Chapter 36 - NCIC/TCIC
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should be done when locating a Missing Person record, assuming the hit does not include an extradition limitation or NOEX in the MIS field?

  • The record should be located, indicating the missing person's whereabouts have been determined. (correct)
  • The record should not be located, as the person is still missing until the originating agency confirms.
  • The record should not be located, as the originating agency must clear the record.
  • The record should be located, but only if the originating agency clears the record.

Which of the following types of records should be located upon finding the subject or property?

  • Stolen License Plate, Stolen Boat, Stolen / Felony Vehicle, Stolen / Felony Gun
  • Missing Person, Wanted Person, Stolen Security Record, Stolen Article
  • All of the above (correct)
  • Only records that are subject to extradition limitations

What is the purpose of placing a locate on a record?

  • To ensure the record is not accessed by other agencies until the originating agency clears it.
  • To ensure the originating agency is notified of the apprehension or recovery.
  • To prevent the record from being cleared by the originating agency.
  • To indicate the wanted person has been apprehended or the property has been located. (correct)

When locating a record, who sends the Hit Confirmation Request to the agency that entered the record?

<p>The Information Dispatcher (C), The TLETS Operator (D)</p> Signup and view all the answers

What type of document is a detainer?

<p>A request to a correctional agency to retain a prisoner. (D)</p> Signup and view all the answers

What is the significance of ensuring that all NCIC/TCIC records are validated correctly each month?

<p>To maintain accurate and up-to-date data in the system (D)</p> Signup and view all the answers

Why is it necessary for operators to be trained in the 'Hit Confirmation Process'?

<p>To confirm the identity of individuals in custody accurately (C)</p> Signup and view all the answers

What should be done with all Quality Control Messages from NCIC/TCIC?

<p>They should be reviewed and corrected as soon as possible (C)</p> Signup and view all the answers

What action is required if any changes occur to an agency's TAC or administrator?

<p>Advise the DPS/CRS of the changes (C)</p> Signup and view all the answers

Why is it important for NCIC/TCIC Computerized Criminal History information to be treated as confidential?

<p>To maintain public safety and protect individuals' rights (B)</p> Signup and view all the answers

What is the main responsibility of the TAC and ATAC in relation to inquiries made to DPS?

<p>They are the designated points of contact for coordinating inquiries to DPS. (C)</p> Signup and view all the answers

What actions are taken if a complainant has an active stolen vehicle record that is 90 days or older?

<p>Contact is made with the complainant and/or insurance companies. (A)</p> Signup and view all the answers

What is one of the requirements for the NCIC/TCIC audit conducted by the FBI?

<p>The audit must include an on-site review of policies and procedures. (D)</p> Signup and view all the answers

During the first phase of the NCIC/TCIC audit, whose role is primarily covered in interviews?

<p>The Terminal Agency Coordinator / Alternate Terminal Agency Coordinator. (D)</p> Signup and view all the answers

What happens if someone outside the TAC or ATAC contacts DPS directly?

<p>Their request may be denied and redirected to the TAC. (A)</p> Signup and view all the answers

Flashcards

Monthly NCIC/TCIC Record Validation

Ensuring all NCIC/TCIC records are checked for accuracy monthly and a signed certification letter is sent back within the given timeframe to the Crime Records Service/TCIC Control Terminal

Quality Control Message Review

Reviewing and correcting any quality control messages received from NCIC/TCIC as soon as possible.

NCIC/TCIC Training and Record Keeping

Ensuring that all personnel who access the NCIC/TCIC system receive proper training on its use, policies, and procedures, and maintaining records for audits.

Hit Confirmation Process and Document Availability

Confirming that all original warrants and reports related to NCIC/TCIC records are readily available at all times.

Signup and view all the flashcards

Double-Checking NCIC/TCIC Entries

Ensuring that a second person checks all entries made into NCIC/TCIC system.

Signup and view all the flashcards

Who handles NCIC/TCIC inquiries from Bexar County?

The Texas Department of Public Safety (DPS) is the designated point of contact for all NCIC/TCIC inquiries from Bexar County.

Signup and view all the flashcards

What is the purpose of the NCIC/TCIC audit?

The NCIC/TCIC audit ensures Bexar County Sheriff's Office follows NCIC/TCIC policies and procedures.

Signup and view all the flashcards

What are the key parts of the NCIC/TCIC audit?

The NCIC/TCIC audit involves reviewing manuals, running system tests, and interviewing the Terminal Agency Coordinator.

Signup and view all the flashcards

Why are NCIC/TCIC audits mandated?

The FBI requires all states to conduct regular NCIC/TCIC audits to ensure the effectiveness of state control terminals.

Signup and view all the flashcards

What aspects are examined during the NCIC/TCIC audit?

The audit includes reviewing security measures, training practices, and quality control procedures related to NCIC/TCIC data.

