HomeMy WebLinkAboutPD18-481 - Original - City of Kent IT Department - Management Control Agreement: CJIS Security Policy - 05/10/2018Ap
p
r
o
v
a
l
Originator:Department:
Date Sent:Date Required:
Authorized to Sign:
Director or Designee
Date of Council Approval:
Grant? Yes No
Type:
Re
v
i
e
w
/
Si
g
n
a
t
u
r
e
s
/
R
o
u
t
i
n
g
Comments:
Date Routed to the City Clerk’s Office:
Ag
r
e
e
m
e
n
t
I
n
f
o
r
m
a
t
i
o
n
Vendor Name:Category:
Vendor Number:Sub-Category:
Project Name:
Project Details:
Agreement Amount:
Start Date:
Basis for Selection of Contractor:
Termination Date:
Local Business? Yes No*
Business License Verification: Yes In-Process Exempt (KCC 5.01.045)
If meets requirements per KCC 3.70.100, please complete “Vendor Purchase-Local Exceptions” form on Cityspace.
Notice required prior to disclosure?
Yes No
Contract Number:
Agreement Routing Form
For Approvals, Signatures and Records Management
This form combines & replaces the Request for Mayor’s Signature and Contract Cover
Sheet forms.
Visit Documents.KentWA.gov to obtain copies of all agreementsadccW22373_1_20
Budget Account Number:
Budget? Yes No
Dir Asst:
Sup/Mgr:
Dir/Dep:
rev. 20210513
FOR CITY OF KENT OFFICIAL USE ONLY
(Optional)
* Memo to Mayor must be attached
Attachment D
Manasement contror Aoreement Management controlAgreement
Must be completed by agencies who:
A. Have a city or county lnformatlon Technology (lT) department handling lT services
for the criminaljustice agency.
Pursuant to the CJIS Security Policy, it is agreed thatwith respect to administration of that
portion of computer systems and network infrastructure interfacing directly or indirectly with A
Central Computerized Enforcement Service System (ACCESS) for the interstate exchange of
criminal history/criminaljustice information, the Criminal Justice Agency shall have the authority,
via managed control, to set and enforce:
(1) Priorities.
(2) Standards for the selection, supervision, and elimination of access to personnel who
may be tasked with working on or interfacing with any of the telecommunication systems
or criminaljustice systems/computers enumerated in paragraph three below.
(3) Policy governing operation of justice systems, computers, access devices, circuits, hubs,
routers, firewalls, and any other components, including encryption, that comprise and
support a telecommunications network and related criminaljustice systems to include
but not limited to criminal history record/criminaljustice information, insofar as the
equipment is used to process or transmit criminal justice systems information
guaranteeing the priority, integrity, and availability of service needed by the criminal
justice community.
(4) Restriction of unauthorized personnel from access or use of equipment accessing the
State network,
(5) Compliance with all rules and regulations of the criminaljustice agency policies and
CJIS Security Policy in the operation of all information received,
Responsibility for management control of the criminal justice function remains solely with the
criminaljustice agency, as required by the CJIS Security Policy.
This agreement covers the overall supervision of all criminaljustice agency systems,
applications, equipment, systems design, programming, and operational procedures associated
with the development, implementation, and maintenance of any criminaljustice agency system
to include NCIC Programs that may be subsequently designed and/or implemented within the
criminal justice agency,
2017 WSP ACGESS User Acknowledgement
12
IT CITY OF KENT - INFORMATION TECHNOLOGY
NameAgency RIN
nature;eadcy €/r
riminalJ Agency
IT KENT POLICE DEPA
oRt wAo17A700
(printed)RAFAEL R. PADILLA
S re:
Management Control Asree$ent
Pursuant to the CJIS Security Policy, it is agreed that with respect to administration
of that portion of computer systems and network infrastructure interfacing directly
or indirectly with the state network OMNIXX for the interstate exchange of criminal
history/criminal justice information, the Kent Police Department shall have the
authorlty, vla rnanaged control, to set and enforce:
(1) Priorities as documented in the Service Level Agreement signed by both parties
(2) Standards for the selection, supervision, and termination of personnel.
(3) Policy governlng operation of justice systems, computers, access devices,
circuits, hubs, routers, flrewalls, and any other components, including encryption,
Ll-^! --------,-- -.-J t---------- -t-L-J ---r.--r---tt.tAt . l.lr-lrtrr ) tutu.'ltflttltt irr.r'-r'rlrrr<. lt6tt^i.tfv').t.t ?4t)tulr.'.t(ttttt2trrt/rrJv vrrs rvHHvrl v lvru9vrrrrrrvrrrvv9rvrrJ llvLvf vr vrrrrrlrrsr
justice systems to include but not limited to criminal history record/criminal justice
information, insofar as the equipment is used to process or transmit criminal justice
systems information guaranteeing the priority, integrity, and availability of service
needed by the criminal justice community.
(4) Restriction of unauthorized personnel from access or use of equipment
accessing the State network.
(5) Compliance with all rules and regulations of the (Criminal Justice Agency)
Policies and CJIS Security Policy in the operation of all information received.
"Responsibrility for management of security contro! shall remaln with the criminal
justice agency." CJIS Security Policy,
This agreement covers the overall supervision of Kent Pollce Department systems,
applications, equipment, systems design, programming, and operational procedures
associated with the development, implementation, and maintenance of any Kent
Police Department system to include NCIC Programs that may be subsequently
d andlor imple nted within the Kent Police Department.
a/rcla
Mike Carrington, In
City of Kent Inform
ology Director '6ut"
logy Depaftment
()€-/o-lg
ati on
,&"{8fu4
RafaelS, puaitta, Chief dl poti.e
Kent Police Department
Date