Loading...
HomeMy WebLinkAboutPD18-481 - Original - City of Kent IT Department - Management Control Agreement: CJIS Security Policy - 05/10/2018Ap p r o v a l Originator:Department: Date Sent:Date Required: Authorized to Sign: Director or Designee Date of Council Approval: Grant? Yes No Type: Re v i e w / Si g n a t u r e s / R o u t i n g Comments: Date Routed to the City Clerk’s Office: Ag r e e m e n t I n f o r m a t i o n Vendor Name:Category: Vendor Number:Sub-Category: Project Name: Project Details: Agreement Amount: Start Date: Basis for Selection of Contractor: Termination Date: Local Business? Yes No* Business License Verification: Yes In-Process Exempt (KCC 5.01.045) If meets requirements per KCC 3.70.100, please complete “Vendor Purchase-Local Exceptions” form on Cityspace. Notice required prior to disclosure? Yes No Contract Number: Agreement Routing Form For Approvals, Signatures and Records Management This form combines & replaces the Request for Mayor’s Signature and Contract Cover Sheet forms. Visit Documents.KentWA.gov to obtain copies of all agreementsadccW22373_1_20 Budget Account Number: Budget? Yes No Dir Asst: Sup/Mgr: Dir/Dep: rev. 20210513 FOR CITY OF KENT OFFICIAL USE ONLY (Optional) * Memo to Mayor must be attached Attachment D Manasement contror Aoreement Management controlAgreement Must be completed by agencies who: A. Have a city or county lnformatlon Technology (lT) department handling lT services for the criminaljustice agency. Pursuant to the CJIS Security Policy, it is agreed thatwith respect to administration of that portion of computer systems and network infrastructure interfacing directly or indirectly with A Central Computerized Enforcement Service System (ACCESS) for the interstate exchange of criminal history/criminaljustice information, the Criminal Justice Agency shall have the authority, via managed control, to set and enforce: (1) Priorities. (2) Standards for the selection, supervision, and elimination of access to personnel who may be tasked with working on or interfacing with any of the telecommunication systems or criminaljustice systems/computers enumerated in paragraph three below. (3) Policy governing operation of justice systems, computers, access devices, circuits, hubs, routers, firewalls, and any other components, including encryption, that comprise and support a telecommunications network and related criminaljustice systems to include but not limited to criminal history record/criminaljustice information, insofar as the equipment is used to process or transmit criminal justice systems information guaranteeing the priority, integrity, and availability of service needed by the criminal justice community. (4) Restriction of unauthorized personnel from access or use of equipment accessing the State network, (5) Compliance with all rules and regulations of the criminaljustice agency policies and CJIS Security Policy in the operation of all information received, Responsibility for management control of the criminal justice function remains solely with the criminaljustice agency, as required by the CJIS Security Policy. This agreement covers the overall supervision of all criminaljustice agency systems, applications, equipment, systems design, programming, and operational procedures associated with the development, implementation, and maintenance of any criminaljustice agency system to include NCIC Programs that may be subsequently designed and/or implemented within the criminal justice agency, 2017 WSP ACGESS User Acknowledgement 12 IT CITY OF KENT - INFORMATION TECHNOLOGY NameAgency RIN nature;eadcy €/r riminalJ Agency IT KENT POLICE DEPA oRt wAo17A700 (printed)RAFAEL R. PADILLA S re: Management Control Asree$ent Pursuant to the CJIS Security Policy, it is agreed that with respect to administration of that portion of computer systems and network infrastructure interfacing directly or indirectly with the state network OMNIXX for the interstate exchange of criminal history/criminal justice information, the Kent Police Department shall have the authorlty, vla rnanaged control, to set and enforce: (1) Priorities as documented in the Service Level Agreement signed by both parties (2) Standards for the selection, supervision, and termination of personnel. (3) Policy governlng operation of justice systems, computers, access devices, circuits, hubs, routers, flrewalls, and any other components, including encryption, Ll-^! --------,-- -.-J t---------- -t-L-J ---r.--r---tt.tAt . l.lr-lrtrr ) tutu.'ltflttltt irr.r'-r'rlrrr<. lt6tt^i.tfv').t.t ?4t)tulr.'.t(ttttt2trrt/rrJv vrrs rvHHvrl v lvru9vrrrrrrvrrrvv9rvrrJ llvLvf vr vrrrrrlrrsr justice systems to include but not limited to criminal history record/criminal justice information, insofar as the equipment is used to process or transmit criminal justice systems information guaranteeing the priority, integrity, and availability of service needed by the criminal justice community. (4) Restriction of unauthorized personnel from access or use of equipment accessing the State network. (5) Compliance with all rules and regulations of the (Criminal Justice Agency) Policies and CJIS Security Policy in the operation of all information received. "Responsibrility for management of security contro! shall remaln with the criminal justice agency." CJIS Security Policy, This agreement covers the overall supervision of Kent Pollce Department systems, applications, equipment, systems design, programming, and operational procedures associated with the development, implementation, and maintenance of any Kent Police Department system to include NCIC Programs that may be subsequently d andlor imple nted within the Kent Police Department. a/rcla Mike Carrington, In City of Kent Inform ology Director '6ut" logy Depaftment ()€-/o-lg ati on ,&"{8fu4 RafaelS, puaitta, Chief dl poti.e Kent Police Department Date