40 Questions
Who reviews and forwards ITAC recommended and/or approved requests for final approval?
Administration Bureau Commander
What happens to unapproved ITAC recommendations?
They are followed up with by the Administration Bureau Commander
What is the implied understanding of using the e-mail system?
Compliance with CJIS Security Policy and this directive
What is considered property of the Department in Microsoft Outlook?
All messages generated on or handled by Microsoft Outlook, including back-up copies
Under what condition is incidental personal use of email permissible?
If approved by the Chief of Police or designee
What is the primary purpose of email in the Department?
Official use only
What may happen to emails without prior notice to the member?
They will be monitored by the Department
What is an exception to the Department's email monitoring?
Emails covered by Attorney/Client Privilege or other confidentiality privileges
What is the purpose of the Policy Acknowledgement System?
To review and electronically sign newly issued directives
What is required of Department members when using the internet?
To comply with all applicable laws and regulations
What is prohibited when using the internet?
Using internet connections for streaming services or private gain
Who must approve access to blocked websites?
The Chain of Command
What is the purpose of cleaning out email inboxes regularly?
To ensure timely dissemination of information
What should internet users be wary of to prevent inadvertent software downloads?
Pop-up menus or advertisements
What may be considered criminal activity when using the internet?
Deliberate attempts to degrade or disrupt system performance
Who must approve software downloads from the internet?
The Information Services Division
Who is responsible for moving, installing, or disassembling Department computer equipment?
ISD personnel, or an approved designee
What is the main purpose of reviewing software by the ISD?
To ensure the software is used for lawful and productive endeavors
What happens to the copies of the registration and/or license agreement?
They are forwarded and maintained in ISD
What is prohibited in the Department's computer software usage?
The unauthorized copying of Department computer software
Who has the right to access a user's electronic communications messages?
The Department
What is the purpose of the Annexes in the Department's directive?
To provide an easy reference
What is the primary purpose of the Department's policy on computer equipment usage?
To limit the use of software/hardware to lawful and productive endeavors
Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?
The Department personnel
What is the primary concern of the Kansas City Missouri Police Department's computer system?
Both A and B
What is the purpose of the guidelines provided in this policy?
To protect the Department's computer system from unauthorized access
What is referred to as 'Privately owned personal computer equipment'?
Bring Your Own Device (BYOD)
What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?
Electronic Mail (E-mail)
What is the result of a break in the system security?
A breach in the system security
What is the purpose of the Policy Series 200?
To ensure the security of Department computer systems
What does the policy provide instructions on?
Computer systems, electronic mail, and Internet usage
What is the reference for the policy on Department-Owned Equipment-Privacy and Security?
Personnel Policy 330
What is the purpose of encryption?
To ensure only authorized parties can access information
What is a firewall?
A system designed to prevent unauthorized access to a private network
What is the purpose of a help desk?
To provide technical support to end users
What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?
The H Drive is a personal drive, while the I Drive is a shared resource drive
What is the primary function of the Internet?
To provide a worldwide network of computers linked together
What is a network?
A system of computers linked together by direct connection
What is the purpose of intranet?
To facilitate communication within an organization using Internet-based technologies
What is a hardware?
A physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system
Study Notes
Department Approved Program
- Upon approval from the Executive Committee, the Administration Bureau Commander or designee will review and forward all ITAC recommended and/or approved requests.
- The Commander will also follow up with the ITAC regarding any unapproved recommendations.
Electronic Mail (E-Mail) Communications
- Use of the e-mail system implies understanding and compliance with the directive and CJIS Security Policy.
- Members must use e-mail in an appropriate and professional manner.
- E-mail is considered property of the Department, not the member, and is subject to Sunshine Law requests.
- Members have no expectation of privacy in anything they store, send, or receive on the e-mail system.
- The Department may monitor e-mail without prior notice to the member.
- E-mail is for official use only, but incidental personal use is permissible with approval from the Chief of Police or designee.
Internet Usage
- Members must use the Internet in accordance with all applicable laws and regulations.
- Members must comply with copyright and license laws governing programs, data, and written materials accessed via the Internet.
- Downloading software from the Internet requires prior approval from the Information Services Division.
- Prohibited uses of the Internet include using connections for streaming services or private gain, and deliberate attempts to degrade or disrupt system performance.
Department Owned Computer Equipment
- The use of software/hardware on Department computers will be limited to lawful and productive endeavors.
- Unauthorized copying of Department computer software is prohibited.
- ISD personnel or an approved designee will move, install, or disassemble Department computer equipment.
- All software must be reviewed by the ISD prior to being installed on any Department computer.
Terminology
- Breach: A break in the system security that results in admittance of an unauthorized person or program to a Department computer system.
- BYOD: Privately owned personal computer equipment such as desktops, laptops, IPads, cellphones, or tablets.
- Encryption: The process of encoding a message or information in such a way that only authorized parties can access it.
- Firewall: A system designed to prevent unauthorized access to or from a private network.
- Hardware: The physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system.
- Help Desk: A resource intended to provide the end user with support and troubleshooting problems.
- Intranet: A system that uses Internet-based technologies within an organization to facilitate communication and provide integrated access to information.
- Internet: A worldwide network of computers linked together by various communication systems.
- Network: A system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods.
This quiz covers the procedures for implementing department-approved programs, including review and approval by the Executive Committee and ITAC recommendations.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free