Osceola County Sheriff's Office: Computer use policy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following scenarios requires a member to report a lost or stolen External Memory Storage Device to IMS as soon as possible?

  • The device was personally owned, encrypted with agency-approved software, and contains sensitive case information. (correct)
  • The device was used to store temporary files and was not encrypted.
  • The device contains only personal photos and is password protected.
  • The device was provided by the Sheriff's Office and contains unencrypted training materials.

An officer needs to access a secure database remotely. According to policy, what is the MOST secure method for authentication?

  • Using Advanced Authentication (AA) methods such as proximity badges or Cisco DUO. (correct)
  • Using a shared generic login provided by a supervisor
  • Using a digital certificate stored on an unencrypted USB drive
  • Using a standard username and password entered on a personal computer

What is the primary reason for the policy regarding agency computers and the data they hold?

  • To limit the need for software updates and hardware maintenance.
  • To allow members unrestricted access for personal use.
  • To encourage the use of non-agency hardware and software for cost savings.
  • To ensure compliance with federal and state regulations, and to maintain security and integrity of data. (correct)

A detective wants to use a personally-owned software for a specialized data analysis related to an ongoing investigation. Which procedure MUST they follow to comply with the policy?

<p>Request permission from their section lieutenant/manager, who will then seek recommendations from IMS and approval from the Division Captain. (A)</p> Signup and view all the answers

An officer is placed on administrative leave. What steps must be taken regarding their Mobile Data Computer (MDC)?

<p>The supervisor must ensure the MDC is promptly returned to IMS, unless a Bureau Major provides a waiver. (C)</p> Signup and view all the answers

What constitutes a 'Business Day' according to the Osceola County Sheriff's Office policy on agency computers?

<p>Monday through Friday, excluding approved Sheriff's Office holidays. (B)</p> Signup and view all the answers

According to the policy, what actions should a member take when they receive an email that was clearly sent to them in error?

<p>Contact the sender and destroy the material received. (A)</p> Signup and view all the answers

An investigator needs to transmit Criminal Justice Information (CJI) to another agency. Which method is MOST compliant with the outlined policy?

<p>Using transmission methods approved by IMS, such as Florida Criminal Justice Network (CJNET), Email System or other verifiable encryption processes. (D)</p> Signup and view all the answers

A detective wants to ensure that all emails sent from their account automatically include a 'Confidentiality Notice'. What action should they take?

<p>Contact the Sheriff's Office Information Technology Director or designee to determine the exact wording of the notice, and have it automatically added to each email. (A)</p> Signup and view all the answers

What responsibility does County IT have regarding the agency's Computerized Central Record System (CAD/RMS)?

<p>County IT is responsible for the overall functionality, logical network perimeter security, and management of components related to all agency networking requirements. (D)</p> Signup and view all the answers

Flashcards

Computer

A programmable electronic machine that can store, retrieve, perform mathematical or logical operations, and process information.

Criminal Justice Information (CJI)

Information provided by the FBI, including biometric data, identity history, and case/incident data.

CJIS (Criminal Justice Information Services)

Federal requirements protecting the sources, transmission, storage, and generation of Criminal Justice Information.

Email System

A software system that allows for sending and receiving electronic correspondence, email storage, and calendar scheduling.

Signup and view all the flashcards

Hardware

All electronic parts of a computer system, including peripherals, circuit boards, and input/output devices.

Signup and view all the flashcards

Information Management Services (IMS)

A unit within the Osceola County Sheriff's Office responsible for managing hardware components and software applications.

Signup and view all the flashcards

Intranet

A local or restricted communications network, often a private network using World Wide Web software.

Signup and view all the flashcards

Logon

Unique identifier assigned to each user account, usually indicating the person's name who is registered.

Signup and view all the flashcards

Mobile Data Computer (MDC)

Commercial grade mobile computers in law enforcement vehicles, capable of accessing system servers via a CJIS compliant connection.

Signup and view all the flashcards

Password

Characters created by a user needed along with a username, in order to access a User Account.

Signup and view all the flashcards

Study Notes

  • Osceola County Sheriff's Office policy and procedures are defined in document number 218.0, effective as of 12/05/22
  • The policy intends to establish clear procedures for member use of computer systems, as per CFA 26.04 and 32.01

Policy Regulations

  • The Osceola Sheriff’s Office regulates all computer hardware and software owned, purchased, grant-funded, donated, or leased that are used by agency members
  • Regulations apply to the use of non-agency computers or personal communication devices while on duty or acting as an agency representative
  • Members have no expectation of privacy when using agency computers, other computers, or personal communication devices in their agency representative roles.

