Demonstrating our commitment to the ongoing protection of the privacy and security of your data.
ISO 27001 with extensions 27017, 27018 and 27701
After thorough evaluation of information security and privacy practices across its operations, Motorola Solutions has achieved a comprehensive certification from the International Organization for Standardization (ISO) to the ISO 27001, 27017, 27018 and 27701 standards. The following certifications have been achieved:
ISO/IEC 27001:2013 “Information technology — Security Techniques — Information Security Management Systems – Requirements
ISO 27017 and 27018
ISO/IEC 27017:2015 (Information Security Controls based on ISO/IEC 27002 for Cloud Services) and ISO/IEC 27018:2019 (Protection of PII in Public Clouds Acting as PII Processors)
ISO/IEC 27701:2019 Security techniques - Extension of ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - requirements and guidelines
ISO 22301 Business Continuity
Preparing for seamless recovery of operations in the event of disaster enables continuous support of our customers. Motorola Solutions business continuity management system is now ISO certified.
ISO 22301:2019 Security and resilience — Business continuity management systems — RequirementsLearn more
We are committed to being your trusted partner by employing privacy and security protocols that support compliance to legal and regulatory frameworks.
Criminal Justice Information Services (CJIS)
Our customers access Criminal Justice Information (CJI) databases every day to enforce the law. From product design to operational elements, our robust CJIS Compliance Program is designed to support our customers’ CJIS Security Policy compliance requirements.
We ensure that all Motorola Solutions personnel interacting with CJI are screened in accordance with the CJIS Security Policy requirements.
CJIS audit assistance
We assist you with the critical documentation needed to demonstrate that your agency is meeting CJIS requirements.
CJIS policy guidance
We regularly audit our solutions to provide clear guidance on the best configuration and implementation choices to comply with CJIS Security Policy requirements.
Explore the Trust Center