Criminal Justice Information Systems

ReplaceableBoolean avatar
ReplaceableBoolean
·
·
Download

Start Quiz

Study Flashcards

22 Questions

According to the text, what is the policy of the Department regarding criminal justice information systems?

To comply with all regulations regarding their use

What will happen if an employee misuses the NCIC/FCIC System according to the text?

Disciplinary action up to termination and/or prosecution

What is required for access to the NCIC/FCIC system according to the text?

Agreement with the Florida Department of Law Enforcement

According to the text, what are criminal justice agencies subject to when they have access to NCIC/FCIC Criminal History Files?

User agreements between the Department and FDLE

What type of action does the text state will be taken against employees who misuse the NCIC/FCIC System?

Disciplinary action up to termination and/or prosecution

What is the primary method for making entries and cancellations to the wanted persons file by the Palm Beach County Sheriff's Office (PBSO)?

Via the PALMS computer system

What action should be taken if the warrant for an individual is not found in the FCIC/NCIC computer?

Contact the originating agency to request a copy of the warrant

What should be done if information about an arrest warrant is received from another agency concerning an individual in the Department’s jurisdiction?

Request a case number and take a report as with any other call for service

Who should be notified to determine if and when an attempt will be made to locate the subject of a warrant?

The watch commander

What is the Department’s access to the PALMS computer system primarily for?

Making inquiries only

Where is information about wanted persons and vehicle available according to the text?

Through the FCIC/NCIC computer terminal

What criteria are required for establishing a warrant and wanted persons file through the PALMS system?

$FSS 34.13 and FSS 901.04

What method should be used to verify information received from the system according to the text?

$Via Teletype through the PBSO

When should a warrant be acted on according to the text?

$Only after verifying through Teletype via PBSO

What is available through the FCIC/NCIC computer terminal according to the text?

Wanted persons and vehicle information, and criminal history files.

Who is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC?

FCIC Agency Coordinator (FAC)

What is the mandatory requirement for employees using the NCIC/FCIC terminal?

To use the terminal only for criminal justice purposes

What is the purpose of the Teletype terminal being protected by an uninterrupted power supply (UPS)?

To keep the terminal on during inclement weather

What information obtained from DHSMV can be released to authorized wrecker companies?

Title, lien, and insurance information

What is the frequency of FCIC/NCIC recertification tests for operators to maintain certification?

Every two years

According to Federal Privacy Act of 1974, for what purpose can criminal history checks be used?

For criminal justice purposes only

What is done by FDLE once every three years to verify compliance with established protocols?

Access audits

Study Notes

Policy Regarding Criminal Justice Information Systems

  • The Department's policy is to ensure employees use criminal justice information systems lawfully and ethically.

NCIC/FCIC System Misuse

  • Employees misusing the NCIC/FCIC System will face disciplinary action, up to and including termination.

Access to NCIC/FCIC System

  • Access to the NCIC/FCIC system requires a valid purpose, justification, and approval from the supervisor or designee.

Criminal Justice Agencies' Responsibility

  • Criminal justice agencies with access to NCIC/FCIC Criminal History Files are subject to audits and compliance reviews.

Disciplinary Action

  • Employees who misuse the NCIC/FCIC System will face disciplinary action, up to and including termination.

Wanted Persons File Entries

  • The primary method for making entries and cancellations to the wanted persons file is through the Palm Beach County Sheriff's Office (PBSO).

Unknown Warrants

  • If a warrant for an individual is not found in the FCIC/NCIC computer, a teletype should be sent to the originating agency to verify the warrant.

Receiving Warrant Information

  • If information about an arrest warrant is received from another agency concerning an individual in the Department's jurisdiction, it should be verified and entered into the system.

Notifying Supervisors

  • Supervisors should be notified to determine if and when an attempt will be made to locate the subject of a warrant.

Department's Access to PALMS

  • The Department's access to the PALMS computer system is primarily for making inquiries and entries to the wanted persons file.

Wanted Persons and Vehicle Information

  • Information about wanted persons and vehicles is available through the FCIC/NCIC computer terminal and the PALMS system.

Establishing a Warrant and Wanted Persons File

  • A warrant and wanted persons file can be established through the PALMS system if the individual has an outstanding warrant and is considered a threat to public safety.

Verifying Information

  • Information received from the system should be verified through a supervisor or designee.

Acting on Warrants

  • A warrant should be acted on only after verification and approval from a supervisor or designee.

FCIC/NCIC Computer Terminal

  • The FCIC/NCIC computer terminal provides access to criminal history information, wanted persons and vehicle files, and other law enforcement data.

Compliance with CJIS Policies

  • The CJIS Systems Agency (CSA) is responsible for ensuring Department and user compliance with CJIS Policies and Procedures as they relate to FCIC and NCIC.

Mandatory Requirement

  • Employees using the NCIC/FCIC terminal must adhere to CJIS Policies and Procedures and undergo recertification testing every two years.

Teletype Terminal Protection

  • The Teletype terminal is protected by an uninterrupted power supply (UPS) to ensure continuous operation.

Releasing Information to Authorized Wrecker Companies

  • Information obtained from DHSMV can be released to authorized wrecker companies for official business purposes.

FCIC/NCIC Recertification Tests

  • FCIC/NCIC recertification tests are required every two years for operators to maintain certification.

Purpose of Criminal History Checks

  • Criminal history checks can be used for purposes authorized by the Federal Privacy Act of 1974.

FDLE Compliance Verification

  • FDLE verifies compliance with established protocols for CJIS Systems every three years.

Test your knowledge of the Departmental Standards Directive 81.200 for the Boca Raton Police Services Department, specifically focusing on guidelines for employees' use of criminal justice information systems.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Crime and Intelligence Unit
20 questions
Unusual Occurrences
17 questions

Unusual Occurrences

ReplaceableBoolean avatar
ReplaceableBoolean
Records
29 questions

Records

ReplaceableBoolean avatar
ReplaceableBoolean
Department Assets and Equipment
27 questions
Use Quizgecko on...
Browser
Browser