quiz image

260-1 computer use and security

MerryAqua avatar
MerryAqua
·
·
Download

Start Quiz

Study Flashcards

40 Questions

Who reviews and forwards ITAC recommended and/or approved requests for final approval?

Administration Bureau Commander

What happens to unapproved ITAC recommendations?

They are followed up with by the Administration Bureau Commander

What is the implied understanding of using the e-mail system?

Compliance with CJIS Security Policy and this directive

What is considered property of the Department in Microsoft Outlook?

All messages generated on or handled by Microsoft Outlook, including back-up copies

Under what condition is incidental personal use of email permissible?

If approved by the Chief of Police or designee

What is the primary purpose of email in the Department?

Official use only

What may happen to emails without prior notice to the member?

They will be monitored by the Department

What is an exception to the Department's email monitoring?

Emails covered by Attorney/Client Privilege or other confidentiality privileges

What is the purpose of the Policy Acknowledgement System?

To review and electronically sign newly issued directives

What is required of Department members when using the internet?

To comply with all applicable laws and regulations

What is prohibited when using the internet?

Using internet connections for streaming services or private gain

Who must approve access to blocked websites?

The Chain of Command

What is the purpose of cleaning out email inboxes regularly?

To ensure timely dissemination of information

What should internet users be wary of to prevent inadvertent software downloads?

Pop-up menus or advertisements

What may be considered criminal activity when using the internet?

Deliberate attempts to degrade or disrupt system performance

Who must approve software downloads from the internet?

The Information Services Division

Who is responsible for moving, installing, or disassembling Department computer equipment?

ISD personnel, or an approved designee

What is the main purpose of reviewing software by the ISD?

To ensure the software is used for lawful and productive endeavors

What happens to the copies of the registration and/or license agreement?

They are forwarded and maintained in ISD

What is prohibited in the Department's computer software usage?

The unauthorized copying of Department computer software

Who has the right to access a user's electronic communications messages?

The Department

What is the purpose of the Annexes in the Department's directive?

To provide an easy reference

What is the primary purpose of the Department's policy on computer equipment usage?

To limit the use of software/hardware to lawful and productive endeavors

Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?

The Department personnel

What is the primary concern of the Kansas City Missouri Police Department's computer system?

Both A and B

What is the purpose of the guidelines provided in this policy?

To protect the Department's computer system from unauthorized access

What is referred to as 'Privately owned personal computer equipment'?

Bring Your Own Device (BYOD)

What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?

Electronic Mail (E-mail)

What is the result of a break in the system security?

A breach in the system security

What is the purpose of the Policy Series 200?

To ensure the security of Department computer systems

What does the policy provide instructions on?

Computer systems, electronic mail, and Internet usage

What is the reference for the policy on Department-Owned Equipment-Privacy and Security?

Personnel Policy 330

What is the purpose of encryption?

To ensure only authorized parties can access information

What is a firewall?

A system designed to prevent unauthorized access to a private network

What is the purpose of a help desk?

To provide technical support to end users

What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?

The H Drive is a personal drive, while the I Drive is a shared resource drive

What is the primary function of the Internet?

To provide a worldwide network of computers linked together

What is a network?

A system of computers linked together by direct connection

What is the purpose of intranet?

To facilitate communication within an organization using Internet-based technologies

What is a hardware?

A physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system

Study Notes

Department Approved Program

  • Upon approval from the Executive Committee, the Administration Bureau Commander or designee will review and forward all ITAC recommended and/or approved requests.
  • The Commander will also follow up with the ITAC regarding any unapproved recommendations.

Electronic Mail (E-Mail) Communications

  • Use of the e-mail system implies understanding and compliance with the directive and CJIS Security Policy.
  • Members must use e-mail in an appropriate and professional manner.
  • E-mail is considered property of the Department, not the member, and is subject to Sunshine Law requests.
  • Members have no expectation of privacy in anything they store, send, or receive on the e-mail system.
  • The Department may monitor e-mail without prior notice to the member.
  • E-mail is for official use only, but incidental personal use is permissible with approval from the Chief of Police or designee.

Internet Usage

  • Members must use the Internet in accordance with all applicable laws and regulations.
  • Members must comply with copyright and license laws governing programs, data, and written materials accessed via the Internet.
  • Downloading software from the Internet requires prior approval from the Information Services Division.
  • Prohibited uses of the Internet include using connections for streaming services or private gain, and deliberate attempts to degrade or disrupt system performance.

Department Owned Computer Equipment

  • The use of software/hardware on Department computers will be limited to lawful and productive endeavors.
  • Unauthorized copying of Department computer software is prohibited.
  • ISD personnel or an approved designee will move, install, or disassemble Department computer equipment.
  • All software must be reviewed by the ISD prior to being installed on any Department computer.

Terminology

  • Breach: A break in the system security that results in admittance of an unauthorized person or program to a Department computer system.
  • BYOD: Privately owned personal computer equipment such as desktops, laptops, IPads, cellphones, or tablets.
  • Encryption: The process of encoding a message or information in such a way that only authorized parties can access it.
  • Firewall: A system designed to prevent unauthorized access to or from a private network.
  • Hardware: The physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system.
  • Help Desk: A resource intended to provide the end user with support and troubleshooting problems.
  • Intranet: A system that uses Internet-based technologies within an organization to facilitate communication and provide integrated access to information.
  • Internet: A worldwide network of computers linked together by various communication systems.
  • Network: A system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods.

This quiz covers the procedures for implementing department-approved programs, including review and approval by the Executive Committee and ITAC recommendations.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Executive Functions Quiz
35 questions

Executive Functions Quiz

BallerGiraffe0118 avatar
BallerGiraffe0118
COI Executive Committee Procedure
10 questions
Use Quizgecko on...
Browser
Browser