Podcast
Questions and Answers
What is the effective date for the procedural instruction regarding Personally Identifiable Information (PII) by the Kansas City Missouri Police Department?
What is the effective date for the procedural instruction regarding Personally Identifiable Information (PII) by the Kansas City Missouri Police Department?
What is defined as a breach of security according to the guidelines?
What is defined as a breach of security according to the guidelines?
What does the Kansas City Missouri Police Department aim to establish with the guidelines for PII?
What does the Kansas City Missouri Police Department aim to establish with the guidelines for PII?
How does the procedural instruction describe good faith access to PII?
How does the procedural instruction describe good faith access to PII?
Signup and view all the answers
Which document does NOT get rescinded by the procedural instruction regarding PII?
Which document does NOT get rescinded by the procedural instruction regarding PII?
Signup and view all the answers
What constitutes PII?
What constitutes PII?
Signup and view all the answers
Which of the following is excluded from the definition of PII?
Which of the following is excluded from the definition of PII?
Signup and view all the answers
What type of information is considered sensitive data?
What type of information is considered sensitive data?
Signup and view all the answers
Which of the following represents sensitive data that could lead to privacy issues if compromised?
Which of the following represents sensitive data that could lead to privacy issues if compromised?
Signup and view all the answers
Which of these is not typically classified as sensitive data?
Which of these is not typically classified as sensitive data?
Signup and view all the answers
Which information listed would be linked to sensitive data due to potential privacy breaches?
Which information listed would be linked to sensitive data due to potential privacy breaches?
Signup and view all the answers
Which of the following is a key characteristic of sensitive data?
Which of the following is a key characteristic of sensitive data?
Signup and view all the answers
What type of identification number is considered sensitive information?
What type of identification number is considered sensitive information?
Signup and view all the answers
Who has the authority to amend records containing PII within the Department?
Who has the authority to amend records containing PII within the Department?
Signup and view all the answers
What must a member do upon becoming aware of a breach of PII?
What must a member do upon becoming aware of a breach of PII?
Signup and view all the answers
Under what circumstances can exceptions to the written directive be made?
Under what circumstances can exceptions to the written directive be made?
Signup and view all the answers
What is the role of the Information Technology (IT) help desk in the event of a PII breach?
What is the role of the Information Technology (IT) help desk in the event of a PII breach?
Signup and view all the answers
What is the primary consideration for making changes to Department records containing PII?
What is the primary consideration for making changes to Department records containing PII?
Signup and view all the answers
What is the main purpose of collecting PII by the Department?
What is the main purpose of collecting PII by the Department?
Signup and view all the answers
Which of the following individuals would NOT typically provide PII to the Department?
Which of the following individuals would NOT typically provide PII to the Department?
Signup and view all the answers
What should authorized members of the Department do with PII?
What should authorized members of the Department do with PII?
Signup and view all the answers
In what formats does the Department collect PII?
In what formats does the Department collect PII?
Signup and view all the answers
What aspect of PII disclosure is emphasized by the Department's guidelines?
What aspect of PII disclosure is emphasized by the Department's guidelines?
Signup and view all the answers
What documents guide the Department's policies on accessing sensitive data?
What documents guide the Department's policies on accessing sensitive data?
Signup and view all the answers
Which statement reflects a commitment of the Department regarding PII?
Which statement reflects a commitment of the Department regarding PII?
Signup and view all the answers
Which of the following options best represents a misuse of PII according to the Department's guidelines?
Which of the following options best represents a misuse of PII according to the Department's guidelines?
Signup and view all the answers
What is required for accessing PII according to the established policies?
What is required for accessing PII according to the established policies?
Signup and view all the answers
Under what condition can PII be shared with third parties?
Under what condition can PII be shared with third parties?
Signup and view all the answers
What must an individual provide when requesting correction of their PII?
What must an individual provide when requesting correction of their PII?
Signup and view all the answers
Which of the following is a requirement when accessing one's own PII?
Which of the following is a requirement when accessing one's own PII?
Signup and view all the answers
When can PII be corrected or amended according to formal procedures?
When can PII be corrected or amended according to formal procedures?
Signup and view all the answers
What is a situation in which PII may NOT be shared?
What is a situation in which PII may NOT be shared?
Signup and view all the answers
What is the role of the Custodian of Records in relation to PII?
What is the role of the Custodian of Records in relation to PII?
Signup and view all the answers
What safeguards exist regarding PII access to unauthorized individuals?
What safeguards exist regarding PII access to unauthorized individuals?
Signup and view all the answers
Study Notes
Overview of Policies on Personally Identifiable Information (PII)
- Guidelines established for the acquisition, use, storage, and transmission of PII and sensitive data by the Kansas City Missouri Police Department.
- Public access to these guidelines allows individuals to understand how to correct their PII as collected by the Department.
Terminology
- Breach of Security: Unauthorized access that compromises personal information security; does not include good faith access by authorized personnel.
- Personally Identifiable Information (PII): Any data that can be used to identify an individual, excluding publicly available or lawfully obtained information.
- Sensitive Data: Information that, if lost or accessed unlawfully, could harm an individual's privacy; includes date of birth, Social Security Number, driver’s license, financial and medical information.
Policy Commitment
- The Department prioritizes the protection of PII and sensitive data, adhering to ethics and rules governing confidential information access.
- Applies to all members who work with digital systems, communication channels, and data management.
General Information on PII Handling
- Collection and Use: PII is collected from citizens, vendors, and employees as part of regular operations, in electronic or paper formats.
- Authorization: Access to PII is limited to authorized personnel using it strictly for official duties; sharing contrary to directives is prohibited.
Sharing with Third Parties
- PII can be shared in accordance with legal requirements, contracts, or with individual consent for criminal justice purposes.
Correcting PII Information
- Individuals may request to view or amend their PII under the Missouri Sunshine Law, needing valid identification.
- Requests for corrections must be supported by written justification; amendments are at the Department's discretion.
Security Breach Protocol
- Any member aware of a potential breach must notify the IT help desk, which will then inform the Local Area Security Officer.
Exceptions and Changes
- Exceptions to the written directive can only be made with approval from the Chief of Police or designated individual, ensuring compliance with legal standards.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the procedural instructions regarding Personally Identifiable Information (PII) as issued by the Kansas City Missouri Police Department. It focuses on the policies and protocols established to protect sensitive information within computerized police systems. Learn about the references and amendments related to this important subject.