Protecting your data with robust compliance offerings
We navigate the ever-evolving landscape of security and privacy to protect data in the design and use of our solutions.
ISO Certifications: security, privacy & business continuity
After a thorough external evaluation of our information security, privacy and business continuity practices, we have achieved comprehensive certifications in the ISO 27000 Series for Information Security and Privacy Management Systems as well as ISO 22301 for Business Continuity Management Systems.
ISO 27001 with Extensions 27017, 27018 & 27701
The ISO 27000 Series certification demonstrates our commitment to effective information security and privacy management with enhanced focus on cloud security and the protection of personal data.
View certificationISO 22301: Business Continuity Management
The ISO 22301 certification demonstrates our preparation & testing for the seamless recovery of customer operations in the event of business disruptions. Our program prioritizes employee safety & optimal system recovery to protect data.
View certificationService Organization Control (SOC) reports
We are committed to being your trusted partner by employing privacy and security protocols that support compliance to legal and regulatory frameworks.
Country-specific assessments
In addition to meeting international standards for information security and privacy practices, we have undergone country-specific assessments that provide additional assurance to our Canadian and Australian government customers during and after the procurement of our services.
Canadian Centre for Cyber Security (CCCS)
We've completed a Security Assessment (up to and including Protected B Data) by CCCS on our cloud services for the government of Canada.
Infosec Registered Assessors Program (IRAP) of Australia
We've completed a services assessment within Microsoft Azure Australia & comply with Australian Cyber Security Centre Information Security Manual controls.
Criminal Justice Information Services (CJIS)
Every day, public safety agencies access Criminal Justice Information (CJI) databases to perform their mission. From product design to operational elements, our robust CJIS Compliance Program is designed to support your compliance with the CJIS Security Policy.
Personnel credentialing
We ensure all Motorola Solutions personnel who interact with CJI are screened in accordance with CJIS Security Policy requirements.
CJIS audit assistance
We assist you with the critical documentation you need to demonstrate your law enforcement agency is meeting CJIS requirements.
CJIS policy guidance
We regularly evaluate our solutions to provide clear guidance on configuration and implementation strategies that comply with CJIS Security Policy requirements.
We are committed to solving for safer every day.
Explore our commitment to earning your trust
Trust Center
We’re driven to be a force for good. It’s not just about what we do but how we do it, from the way we innovate to how we prioritize security & privacy.
Responsible Innovation
We design technologies intentionally, purposefully and responsibly to empower human decision-makers to help make people, property and places safer.
Ethical Tech Governance
The Motorola Solutions Technology Advisory Committee governs our ethical use of technology to ensure we maintain the highest standards of integrity.
Security
We design, develop and deploy our products to protect the information security of the communities, businesses and public safety agencies we serve.
Privacy
We recognize the responsibility that comes with handling sensitive data and promote ethical data management to protect privacy rights.