Podcast
Questions and Answers
Who reviews and forwards ITAC recommended and/or approved requests for final approval?
Who reviews and forwards ITAC recommended and/or approved requests for final approval?
What happens to unapproved ITAC recommendations?
What happens to unapproved ITAC recommendations?
What is the implied understanding of using the e-mail system?
What is the implied understanding of using the e-mail system?
What is considered property of the Department in Microsoft Outlook?
What is considered property of the Department in Microsoft Outlook?
Signup and view all the answers
Under what condition is incidental personal use of email permissible?
Under what condition is incidental personal use of email permissible?
Signup and view all the answers
What is the primary purpose of email in the Department?
What is the primary purpose of email in the Department?
Signup and view all the answers
What may happen to emails without prior notice to the member?
What may happen to emails without prior notice to the member?
Signup and view all the answers
What is an exception to the Department's email monitoring?
What is an exception to the Department's email monitoring?
Signup and view all the answers
What is the purpose of the Policy Acknowledgement System?
What is the purpose of the Policy Acknowledgement System?
Signup and view all the answers
What is required of Department members when using the internet?
What is required of Department members when using the internet?
Signup and view all the answers
What is prohibited when using the internet?
What is prohibited when using the internet?
Signup and view all the answers
Who must approve access to blocked websites?
Who must approve access to blocked websites?
Signup and view all the answers
What is the purpose of cleaning out email inboxes regularly?
What is the purpose of cleaning out email inboxes regularly?
Signup and view all the answers
What should internet users be wary of to prevent inadvertent software downloads?
What should internet users be wary of to prevent inadvertent software downloads?
Signup and view all the answers
What may be considered criminal activity when using the internet?
What may be considered criminal activity when using the internet?
Signup and view all the answers
Who must approve software downloads from the internet?
Who must approve software downloads from the internet?
Signup and view all the answers
Who is responsible for moving, installing, or disassembling Department computer equipment?
Who is responsible for moving, installing, or disassembling Department computer equipment?
Signup and view all the answers
What is the main purpose of reviewing software by the ISD?
What is the main purpose of reviewing software by the ISD?
Signup and view all the answers
What happens to the copies of the registration and/or license agreement?
What happens to the copies of the registration and/or license agreement?
Signup and view all the answers
What is prohibited in the Department's computer software usage?
What is prohibited in the Department's computer software usage?
Signup and view all the answers
Who has the right to access a user's electronic communications messages?
Who has the right to access a user's electronic communications messages?
Signup and view all the answers
What is the purpose of the Annexes in the Department's directive?
What is the purpose of the Annexes in the Department's directive?
Signup and view all the answers
What is the primary purpose of the Department's policy on computer equipment usage?
What is the primary purpose of the Department's policy on computer equipment usage?
Signup and view all the answers
Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?
Who is responsible for ensuring the Department's computer equipment is used for lawful and productive endeavors?
Signup and view all the answers
What is the primary concern of the Kansas City Missouri Police Department's computer system?
What is the primary concern of the Kansas City Missouri Police Department's computer system?
Signup and view all the answers
What is the purpose of the guidelines provided in this policy?
What is the purpose of the guidelines provided in this policy?
Signup and view all the answers
What is referred to as 'Privately owned personal computer equipment'?
What is referred to as 'Privately owned personal computer equipment'?
Signup and view all the answers
What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?
What is the system referred to as 'a system for sending and receiving messages electronically over a computer network'?
Signup and view all the answers
What is the result of a break in the system security?
What is the result of a break in the system security?
Signup and view all the answers
What is the purpose of the Policy Series 200?
What is the purpose of the Policy Series 200?
Signup and view all the answers
What does the policy provide instructions on?
What does the policy provide instructions on?
Signup and view all the answers
What is the reference for the policy on Department-Owned Equipment-Privacy and Security?
What is the reference for the policy on Department-Owned Equipment-Privacy and Security?
Signup and view all the answers
What is the purpose of encryption?
What is the purpose of encryption?
Signup and view all the answers
What is a firewall?
What is a firewall?
Signup and view all the answers
What is the purpose of a help desk?
What is the purpose of a help desk?
Signup and view all the answers
What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?
What is the difference between the Home Directory (H Drive) and the Information Drive (I Drive)?
Signup and view all the answers
What is the primary function of the Internet?
What is the primary function of the Internet?
Signup and view all the answers
What is a network?
What is a network?
Signup and view all the answers
What is the purpose of intranet?
What is the purpose of intranet?
Signup and view all the answers
What is a hardware?
What is a hardware?
Signup and view all the answers
Study Notes
Department Approved Program
- Upon approval from the Executive Committee, the Administration Bureau Commander or designee will review and forward all ITAC recommended and/or approved requests.
- The Commander will also follow up with the ITAC regarding any unapproved recommendations.
Electronic Mail (E-Mail) Communications
- Use of the e-mail system implies understanding and compliance with the directive and CJIS Security Policy.
- Members must use e-mail in an appropriate and professional manner.
- E-mail is considered property of the Department, not the member, and is subject to Sunshine Law requests.
- Members have no expectation of privacy in anything they store, send, or receive on the e-mail system.
- The Department may monitor e-mail without prior notice to the member.
- E-mail is for official use only, but incidental personal use is permissible with approval from the Chief of Police or designee.
Internet Usage
- Members must use the Internet in accordance with all applicable laws and regulations.
- Members must comply with copyright and license laws governing programs, data, and written materials accessed via the Internet.
- Downloading software from the Internet requires prior approval from the Information Services Division.
- Prohibited uses of the Internet include using connections for streaming services or private gain, and deliberate attempts to degrade or disrupt system performance.
Department Owned Computer Equipment
- The use of software/hardware on Department computers will be limited to lawful and productive endeavors.
- Unauthorized copying of Department computer software is prohibited.
- ISD personnel or an approved designee will move, install, or disassemble Department computer equipment.
- All software must be reviewed by the ISD prior to being installed on any Department computer.
Terminology
- Breach: A break in the system security that results in admittance of an unauthorized person or program to a Department computer system.
- BYOD: Privately owned personal computer equipment such as desktops, laptops, IPads, cellphones, or tablets.
- Encryption: The process of encoding a message or information in such a way that only authorized parties can access it.
- Firewall: A system designed to prevent unauthorized access to or from a private network.
- Hardware: The physical computer system or any physical part or mechanism used as an integral or peripheral component of a computer system.
- Help Desk: A resource intended to provide the end user with support and troubleshooting problems.
- Intranet: A system that uses Internet-based technologies within an organization to facilitate communication and provide integrated access to information.
- Internet: A worldwide network of computers linked together by various communication systems.
- Network: A system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the procedures for implementing department-approved programs, including review and approval by the Executive Committee and ITAC recommendations.