrate that your agency is meeting CJIS requirements.
CJIS policy guidance
We regularly audit our solutions to provide clear guidance on the best configuration and implementation choices to comply with CJIS Security Policy requirements.