Key Definitions

  • Advanced Authentication (AA) provides extra security, like biometric systems, for user identification, login IDs, and passwords.
  • Business Day is defined as Monday through Friday, excluding approved Sheriff’s Office holidays
  • Chain Messages are broadly transmitted or forwarded emails that do not relate to official agency business
  • Computer is a programmable electronic machine for storing, retrieving, and processing data, including laptops and personal communication devices
  • Confidentiality Notice is an email addition stating the message is covered by F.S.S. 119, requiring the recipient to contact the sender and destroy the material if they are not the intended receiver
  • County Information Technology Services (County IT) is responsible for network and internet access across all agency facilities
  • Criminal Justice Information (CJI) from the FBI includes biometric data, identity history, and case/incident data.
  • CJIS (Criminal Justice Information Services) are the federal requirements to protect the sources, transmission, storage, and generation of CJI
  • Digital Certificate validates user access using encrypted data exchange to prevent unauthorized entry
  • ELVIS refers to the Electronic License and Vehicle Information Database
  • Email System permits the sending and receiving of electronic messages, and includes folders for storage/ a calendar
  • External Memory Storage Devices include external hard drives/ USB flash drives for various data storage needs
  • Florida Criminal Justice Network is a limited-access website operated by the Florida Department of Law Enforcement, offering resources and database access to criminal justice agencies
  • Hardware includes all electronic components of a computer system, such as peripherals, circuit boards, and tablets
  • Information Management Services (IMS) is responsible for hardware and software maintenance.
  • Instant Message allows users to perpetuate conversations without delay
  • Intranet, a local or restricted communications network created using World Wide Web Software.
  • Logon, a unique identifier assigned to each User Account, indicating the name of the registered person
  • MiFi Hotspot is a portable broadband device used by multiple end users
  • Mobile Data Computer (MDC) is a commercial-grade mobile computer in law enforcement vehicles that can access system servers
  • Password is a string of characters, alpha and/or numeric, needed along with a username to access a User Account.
  • Personal Communication Device includes cell phones, pagers, e-mail devices, personal digital assistants, and “tablet” style computers
  • Personally Identifiable Information (PII) is any data used to trace an individual's identity, like name, social security number, or biometric records
  • Security safeguards physical or logical access to personnel, information, or assets of the agency
  • Server(s) are high-capacity computers that store and retrieve data
  • Software is a computer program, with instructions written in a specific language, for various operations
  • Transitory Message is informal communication of short-term value, such as reminders about scheduled meetings
  • User Account is an account for agency personnel to securely access systems, requiring a username and password
  • Website is any computerized document, file, or menu accessible online e.g. the Internet
  • Wireless Access Point (WAP) allows wireless devices to connect to a wired network using Wi-Fi or Bluetooth.

Proper Access and Usage

  • All access to and/or use of any agency computer, server, or personal device must follow FSS 817.568
  • Improper use or unauthorized access to agency computers, digital certificates, systems, or networks may lead to discipline
  • Improper use includes commercial activities, offensive content, gaming, copyright violations, privacy violations, vandalism, or misuse of email systems
  • All hardware and software must comply with copyright laws and manufacturer guidelines

Hardware Guidelines

  • Only agency approved hardware should be used

Computer Terminal Sharing

  • Ensure the use of own username and password

Non-Agency Hardware

  • Members wishing to use hardware must request permission
  • Need recommendation from IMS and Division Captain approval
  • User responsible for support, maintenance, and damage

Unbudgeted Requests

  • Must go through chain of command
  • Must provide IMS with a copy

Installing, Opening, and Modifying

  • Only to be done by the IMS Unit

Loss or Theft Reporting

  • Any loss should be immediately reported to IMS
  • A full accident report must be completed and is subject to administrative review

Communication Devices

  • Include air cards, MiFi hotspots, body cams, cellular devices, and mobile data computers

External Memory Storage Device protocols

  • Requires approval and email from IMS supervisor
  • Must be periodically scanned for viruses
  • Must be encrypted
  • Any loss or theft must be immediately reported

Software Guidelines

  • Only agency approved software allowed

  • Request permission from Section Lieutenant/Manager for use of non-agency software

  • Requires recommendation from IMS and Division Captain approval

  • User responsible for maintenance and damage

  • Providing Original Software Info

  • Provide to IMS for Non-Agency Software Installed

Software Compatibility

  • Must be compatible with existing programs
  • Must not reduce the productivity of the record management systems

Games and Entertainment

  • They are not to be installed

Installation Source

  • The IMS unit must authorize the source

Security Measures

  • Divided into physical and logical security
  • Maintain physical security so they can't be physically used by unauthorized people
  • Maintain logical security to block unauthorized access

Unattended Computer Protocols

  • Log out or password lock the terminal or workstation

Member Responsibility

  • Maintain Physical Security of all assigned devices configured to auto password lock

