260-1 computer use and security
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Who reviews and forwards ITAC recommended and/or approved requests for final approval?

  • Executive Committee
  • ITAC Committee
  • Chief of Police
  • Administration Bureau Commander (correct)
  • What happens to unapproved ITAC recommendations?

  • They are approved by the Chief of Police
  • They are forwarded to the Executive Committee for approval
  • They are followed up with by the Administration Bureau Commander (correct)
  • They are rejected by the ITAC Committee
  • What is the implied understanding of using the e-mail system?

  • Personal use of email is allowed without approval
  • Emails are not subject to Sunshine Law requests
  • Compliance with CJIS Security Policy and this directive (correct)
  • Expectation of privacy in stored, sent, or received emails
  • What is considered property of the Department in Microsoft Outlook?

    <p>All messages generated on or handled by Microsoft Outlook, including back-up copies</p> Signup and view all the answers

    Under what condition is incidental personal use of email permissible?

    <p>If approved by the Chief of Police or designee</p> Signup and view all the answers

    What is the primary purpose of email in the Department?

    <p>Official use only</p> Signup and view all the answers

    What may happen to emails without prior notice to the member?

    <p>They will be monitored by the Department</p> Signup and view all the answers

    What is an exception to the Department's email monitoring?

    <p>Emails covered by Attorney/Client Privilege or other confidentiality privileges</p> Signup and view all the answers

    What is the purpose of the Policy Acknowledgement System?

    <p>To review and electronically sign newly issued directives</p> Signup and view all the answers

    What is required of Department members when using the internet?

    <p>To comply with all applicable laws and regulations</p> Signup and view all the answers

    What is prohibited when using the internet?

    <p>Using internet connections for streaming services or private gain</p> Signup and view all the answers

    Who must approve access to blocked websites?

    <p>The Chain of Command</p> Signup and view all the answers

    What is the purpose of cleaning out email inboxes regularly?

    <p>To ensure timely dissemination of information</p> Signup and view all the answers

    What should internet users be wary of to prevent inadvertent software downloads?

    <p>Pop-up menus or advertisements</p> Signup and view all the answers

    What may be considered criminal activity when using the internet?

    <p>Deliberate attempts to degrade or disrupt system performance</p> Signup and view all the answers

    Who must approve software downloads from the internet?

    <p>The Information Services Division</p> Signup and view all the answers

    Who is responsible for moving, installing, or disassembling Department computer equipment?

    <p>ISD personnel, or an approved designee</p> Signup and view all the answers

    What is the main purpose of reviewing software by the ISD?

    <p>To ensure the software is used for lawful and productive endeavors</p> Signup and view all the answers

    What happens to the copies of the registration and/or license agreement?

    <p>They are forwarded and maintained in ISD</p> Signup and view all the answers

    What is prohibited in the Department's computer software usage?

    <p>The unauthorized copying of Department computer software</p> Signup and view all the answers

    Who has the right to access a user's electronic communications messages?

    <p>The Department</p> Signup and view all the answers

    What is the purpose of the Annexes in the Department's directive?

    <p>To provide an easy reference</p> Signup and view all the answers

    What is the primary purpose of the Department's policy on computer equipment usage?

    <p>To limit the use of software/hardware to lawful and productive endeavors</p> Signup and view all the answers

    Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?

    <p>The Department personnel</p> Signup and view all the answers

    What is the primary concern of the Kansas City Missouri Police Department's computer system?

    <p>Both A and B</p> Signup and view all the answers

    What is the purpose of the guidelines provided in this policy?

    <p>To protect the Department's computer system from unauthorized access</p> Signup and view all the answers

    What is referred to as 'Privately owned personal computer equipment'?

    <p>Bring Your Own Device (BYOD)</p> Signup and view all the answers

    What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?

    <p>Electronic Mail (E-mail)</p> Signup and view all the answers

    What is the result of a break in the system security?

    <p>A breach in the system security</p> Signup and view all the answers

    What is the purpose of the Policy Series 200?

    <p>To ensure the security of Department computer systems</p> Signup and view all the answers

    What does the policy provide instructions on?

    <p>Computer systems, electronic mail, and Internet usage</p> Signup and view all the answers

    What is the reference for the policy on Department-Owned Equipment-Privacy and Security?

    <p>Personnel Policy 330</p> Signup and view all the answers

    What is the purpose of encryption?

    <p>To ensure only authorized parties can access information</p> Signup and view all the answers

    What is a firewall?

    <p>A system designed to prevent unauthorized access to a private network</p> Signup and view all the answers

    What is the purpose of a help desk?

    <p>To provide technical support to end users</p> Signup and view all the answers

    What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?

    <p>The H Drive is a personal drive, while the I Drive is a shared resource drive</p> Signup and view all the answers

    What is the primary function of the Internet?

    <p>To provide a worldwide network of computers linked together</p> Signup and view all the answers

    What is a network?

    <p>A system of computers linked together by direct connection</p> Signup and view all the answers

    What is the purpose of intranet?

    <p>To facilitate communication within an organization using Internet-based technologies</p> Signup and view all the answers

    What is a hardware?

    <p>A physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system</p> Signup and view all the answers

    Study Notes

    Department Approved Program

    • Upon approval from the Executive Committee, the Administration Bureau Commander or designee will review and forward all ITAC recommended and/or approved requests.
    • The Commander will also follow up with the ITAC regarding any unapproved recommendations.

    Electronic Mail (E-Mail) Communications

    • Use of the e-mail system implies understanding and compliance with the directive and CJIS Security Policy.
    • Members must use e-mail in an appropriate and professional manner.
    • E-mail is considered property of the Department, not the member, and is subject to Sunshine Law requests.
    • Members have no expectation of privacy in anything they store, send, or receive on the e-mail system.
    • The Department may monitor e-mail without prior notice to the member.
    • E-mail is for official use only, but incidental personal use is permissible with approval from the Chief of Police or designee.

    Internet Usage

    • Members must use the Internet in accordance with all applicable laws and regulations.
    • Members must comply with copyright and license laws governing programs, data, and written materials accessed via the Internet.
    • Downloading software from the Internet requires prior approval from the Information Services Division.
    • Prohibited uses of the Internet include using connections for streaming services or private gain, and deliberate attempts to degrade or disrupt system performance.

    Department Owned Computer Equipment

    • The use of software/hardware on Department computers will be limited to lawful and productive endeavors.
    • Unauthorized copying of Department computer software is prohibited.
    • ISD personnel or an approved designee will move, install, or disassemble Department computer equipment.
    • All software must be reviewed by the ISD prior to being installed on any Department computer.

    Terminology

    • Breach: A break in the system security that results in admittance of an unauthorized person or program to a Department computer system.
    • BYOD: Privately owned personal computer equipment such as desktops, laptops, IPads, cellphones, or tablets.
    • Encryption: The process of encoding a message or information in such a way that only authorized parties can access it.
    • Firewall: A system designed to prevent unauthorized access to or from a private network.
    • Hardware: The physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system.
    • Help Desk: A resource intended to provide the end user with support and troubleshooting problems.
    • Intranet: A system that uses Internet-based technologies within an organization to facilitate communication and provide integrated access to information.
    • Internet: A worldwide network of computers linked together by various communication systems.
    • Network: A system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the procedures for implementing department-approved programs, including review and approval by the Executive Committee and ITAC recommendations.

    More Like This

    Use Quizgecko on...
    Browser
    Browser