Are you looking for support from US? GET SUPPORT
Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or sign in again before proceeding.



Demonstrating our commitment to the ongoing protection of the privacy and security of your data.

ISO 27001 with extensions 27017, 27018 and 27701

After thorough evaluation of information security and privacy practices across its operations, Motorola Solutions has achieved a comprehensive certification from the International Organization for Standardization (ISO) to the ISO 27001, 27017, 27018 and 27701 standards. The following certifications have been achieved:

ISO 27001

ISO/IEC 27001:2013 “Information technology — Security Techniques — Information Security Management Systems – Requirements

ISO 27017 and 27018

ISO/IEC 27017:2015 (Information Security Controls based on ISO/IEC 27002 for Cloud Services) and ISO/IEC 27018:2019 (Protection of PII in Public Clouds Acting as PII Processors)

ISO 27701

ISO/IEC 27701:2019 Security techniques - Extension of ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - requirements and guidelines

ISO 22301 Business Continuity

Preparing for seamless recovery of operations in the event of disaster enables continuous support of our customers. Motorola Solutions business continuity management system is now ISO certified.

ISO 22301

ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements

Learn more

Additional accreditation

We are committed to being your trusted partner by employing privacy and security protocols that support compliance to legal and regulatory frameworks.

Service Organization Control (SOC) reports

Multi-site AICPA SOC2 Type II reporting has been achieved, encompassing operations across our Critical Communications, Command Center Software and Video Security & Access Control products and services.

Criminal Justice Information Services (CJIS)

Our customers access Criminal Justice Information (CJI) databases every day to enforce the law. From product design to operational elements, our robust CJIS Compliance Program is designed to support our customers’ CJIS Security Policy compliance requirements.

Personnel credentialing

We ensure that all Motorola Solutions personnel interacting with CJI are screened in accordance with the CJIS Security Policy requirements.

CJIS audit assistance

We assist you with the critical documentation needed to demonstrate that your agency is meeting CJIS requirements.

CJIS policy guidance

We regularly audit our solutions to provide clear guidance on the best configuration and implementation choices to comply with CJIS Security Policy requirements.

Explore the Trust Center

Thoughtful officer


Trusting firefighter

Trust Center

Protect your operation with our advanced cybersecurity services.

Please wait...