Podcast
Questions and Answers
What is required of department members regarding criminal history information in case files submitted to prosecutors' offices?
What is required of department members regarding criminal history information in case files submitted to prosecutors' offices?
- All criminal history information may be included regardless of user agreements.
- Criminal history information can be included if a monthly report is submitted.
- Only summaries of criminal history information without specifics can be included.
- A signed user agreement must be in place before including any criminal history information. (correct)
Which level of security awareness training is designed for personnel with unescorted access to a physically secure location?
Which level of security awareness training is designed for personnel with unescorted access to a physically secure location?
- Level 1 (correct)
- Level 2
- Level 4
- Level 3
How frequently must all personnel with access to Criminal Justice Information undergo basic security awareness training?
How frequently must all personnel with access to Criminal Justice Information undergo basic security awareness training?
- Within six months of hire and every two years thereafter. (correct)
- At any time they feel it is necessary.
- Every year after their initial hire.
- Once every five years.
What action is permitted when computer technology is found to improve police operations?
What action is permitted when computer technology is found to improve police operations?
Which level of security awareness training is meant for personnel with information technology roles?
Which level of security awareness training is meant for personnel with information technology roles?
What is a potential consequence of making secondary disseminations of criminal history information?
What is a potential consequence of making secondary disseminations of criminal history information?
What is the primary focus of the security awareness training levels defined?
What is the primary focus of the security awareness training levels defined?
Which statement accurately describes personnel who have access to Criminal Justice Information but lack physical and logical access?
Which statement accurately describes personnel who have access to Criminal Justice Information but lack physical and logical access?
What is required for all inquiries made to the CJIS System?
What is required for all inquiries made to the CJIS System?
Which of the following is NOT mandated for personnel assigned to computer terminal operations?
Which of the following is NOT mandated for personnel assigned to computer terminal operations?
What must be done before releasing individuals who have been arrested and booked?
What must be done before releasing individuals who have been arrested and booked?
Who is primarily responsible for the integrity of computer operations in relation to MULES and NCIC?
Who is primarily responsible for the integrity of computer operations in relation to MULES and NCIC?
What type of information does the NCIC network involve?
What type of information does the NCIC network involve?
What should be done with requests for historical data retrieval?
What should be done with requests for historical data retrieval?
What is the consequence of any violation of security in computer operations?
What is the consequence of any violation of security in computer operations?
Which of the following is true regarding computer terminal operations?
Which of the following is true regarding computer terminal operations?
Who must witness or carry out the sanitization or destruction of criminal history record information?
Who must witness or carry out the sanitization or destruction of criminal history record information?
What is the consequence of unauthorized release of criminal history record information?
What is the consequence of unauthorized release of criminal history record information?
Which section personnel can release criminal history record information from the Department?
Which section personnel can release criminal history record information from the Department?
What category of records includes arrest reports and incident reports?
What category of records includes arrest reports and incident reports?
Who has the discretion to determine if a record will be deemed closed under state statute?
Who has the discretion to determine if a record will be deemed closed under state statute?
What must be followed for the collection, storage, and release of criminal history records?
What must be followed for the collection, storage, and release of criminal history records?
To whom is non-conviction CHRI generally inaccessible?
To whom is non-conviction CHRI generally inaccessible?
Which document outlines the procedures for furnishing copies of criminal record information?
Which document outlines the procedures for furnishing copies of criminal record information?
What is the primary criteria for releasing records of completed criminal investigations?
What is the primary criteria for releasing records of completed criminal investigations?
How will private security officers and companies receive information regarding criminal history?
How will private security officers and companies receive information regarding criminal history?
What is required for unauthorized public agencies to access criminal history record information?
What is required for unauthorized public agencies to access criminal history record information?
What is the role of the Department OGC concerning attorneys requesting criminal history records?
What is the role of the Department OGC concerning attorneys requesting criminal history records?
What should be done if there is uncertainty about the lawful release of criminal history information?
What should be done if there is uncertainty about the lawful release of criminal history information?
What authority does the OGC have regarding requests for records not specifically outlined?
What authority does the OGC have regarding requests for records not specifically outlined?
How will current investigations be handled regarding public information release?
How will current investigations be handled regarding public information release?
How can non-conviction criminal history record information be accessed for employment checks?
How can non-conviction criminal history record information be accessed for employment checks?
What is the condition under which warrants cannot be revealed?
What is the condition under which warrants cannot be revealed?
What is Purpose Code C primarily associated with?
What is Purpose Code C primarily associated with?
Which of the following is NOT an example of an authorized use for Purpose Code C?
Which of the following is NOT an example of an authorized use for Purpose Code C?
Which of the following is a valid scenario under Purpose Code C?
Which of the following is a valid scenario under Purpose Code C?
What type of records incurs a fee for release, as per Missouri statutes?
What type of records incurs a fee for release, as per Missouri statutes?
Which of these roles is an example of someone who would not involve in the administration of criminal justice?
Which of these roles is an example of someone who would not involve in the administration of criminal justice?
Under what circumstances can confinement facility visitors access criminal history records?
Under what circumstances can confinement facility visitors access criminal history records?
What type of organizations or individuals may use Purpose Code C for criminal history inquiries?
What type of organizations or individuals may use Purpose Code C for criminal history inquiries?
Flashcards are hidden until you start studying
Study Notes
Personally Identifiable Information (PII) and Data Security
- Computer technology will be used to enhance police operations when resources are available.
- Compliance with CJIS rules and state statutes is mandatory; criminal history info must not be included in case files to prosecutors unless a signed user agreement is in place.
Security Awareness Training
- Basic security awareness training is required within six months of hire and biennially thereafter for personnel with access to Criminal Justice Information (CJI).
- Training levels include:
- Level 1: Unescorted access to secure areas but no use of CJI.
- Level 2: Personnel may encounter CJI in duties; no physical/logical access.
- Level 4: IT personnel with comprehensive access to CJI systems.
CJIS Inquiries and Operations
- Personnel must be proficient in CJIS, MULES, NCIC, and terminal operations.
- Unique identifiers required for all CJIS inquiries; member's ID and password must not be shared.
- Station personnel must ensure all arrestees are computer checked before release.
Compliance and Integrity
- The department must maintain security and discipline related to MULES and NCIC systems.
- Violations of security protocols may lead to investigation and disciplinary actions.
- Information exchanged over NCIC is privileged and accessible only for official criminal justice business.
Criminal History Record Information (CHRI)
- CHRI must conform to state and federal laws regarding its release; unauthorized release can lead to penalties.
- Records classified as arrest, incident, and investigative reports must comply with strict storage and destruction regulations.
- Only specific units can release CHRI, and detailed procedures are in place to manage requests.
Non-Conviction Record Access
- Non-conviction records are generally inaccessible to the public and others, except as per specific statutes.
- Media inquiries and requests from private security companies treated like private inquiries; they cannot obtain non-conviction records without authorization.
Record Retrieval Procedures
- Requests for obtaining records outside standard procedures must be directed to the Information Management Unit.
- Attorneys wishing to access CHRI for clients may require approval via the Department’s Office of General Counsel.
NCIC Requirements
- Transaction completion for criminal history inquiries mandates the use of original purpose codes.
- Purpose Code C involves connections with criminal justice administration and outlines specific authorized uses, including certain scenarios involving vendors, volunteers, and facility visitors.
- Strict protocols in place for managing inquiries ensure adherence to standards and authorized access only.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.