Criminal Justice Information Systems
22 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to the text, what is the policy of the Department regarding criminal justice information systems?

  • To use the systems without following any regulations
  • To comply with all regulations regarding their use (correct)
  • To restrict access to NCIC/FCIC systems
  • To only subscribe to PALMS system
  • What will happen if an employee misuses the NCIC/FCIC System according to the text?

  • A warning will be issued
  • No action will be taken
  • The employee will be reassigned to a different department
  • Disciplinary action up to termination and/or prosecution (correct)
  • What is required for access to the NCIC/FCIC system according to the text?

  • Direct request to the FDLE
  • Agreement with the Florida Department of Law Enforcement (correct)
  • No specific requirements
  • Authorization from the Department of Justice
  • According to the text, what are criminal justice agencies subject to when they have access to NCIC/FCIC Criminal History Files?

    <p>User agreements between the Department and FDLE</p> Signup and view all the answers

    What type of action does the text state will be taken against employees who misuse the NCIC/FCIC System?

    <p>Disciplinary action up to termination and/or prosecution</p> Signup and view all the answers

    What is the primary method for making entries and cancellations to the wanted persons file by the Palm Beach County Sheriff's Office (PBSO)?

    <p>Via the PALMS computer system</p> Signup and view all the answers

    What action should be taken if the warrant for an individual is not found in the FCIC/NCIC computer?

    <p>Contact the originating agency to request a copy of the warrant</p> Signup and view all the answers

    What should be done if information about an arrest warrant is received from another agency concerning an individual in the Department’s jurisdiction?

    <p>Request a case number and take a report as with any other call for service</p> Signup and view all the answers

    Who should be notified to determine if and when an attempt will be made to locate the subject of a warrant?

    <p>The watch commander</p> Signup and view all the answers

    What is the Department’s access to the PALMS computer system primarily for?

    <p>Making inquiries only</p> Signup and view all the answers

    Where is information about wanted persons and vehicle available according to the text?

    <p>Through the FCIC/NCIC computer terminal</p> Signup and view all the answers

    What criteria are required for establishing a warrant and wanted persons file through the PALMS system?

    <p>$FSS 34.13 and FSS 901.04</p> Signup and view all the answers

    What method should be used to verify information received from the system according to the text?

    <p>$Via Teletype through the PBSO</p> Signup and view all the answers

    When should a warrant be acted on according to the text?

    <p>$Only after verifying through Teletype via PBSO</p> Signup and view all the answers

    What is available through the FCIC/NCIC computer terminal according to the text?

    <p>Wanted persons and vehicle information, and criminal history files.</p> Signup and view all the answers

    Who is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC?

    <p>FCIC Agency Coordinator (FAC)</p> Signup and view all the answers

    What is the mandatory requirement for employees using the NCIC/FCIC terminal?

    <p>To use the terminal only for criminal justice purposes</p> Signup and view all the answers

    What is the purpose of the Teletype terminal being protected by an uninterrupted power supply (UPS)?

    <p>To keep the terminal on during inclement weather</p> Signup and view all the answers

    What information obtained from DHSMV can be released to authorized wrecker companies?

    <p>Title, lien, and insurance information</p> Signup and view all the answers

    What is the frequency of FCIC/NCIC recertification tests for operators to maintain certification?

    <p>Every two years</p> Signup and view all the answers

    According to Federal Privacy Act of 1974, for what purpose can criminal history checks be used?

    <p>For criminal justice purposes only</p> Signup and view all the answers

    What is done by FDLE once every three years to verify compliance with established protocols?

    <p>Access audits</p> Signup and view all the answers

    Study Notes

    Policy Regarding Criminal Justice Information Systems

    • The Department's policy is to ensure employees use criminal justice information systems lawfully and ethically.

    NCIC/FCIC System Misuse

    • Employees misusing the NCIC/FCIC System will face disciplinary action, up to and including termination.

    Access to NCIC/FCIC System

    • Access to the NCIC/FCIC system requires a valid purpose, justification, and approval from the supervisor or designee.

    Criminal Justice Agencies' Responsibility

    • Criminal justice agencies with access to NCIC/FCIC Criminal History Files are subject to audits and compliance reviews.

    Disciplinary Action

    • Employees who misuse the NCIC/FCIC System will face disciplinary action, up to and including termination.

    Wanted Persons File Entries

    • The primary method for making entries and cancellations to the wanted persons file is through the Palm Beach County Sheriff's Office (PBSO).

    Unknown Warrants

    • If a warrant for an individual is not found in the FCIC/NCIC computer, a teletype should be sent to the originating agency to verify the warrant.

    Receiving Warrant Information

    • If information about an arrest warrant is received from another agency concerning an individual in the Department's jurisdiction, it should be verified and entered into the system.

    Notifying Supervisors

    • Supervisors should be notified to determine if and when an attempt will be made to locate the subject of a warrant.

    Department's Access to PALMS

    • The Department's access to the PALMS computer system is primarily for making inquiries and entries to the wanted persons file.

    Wanted Persons and Vehicle Information

    • Information about wanted persons and vehicles is available through the FCIC/NCIC computer terminal and the PALMS system.

    Establishing a Warrant and Wanted Persons File

    • A warrant and wanted persons file can be established through the PALMS system if the individual has an outstanding warrant and is considered a threat to public safety.

    Verifying Information

    • Information received from the system should be verified through a supervisor or designee.

    Acting on Warrants

    • A warrant should be acted on only after verification and approval from a supervisor or designee.

    FCIC/NCIC Computer Terminal

    • The FCIC/NCIC computer terminal provides access to criminal history information, wanted persons and vehicle files, and other law enforcement data.

    Compliance with CJIS Policies

    • The CJIS Systems Agency (CSA) is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC.

    Mandatory Requirement

    • Employees using the NCIC/FCIC terminal must adhere to CJIS Policies and Procedures and undergo recertification testing every two years.

    Teletype Terminal Protection

    • The Teletype terminal is protected by an uninterrupted power supply (UPS) to ensure continuous operation.

    Releasing Information to Authorized Wrecker Companies

    • Information obtained from DHSMV can be released to authorized wrecker companies for official business purposes.

    FCIC/NCIC Recertification Tests

    • FCIC/NCIC recertification tests are required every two years for operators to maintain certification.

    Purpose of Criminal History Checks

    • Criminal history checks can be used for purposes authorized by the Federal Privacy Act of 1974.

    FDLE Compliance Verification

    • FDLE verifies compliance with established protocols for CJIS Systems every three years.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of the Departmental Standards Directive 81.200 for the Boca Raton Police Services Department, specifically focusing on guidelines for employees' use of criminal justice information systems.

    More Like This

    Crime and Intelligence Unit
    20 questions
    Promotion
    17 questions

    Promotion

    ReplaceableBoolean avatar
    ReplaceableBoolean
    ALPR
    26 questions

    ALPR

    ReplaceableBoolean avatar
    ReplaceableBoolean
    Use Quizgecko on...
    Browser
    Browser