Kansas City Police Department PII Procedures
34 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the effective date for the procedural instruction regarding Personally Identifiable Information (PII) by the Kansas City Missouri Police Department?

  • 03/25/2020 (correct)
  • 03/25/2022
  • 03/25/2019
  • 03/25/2021
  • What is defined as a breach of security according to the guidelines?

  • Unauthorized access that compromises personal information (correct)
  • Access by public citizens for accountability
  • Any access to PII by department members
  • Good faith access for business purposes
  • What does the Kansas City Missouri Police Department aim to establish with the guidelines for PII?

  • Increased public access to criminal records
  • Guidelines for data correction and transmission of PII (correct)
  • Standardized protocols for public inquiries
  • Enhanced surveillance methods for sensitive information
  • How does the procedural instruction describe good faith access to PII?

    <p>As acquisition for business purposes of the Department</p> Signup and view all the answers

    Which document does NOT get rescinded by the procedural instruction regarding PII?

    <p>PPBM Code of Ethics and Rules of Conduct</p> Signup and view all the answers

    What constitutes PII?

    <p>Information directly identifiable to an individual</p> Signup and view all the answers

    Which of the following is excluded from the definition of PII?

    <p>Publicly available information</p> Signup and view all the answers

    What type of information is considered sensitive data?

    <p>A person's date of birth</p> Signup and view all the answers

    Which of the following represents sensitive data that could lead to privacy issues if compromised?

    <p>Social Security Number</p> Signup and view all the answers

    Which of these is not typically classified as sensitive data?

    <p>Home telephone number</p> Signup and view all the answers

    Which information listed would be linked to sensitive data due to potential privacy breaches?

    <p>Date of Birth</p> Signup and view all the answers

    Which of the following is a key characteristic of sensitive data?

    <p>It could adversely affect individual privacy if accessed without authorization</p> Signup and view all the answers

    What type of identification number is considered sensitive information?

    <p>State Identification Number</p> Signup and view all the answers

    Who has the authority to amend records containing PII within the Department?

    <p>The Department element that created the record</p> Signup and view all the answers

    What must a member do upon becoming aware of a breach of PII?

    <p>Report to the Information Technology (IT) help desk immediately</p> Signup and view all the answers

    Under what circumstances can exceptions to the written directive be made?

    <p>Only with specific requests approved by the Chief of Police or designee</p> Signup and view all the answers

    What is the role of the Information Technology (IT) help desk in the event of a PII breach?

    <p>To notify the Local Area Security Officer (LASO) immediately</p> Signup and view all the answers

    What is the primary consideration for making changes to Department records containing PII?

    <p>The mission and needs of the Department with legal compliance</p> Signup and view all the answers

    What is the main purpose of collecting PII by the Department?

    <p>To ensure only authorized personnel have access to sensitive data.</p> Signup and view all the answers

    Which of the following individuals would NOT typically provide PII to the Department?

    <p>Private investigators conducting unrelated research.</p> Signup and view all the answers

    What should authorized members of the Department do with PII?

    <p>Protect it in accordance with their duties.</p> Signup and view all the answers

    In what formats does the Department collect PII?

    <p>In both electronic and conventional paper formats.</p> Signup and view all the answers

    What aspect of PII disclosure is emphasized by the Department's guidelines?

    <p>It must be reviewed on a case-by-case basis pursuant to law.</p> Signup and view all the answers

    What documents guide the Department's policies on accessing sensitive data?

    <p>Computerized Police Information Systems and Code of Ethics.</p> Signup and view all the answers

    Which statement reflects a commitment of the Department regarding PII?

    <p>Only authorized members protect PII in their duties.</p> Signup and view all the answers

    Which of the following options best represents a misuse of PII according to the Department's guidelines?

    <p>Accessing PII for personal gain or unrelated activities.</p> Signup and view all the answers

    What is required for accessing PII according to the established policies?

    <p>Information must only be used for official purposes.</p> Signup and view all the answers

    Under what condition can PII be shared with third parties?

    <p>With the individual’s written consent.</p> Signup and view all the answers

    What must an individual provide when requesting correction of their PII?

    <p>A written reason along with verifiable documentation.</p> Signup and view all the answers

    Which of the following is a requirement when accessing one's own PII?

    <p>A valid legal identification is required.</p> Signup and view all the answers

    When can PII be corrected or amended according to formal procedures?

    <p>If the information is found inaccurate or outdated.</p> Signup and view all the answers

    What is a situation in which PII may NOT be shared?

    <p>In violation of written directives or laws.</p> Signup and view all the answers

    What is the role of the Custodian of Records in relation to PII?

    <p>They manage and provide access to PII upon request.</p> Signup and view all the answers

    What safeguards exist regarding PII access to unauthorized individuals?

    <p>Only authorized personnel can assess the need for PII access.</p> Signup and view all the answers

    Study Notes

    Overview of Policies on Personally Identifiable Information (PII)

    • Guidelines established for the acquisition, use, storage, and transmission of PII and sensitive data by the Kansas City Missouri Police Department.
    • Public access to these guidelines allows individuals to understand how to correct their PII as collected by the Department.

    Terminology

    • Breach of Security: Unauthorized access that compromises personal information security; does not include good faith access by authorized personnel.
    • Personally Identifiable Information (PII): Any data that can be used to identify an individual, excluding publicly available or lawfully obtained information.
    • Sensitive Data: Information that, if lost or accessed unlawfully, could harm an individual's privacy; includes date of birth, Social Security Number, driver’s license, financial and medical information.

    Policy Commitment

    • The Department prioritizes the protection of PII and sensitive data, adhering to ethics and rules governing confidential information access.
    • Applies to all members who work with digital systems, communication channels, and data management.

    General Information on PII Handling

    • Collection and Use: PII is collected from citizens, vendors, and employees as part of regular operations, in electronic or paper formats.
    • Authorization: Access to PII is limited to authorized personnel using it strictly for official duties; sharing contrary to directives is prohibited.

    Sharing with Third Parties

    • PII can be shared in accordance with legal requirements, contracts, or with individual consent for criminal justice purposes.

    Correcting PII Information

    • Individuals may request to view or amend their PII under the Missouri Sunshine Law, needing valid identification.
    • Requests for corrections must be supported by written justification; amendments are at the Department's discretion.

    Security Breach Protocol

    • Any member aware of a potential breach must notify the IT help desk, which will then inform the Local Area Security Officer.

    Exceptions and Changes

    • Exceptions to the written directive can only be made with approval from the Chief of Police or designated individual, ensuring compliance with legal standards.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the procedural instructions regarding Personally Identifiable Information (PII) as issued by the Kansas City Missouri Police Department. It focuses on the policies and protocols established to protect sensitive information within computerized police systems. Learn about the references and amendments related to this important subject.

    More Like This

    Use Quizgecko on...
    Browser
    Browser