Password Guidelines

  • Min. 8 Characters
  • Not a dictionary word
  • Not in combination of repeated characters
  • Not the same as the User name
  • Expire after 90 days
  • Not the previous 10 passwords
  • Not transmitted in clear text
  • Not displayed when entered
  • Discouraged use of personal information

Password Security

  • Never share passwords
  • Contact IMS unit for assistance
  • Do not write passwords down
  • Responsible for your own password login
  • Do not create administrative accounts without approval

More Password Protocols

  • Designated programs shall force periodic password changes
  • Contact IMS for assistance
  • Advanced Authentication (AA) to be used with computers located outside of secure location
  • Proximity badges and Cisco DUO are approved by IMS for use in AA

AA Requirements

  • Members must ensure proper AA solutions
  • Report issues to IMS department
  • Members must not disable AA requirements, and are subject to discipline

HR Protocols

  • HR must be kept in the loop of employee changes
  • Notify IMS, DAVID system point of contact, and FCIC Terminal Agency Coordinator (TAC)
  • All parties must remove the employee from the system within 24 hours

Computer and Hardware usage

  • Should be for agency business
  • Similar to phone use, members may access for personal reasons

Restricted Device Use

  • Any use is restricted, watched, and regulated
  • May include college work, volunteer activities, and law enforcement training

Don't share info from external source

  • Must not transfer any information from the NCIC or FCIC

Email and Instant Message regulations

  • The software includes servers and daily monitoring of each account
  • Establish an email after contact with the IMS helpdesk
  • Requests should include purpose, department, and info

User Account Protocols

  • Fixed size mailbox
  • Delete transitory messages
  • File maintained messages
  • Responsibility of purging all deleted folders

Restricted Contact List

  • All Sheriff Email List, use the "All Sheriff's" email distribution list
  • Receive approval from the Division Captain or civilian equivalent

"Out of Office" Rules

  • If away for More than Business Day
  • Located under the "File" tab of outlook

Personal Communication Regulations

  • Minimum use of the agency email
  • Must not interfere with officer duties
  • Must be infrequent

Email and Instant Message Laws

  • Considered public record
  • Can be viewed unless there is any exemption
  • Excludes transmissions approved by the IMS
  • Email system is the property of the sheriffs department

Assumed Confidentiality

  • There is none
  • Even after deleting, the message can still be retrieved and read
  • Sheriff has the right to review and disclose messages within the email system

Unauthorized contact protocols

  • Unauthorized to retrieve any emails without the contact of the supervisor
  • Instant messages shall not circumvent radio communications
  • No messaging while the vehicle is moving

Digital Business Card Protocol

  • Utilize green and white Sheriff's department business card at the footer of the email
  • All emails must obtain a Confidentiality Notice

Internet Use

  • Provided by the agency for research, administrative processes, community service, and agency business
  • Should not interfere with policy
  • Websites must be authorized members to alter them

Wireless Access

  • Approved personnel have access to an agency maintained WAP

Wireless Access Protocols

  • Personnel using this access point must agree with all IMS guidelines
  • Violation leads to being blocked

User Maintenance

  • Members perform procedures for their assigned computers
  • Those unsure need to contact IMS

Spillman and County Network

  • Directed to the IMS HelpDesk

Communication

  • Problems or needs relating to modem lines, E-agent, FCIC/NCIC, or CJNET should be directed to the IMS Helpdesk.

Web Page and Intranet Protocol

  • Members must contact the Public and Media Relations Section

User assistance protocol

  • Direct all problems to the IMS service desk
  • Notification by automatic messaging

After Hours Requests

  • Contact on-call IMS personnel via communication

Mobile Data Computer (MDC) protocol

  • The officer is responsible for use
  • Supervisors must return equipment of subordinate
  • Repair and maintain promptly
  • Use MDC only in alignment with guidelines

Safety Protocols

  • Must be operated safely
  • Never operate while in motion

Security Guideline

  • Safeguard the info and lock the screen

Protocol for when not in service

  • MDC Should be removed from the mount
  • MDCS shall not be defaced

Printer protocols

  • Contact IMS unit for a list of recommended printers
  • MDC Owners are responsible for printer costs
  • Secure the damage
  • Must follow driver installation protocol

CAD and RMS Protocols

  • IT has overall agency responsibility
  • IT has logical network perimeter security
  • IMS has overall responsibility for agency system backups, contact list, email, and document management Software.

Additional Server Protocols

  • Sherriff or designee may need to create servers
  • Servers must store records and database info
  • All data's and databases are backed up regularly and securely

Data Storage Protocol

  • All hard copies retained are subject to policy

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Access Control Definition Quiz
12 questions
Antivirus Policy and Threat Detection
10 questions
Mobile Data Computers - MDC's
16 questions
Agency Computer Systems Policy
15 questions
Use Quizgecko on...
Browser
Browser