Podcast
Questions and Answers
According to the text, what is the policy of the Department regarding criminal justice information systems?
According to the text, what is the policy of the Department regarding criminal justice information systems?
What will happen if an employee misuses the NCIC/FCIC System according to the text?
What will happen if an employee misuses the NCIC/FCIC System according to the text?
What is required for access to the NCIC/FCIC system according to the text?
What is required for access to the NCIC/FCIC system according to the text?
According to the text, what are criminal justice agencies subject to when they have access to NCIC/FCIC Criminal History Files?
According to the text, what are criminal justice agencies subject to when they have access to NCIC/FCIC Criminal History Files?
Signup and view all the answers
What type of action does the text state will be taken against employees who misuse the NCIC/FCIC System?
What type of action does the text state will be taken against employees who misuse the NCIC/FCIC System?
Signup and view all the answers
What is the primary method for making entries and cancellations to the wanted persons file by the Palm Beach County Sheriff's Office (PBSO)?
What is the primary method for making entries and cancellations to the wanted persons file by the Palm Beach County Sheriff's Office (PBSO)?
Signup and view all the answers
What action should be taken if the warrant for an individual is not found in the FCIC/NCIC computer?
What action should be taken if the warrant for an individual is not found in the FCIC/NCIC computer?
Signup and view all the answers
What should be done if information about an arrest warrant is received from another agency concerning an individual in the Department’s jurisdiction?
What should be done if information about an arrest warrant is received from another agency concerning an individual in the Department’s jurisdiction?
Signup and view all the answers
Who should be notified to determine if and when an attempt will be made to locate the subject of a warrant?
Who should be notified to determine if and when an attempt will be made to locate the subject of a warrant?
Signup and view all the answers
What is the Department’s access to the PALMS computer system primarily for?
What is the Department’s access to the PALMS computer system primarily for?
Signup and view all the answers
Where is information about wanted persons and vehicle available according to the text?
Where is information about wanted persons and vehicle available according to the text?
Signup and view all the answers
What criteria are required for establishing a warrant and wanted persons file through the PALMS system?
What criteria are required for establishing a warrant and wanted persons file through the PALMS system?
Signup and view all the answers
What method should be used to verify information received from the system according to the text?
What method should be used to verify information received from the system according to the text?
Signup and view all the answers
When should a warrant be acted on according to the text?
When should a warrant be acted on according to the text?
Signup and view all the answers
What is available through the FCIC/NCIC computer terminal according to the text?
What is available through the FCIC/NCIC computer terminal according to the text?
Signup and view all the answers
Who is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC?
Who is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC?
Signup and view all the answers
What is the mandatory requirement for employees using the NCIC/FCIC terminal?
What is the mandatory requirement for employees using the NCIC/FCIC terminal?
Signup and view all the answers
What is the purpose of the Teletype terminal being protected by an uninterrupted power supply (UPS)?
What is the purpose of the Teletype terminal being protected by an uninterrupted power supply (UPS)?
Signup and view all the answers
What information obtained from DHSMV can be released to authorized wrecker companies?
What information obtained from DHSMV can be released to authorized wrecker companies?
Signup and view all the answers
What is the frequency of FCIC/NCIC recertification tests for operators to maintain certification?
What is the frequency of FCIC/NCIC recertification tests for operators to maintain certification?
Signup and view all the answers
According to Federal Privacy Act of 1974, for what purpose can criminal history checks be used?
According to Federal Privacy Act of 1974, for what purpose can criminal history checks be used?
Signup and view all the answers
What is done by FDLE once every three years to verify compliance with established protocols?
What is done by FDLE once every three years to verify compliance with established protocols?
Signup and view all the answers
Study Notes
Policy Regarding Criminal Justice Information Systems
- The Department's policy is to ensure employees use criminal justice information systems lawfully and ethically.
NCIC/FCIC System Misuse
- Employees misusing the NCIC/FCIC System will face disciplinary action, up to and including termination.
Access to NCIC/FCIC System
- Access to the NCIC/FCIC system requires a valid purpose, justification, and approval from the supervisor or designee.
Criminal Justice Agencies' Responsibility
- Criminal justice agencies with access to NCIC/FCIC Criminal History Files are subject to audits and compliance reviews.
Disciplinary Action
- Employees who misuse the NCIC/FCIC System will face disciplinary action, up to and including termination.
Wanted Persons File Entries
- The primary method for making entries and cancellations to the wanted persons file is through the Palm Beach County Sheriff's Office (PBSO).
Unknown Warrants
- If a warrant for an individual is not found in the FCIC/NCIC computer, a teletype should be sent to the originating agency to verify the warrant.
Receiving Warrant Information
- If information about an arrest warrant is received from another agency concerning an individual in the Department's jurisdiction, it should be verified and entered into the system.
Notifying Supervisors
- Supervisors should be notified to determine if and when an attempt will be made to locate the subject of a warrant.
Department's Access to PALMS
- The Department's access to the PALMS computer system is primarily for making inquiries and entries to the wanted persons file.
Wanted Persons and Vehicle Information
- Information about wanted persons and vehicles is available through the FCIC/NCIC computer terminal and the PALMS system.
Establishing a Warrant and Wanted Persons File
- A warrant and wanted persons file can be established through the PALMS system if the individual has an outstanding warrant and is considered a threat to public safety.
Verifying Information
- Information received from the system should be verified through a supervisor or designee.
Acting on Warrants
- A warrant should be acted on only after verification and approval from a supervisor or designee.
FCIC/NCIC Computer Terminal
- The FCIC/NCIC computer terminal provides access to criminal history information, wanted persons and vehicle files, and other law enforcement data.
Compliance with CJIS Policies
- The CJIS Systems Agency (CSA) is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC.
Mandatory Requirement
- Employees using the NCIC/FCIC terminal must adhere to CJIS Policies and Procedures and undergo recertification testing every two years.
Teletype Terminal Protection
- The Teletype terminal is protected by an uninterrupted power supply (UPS) to ensure continuous operation.
Releasing Information to Authorized Wrecker Companies
- Information obtained from DHSMV can be released to authorized wrecker companies for official business purposes.
FCIC/NCIC Recertification Tests
- FCIC/NCIC recertification tests are required every two years for operators to maintain certification.
Purpose of Criminal History Checks
- Criminal history checks can be used for purposes authorized by the Federal Privacy Act of 1974.
FDLE Compliance Verification
- FDLE verifies compliance with established protocols for CJIS Systems every three years.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of the Departmental Standards Directive 81.200 for the Boca Raton Police Services Department, specifically focusing on guidelines for employees' use of criminal justice information systems.