Signup and view all the flashcards

Detainer

A request from one agency to another agency to hold an individual in custody. This is done when an individual is wanted by the first agency but is currently under the jurisdiction of the second agency.

Signup and view all the flashcards

Hit Confirmation Request

A procedure used to confirm the validity and status of a wanted person or missing person record.

Signup and view all the flashcards

Locate

The action of informing an agency that a missing person has been found or a wanted person has been apprehended.

Signup and view all the flashcards

Placing a Locate

The process of updating a record in the system to reflect that a person has been located or a property has been recovered.

Signup and view all the flashcards

Record

A record that contains information about a wanted person, missing person, or stolen property.

Signup and view all the flashcards

Study Notes

NCIC/TCIC 2000

  • Nationwide computerized information system for criminal justice agencies
  • Aims to provide accurate and timely criminal justice information
  • Operated by the Texas Department of Public Safety (DPS)
  • Connects with NLETS/TLETS network
  • Agencies with terminals can access information from various jurisdictions.
  • Information is only shared with authorized agencies.
  • Allows for entry, modification, cancellation, and inquiry of stolen property and wanted persons.
  • Bexar County Sheriff's Office has a designated Terminal Agency Coordinator (TAC) to ensure compliance.

Terminal Agency Coordinator/Alternate TAC

  • Responsible for ensuring compliance with NCIC/TCIC 2000 policies
  • Acts as a liaison between the Bexar County Sheriff's Office, Bexar County, and the Crime Records Service (CRS) of the Texas DPS.
  • Ensures that the NCIC/TCIC Operating Manual and NCIC Code Manual are current and available.
  • Reviews and distributes newsletters concerning NCIC/TCIC policies.
  • Ensures training of all personnel on NCIC/TCIC system usage and policies.
  • Maintains training records for NCIC/TCIC/FBI Audits.

Audits

  • Biennial or triennial on-site reviews of Bexar County Sheriff’s Office policies and procedures.
  • Auditors verify compliance with NCIC/TCIC and NLETS/TLETS manuals, and CR/TLETS newsletters.
  • Auditors perform four inquiries to test system response time using hot and Interstate Identification Index files.

Training

  • Training is mandatory for personnel accessing NCIC/TCIC information.
  • Peace Officers and Law Enforcement Recruits can attend training.
  • Personnel with a one-year or more service break must re-attend training.

Security

  • NCIC/TCIC data is confidential and access must be authorized.
  • Data must be protected to ensure correct, legal, and efficient use.
  • Individuals requesting information must be authorized, otherwise access is restricted.
  • Records are subject to retention periods.

Quality Control

  • NCIC/TCIC Control Center reviews all records for accuracy.
  • Agencies receive 24 hours for correction, cancellation or confirmation of record accuracy.
  • Critical error detection is the responsibility of FBI CJIS.
  • Messages indicating issues are sent to the appropriate division or section.

Wanted Persons

  • The system cross-references information in various files.
  • Updated criminal history inquiries/background checks every 5 years.
  • Records can be located and confirmed.
  • The record must be in located status to receive a detainer.

Missing Persons

  • Entries can be made for people of any age.
  • A case will be activated when all criteria required are met.
  • Operators must use a specific query to verify information, and the appropriate record is updated and confirmation are received.

Special Files

  • Provides crucial information for officer safety and investigations.
  • Files for individuals with criminal history, those with immigration violations or potential risk, or individuals with gang ties or ties to terrorism.

Protective Orders

  • The proper law enforcement agency inputs the information into the system.
  • Protective orders are filed alphabetically by the respondent's last name.

Validation

  • Monthly validation checks are performed for accuracy.
  • Records are validated 60 to 90 days after entry and annually afterward.
  • DPS validates the records entered and sent back to the entry agency for adjustments.
  • Failure to comply with the validation guidelines may result in record cancellation.

Security

  • Strict adherence to security procedures and policies.
  • Physical security of terminals to reduce inadvertent viewing or compromise of confidential data.
  • Appropriate measures to ensure information security and prevent unauthorized access to data.

TCIC/NCIC 2000 Messages

  • Automated notifications via messages about record status changes.
  • Separate codes for different types of messages (e.g., $.D, $.E, $.H).
  • Timely responses to messages are essential for maintaining the integrity of records.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the NCIC/TCIC 2000 system, essential for criminal justice agencies in Texas. This quiz covers its operation, the roles of Terminal Agency Coordinators, and the compliance with policies and guidelines. Test your knowledge on the functionalities and regulations surrounding this crucial information system.

More Like This

Computer - NCIC Access
16 questions

Computer - NCIC Access

ConfidentTaylor avatar
ConfidentTaylor
NCIC/TCIC Overview and Security Access
28 questions
NCIC HC-E911 Flashcards
30 questions
Use Quizgecko on...
Browser
Browser