Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or sign in again before proceeding.

COMPLIANCE

Demonstrating our commitment to the ongoing protection of the privacy and security of your data.

ISO (International Organization for Standardization) 27001, 27017 and 27018 Certifications

Comprehensive evaluation of key development and support operations have been completed and those operations have achieved certification. Supplemental certifications for development and support operations at satellite locations will be complete throughout 2021 and 2022.

ISO 27017 and ISO 27018 Certification

Our operations have achieved ISO/IEC 27017:2015 and ISO/IEC 27018:2019 certification.

Additional accreditation

We are committed to being your trusted partner by employing privacy and security protocols that support compliance to legal and regulatory frameworks.

Service Organization Control (SOC) reports

Comprehensive evaluation of key development and support operations have been completed and those operations have achieved AICPA SOC2 Type 2 reporting. Supplemental SOC2 Type 2 reports for development and support operations at satellite locations will be complete throughout 2022.

Criminal Justice Information Services (CJIS)

Our customers access Criminal Justice Information (CJI) databases every day to enforce the law. From product design to operational elements, our robust CJIS Compliance Program is designed to support our customers’ CJIS Security Policy compliance requirements.

Personnel credentialing

We ensure that all Motorola Solutions personnel interacting with CJI are screened in accordance with the CJIS Security Policy requirements.

CJIS audit assistance

We assist you with the critical documentation needed to demonstrate that your agency is meeting CJIS requirements.

CJIS policy guidance

We regularly audit our solutions to provide clear guidance on the best configuration and implementation choices to comply with CJIS Security Policy requirements.

Protect your operation with our advanced cybersecurity services.

Please wait...