Laserfiche WebLink
Agencies must assume responsibility for and enforce the system's security standards with <br />regard to all agencies and users it services. The local agency must have adequate physical <br />security to protect against any unauthonzed access to RAIN servers, computer terminals, <br />access devices, or stored /pnnted data at all times. Sites include vehicles housing Mobile <br />Data Terminals. <br />Administrative Security <br />Policy. <br />Each agency Chief, by signing the Inter -Local Agreement agrees to conform to RAIN <br />system security policy and procedures. <br />Non criminal justice governmental agencies designated to perform cnminal justice <br />support services such as dispatching functions or data processing/information services for <br />a cnminal justice agency are eligible for RAIN records information systems access. <br />Non criminal justice governmental agencies are permitted access to RAIN systems if <br />authonzed pursuant to statute, regulation, ordinance, or interagency agreement. <br />All non-cnminal justice agencies accessing RAIN systems will be subject to all RAIN <br />operational policies, rules, and regulations. Security control responsibility must remain <br />with the sponsoring cnminal justice agency <br />Pnvate contractors or vendors are permitted access to RAIN data pursuant to a specific <br />agreement for the purpose of providing services for the administration of cnminal justice <br />pursuant to that agreement. <br />All RAIN member agencies shall provide security awareness briefing to all personnel <br />who have access to RAIN information. The goal of these bnefings is to ensure that <br />personnel are made aware of <br />threats, vulnerabilities, and risks associated with accessing RAIN systems, <br />what requires protection, <br />information accessibility, handling, marking, and storage considerations, <br />physical and environmental considerations, <br />system, data, and access controls, <br />contingency plan procedures, <br />secure configuration control requirements, <br />social engmeenng practices, and <br />responsibility to promptly report security violations to the Chief of Police. <br />Security Monitorine <br />Policy. <br />All access attempts are logged and /or recorded and are subject to routine audit or review <br />for detection of inappropriate or illegal activity <br />RAIN ILA 2007 <br />