Podcast
Questions and Answers
Who reviews and forwards ITAC recommended and/or approved requests for final approval?
Who reviews and forwards ITAC recommended and/or approved requests for final approval?
- Executive Committee
- ITAC Committee
- Chief of Police
- Administration Bureau Commander (correct)
What happens to unapproved ITAC recommendations?
What happens to unapproved ITAC recommendations?
- They are approved by the Chief of Police
- They are forwarded to the Executive Committee for approval
- They are followed up with by the Administration Bureau Commander (correct)
- They are rejected by the ITAC Committee
What is the implied understanding of using the e-mail system?
What is the implied understanding of using the e-mail system?
- Personal use of email is allowed without approval
- Emails are not subject to Sunshine Law requests
- Compliance with CJIS Security Policy and this directive (correct)
- Expectation of privacy in stored, sent, or received emails
What is considered property of the Department in Microsoft Outlook?
What is considered property of the Department in Microsoft Outlook?
Under what condition is incidental personal use of email permissible?
Under what condition is incidental personal use of email permissible?
What is the primary purpose of email in the Department?
What is the primary purpose of email in the Department?
What may happen to emails without prior notice to the member?
What may happen to emails without prior notice to the member?
What is an exception to the Department's email monitoring?
What is an exception to the Department's email monitoring?
What is the purpose of the Policy Acknowledgement System?
What is the purpose of the Policy Acknowledgement System?
What is required of Department members when using the internet?
What is required of Department members when using the internet?
What is prohibited when using the internet?
What is prohibited when using the internet?
Who must approve access to blocked websites?
Who must approve access to blocked websites?
What is the purpose of cleaning out email inboxes regularly?
What is the purpose of cleaning out email inboxes regularly?
What should internet users be wary of to prevent inadvertent software downloads?
What should internet users be wary of to prevent inadvertent software downloads?
What may be considered criminal activity when using the internet?
What may be considered criminal activity when using the internet?
Who must approve software downloads from the internet?
Who must approve software downloads from the internet?
Who is responsible for moving, installing, or disassembling Department computer equipment?
Who is responsible for moving, installing, or disassembling Department computer equipment?
What is the main purpose of reviewing software by the ISD?
What is the main purpose of reviewing software by the ISD?
What happens to the copies of the registration and/or license agreement?
What happens to the copies of the registration and/or license agreement?
What is prohibited in the Department's computer software usage?
What is prohibited in the Department's computer software usage?
Who has the right to access a user's electronic communications messages?
Who has the right to access a user's electronic communications messages?
What is the purpose of the Annexes in the Department's directive?
What is the purpose of the Annexes in the Department's directive?
What is the primary purpose of the Department's policy on computer equipment usage?
What is the primary purpose of the Department's policy on computer equipment usage?
Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?
Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?
What is the primary concern of the Kansas City Missouri Police Department's computer system?
What is the primary concern of the Kansas City Missouri Police Department's computer system?
What is the purpose of the guidelines provided in this policy?
What is the purpose of the guidelines provided in this policy?
What is referred to as 'Privately owned personal computer equipment'?
What is referred to as 'Privately owned personal computer equipment'?
What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?
What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?
What is the result of a break in the system security?
What is the result of a break in the system security?
What is the purpose of the Policy Series 200?
What is the purpose of the Policy Series 200?
What does the policy provide instructions on?
What does the policy provide instructions on?
What is the reference for the policy on Department-Owned Equipment-Privacy and Security?
What is the reference for the policy on Department-Owned Equipment-Privacy and Security?
What is the purpose of encryption?
What is the purpose of encryption?
What is a firewall?
What is a firewall?
What is the purpose of a help desk?
What is the purpose of a help desk?
What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?
What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?
What is the primary function of the Internet?
What is the primary function of the Internet?
What is a network?
What is a network?
What is the purpose of intranet?
What is the purpose of intranet?
What is a hardware?
What is a hardware?
Study Notes
Department Approved Program
- Upon approval from the Executive Committee, the Administration Bureau Commander or designee will review and forward all ITAC recommended and/or approved requests.
- The Commander will also follow up with the ITAC regarding any unapproved recommendations.
Electronic Mail (E-Mail) Communications
- Use of the e-mail system implies understanding and compliance with the directive and CJIS Security Policy.
- Members must use e-mail in an appropriate and professional manner.
- E-mail is considered property of the Department, not the member, and is subject to Sunshine Law requests.
- Members have no expectation of privacy in anything they store, send, or receive on the e-mail system.
- The Department may monitor e-mail without prior notice to the member.
- E-mail is for official use only, but incidental personal use is permissible with approval from the Chief of Police or designee.
Internet Usage
- Members must use the Internet in accordance with all applicable laws and regulations.
- Members must comply with copyright and license laws governing programs, data, and written materials accessed via the Internet.
- Downloading software from the Internet requires prior approval from the Information Services Division.
- Prohibited uses of the Internet include using connections for streaming services or private gain, and deliberate attempts to degrade or disrupt system performance.
Department Owned Computer Equipment
- The use of software/hardware on Department computers will be limited to lawful and productive endeavors.
- Unauthorized copying of Department computer software is prohibited.
- ISD personnel or an approved designee will move, install, or disassemble Department computer equipment.
- All software must be reviewed by the ISD prior to being installed on any Department computer.
Terminology
- Breach: A break in the system security that results in admittance of an unauthorized person or program to a Department computer system.
- BYOD: Privately owned personal computer equipment such as desktops, laptops, IPads, cellphones, or tablets.
- Encryption: The process of encoding a message or information in such a way that only authorized parties can access it.
- Firewall: A system designed to prevent unauthorized access to or from a private network.
- Hardware: The physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system.
- Help Desk: A resource intended to provide the end user with support and troubleshooting problems.
- Intranet: A system that uses Internet-based technologies within an organization to facilitate communication and provide integrated access to information.
- Internet: A worldwide network of computers linked together by various communication systems.
- Network: A system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the procedures for implementing department-approved programs, including review and approval by the Executive Committee and ITAC recommendations.