Podcast
Questions and Answers
What is the primary purpose of Standard of Conduct 1.9.2?
What is the primary purpose of Standard of Conduct 1.9.2?
Which action is explicitly prohibited under Standard of Conduct 1.9.2?
Which action is explicitly prohibited under Standard of Conduct 1.9.2?
Which of the following behaviors aligns with the principles of trans-inclusive policing?
Which of the following behaviors aligns with the principles of trans-inclusive policing?
Under what circumstances may a police member disclose a person's gender identity?
Under what circumstances may a police member disclose a person's gender identity?
Signup and view all the answers
Which principle is essential for respecting an individual's gender expression?
Which principle is essential for respecting an individual's gender expression?
Signup and view all the answers
What is a direct consequence of engaging in gender-biased policing?
What is a direct consequence of engaging in gender-biased policing?
Signup and view all the answers
Which of the following best describes the intent of the Information Security Policy?
Which of the following best describes the intent of the Information Security Policy?
Signup and view all the answers
What responsibility do Authorized Users have under the Information Security Policy?
What responsibility do Authorized Users have under the Information Security Policy?
Signup and view all the answers
The guiding principles of the Information Security Policy include:
The guiding principles of the Information Security Policy include:
Signup and view all the answers
What should members of the Service refrain from to comply with Standard of Conduct 1.9.2?
What should members of the Service refrain from to comply with Standard of Conduct 1.9.2?
Signup and view all the answers
Which group of individuals does NOT qualify as an Authorized User of the Toronto Police Service’s IT resources?
Which group of individuals does NOT qualify as an Authorized User of the Toronto Police Service’s IT resources?
Signup and view all the answers
What responsibility do Authorized Users have regarding TPS-IT resource records?
What responsibility do Authorized Users have regarding TPS-IT resource records?
Signup and view all the answers
Which statement is true regarding personal devices used for police business?
Which statement is true regarding personal devices used for police business?
Signup and view all the answers
What is a key security responsibility of Authorized Users when using TPS-IT resources?
What is a key security responsibility of Authorized Users when using TPS-IT resources?
Signup and view all the answers
What type of information is classified as Confidential Information within the TPS context?
What type of information is classified as Confidential Information within the TPS context?
Signup and view all the answers
Which of the following actions is prohibited for Authorized Users while using TPS-IT resources?
Which of the following actions is prohibited for Authorized Users while using TPS-IT resources?
Signup and view all the answers
What should an Authorized User do if they discover a misuse of TPS-IT resources?
What should an Authorized User do if they discover a misuse of TPS-IT resources?
Signup and view all the answers
When is approval needed from the Chief Information Officer (CIO)?
When is approval needed from the Chief Information Officer (CIO)?
Signup and view all the answers
What should be done with hardcopy materials when they are no longer needed?
What should be done with hardcopy materials when they are no longer needed?
Signup and view all the answers
What does the term 'Workplace Technology Device' encompass?
What does the term 'Workplace Technology Device' encompass?
Signup and view all the answers
What is the expectation of personal privacy for authorized users of TPS-IT resources?
What is the expectation of personal privacy for authorized users of TPS-IT resources?
Signup and view all the answers
What action is considered a violation of policy non-compliance regarding unauthorized access?
What action is considered a violation of policy non-compliance regarding unauthorized access?
Signup and view all the answers
What may happen if a violation of TPS policy is substantiated?
What may happen if a violation of TPS policy is substantiated?
Signup and view all the answers
Which of the following actions is permissible while using TPS-IT resources?
Which of the following actions is permissible while using TPS-IT resources?
Signup and view all the answers
How does TPS gather system information as part of compliance monitoring?
How does TPS gather system information as part of compliance monitoring?
Signup and view all the answers
What is the primary consequence for users who violate TPS policy?
What is the primary consequence for users who violate TPS policy?
Signup and view all the answers
Which of the following is NOT a violation of policy as per the TPS guidelines?
Which of the following is NOT a violation of policy as per the TPS guidelines?
Signup and view all the answers
What is a recommended action for users unsure about policy compliance?
What is a recommended action for users unsure about policy compliance?
Signup and view all the answers
Which scenario would constitute unauthorized use of TPS-IT resources?
Which scenario would constitute unauthorized use of TPS-IT resources?
Signup and view all the answers
What is one of the key elements of TPS's vision for community engagement?
What is one of the key elements of TPS's vision for community engagement?
Signup and view all the answers
Study Notes
Respect for Gender Diversity and Trans-Inclusive Policing
- Service aims to provide police services sensitive to Toronto's diverse communities.
- Standard 1.9.2 promotes respect for all gender identities and expressions, fostering public trust and confidence.
- Members must treat individuals with respect, courtesy, and consideration, including trans and gender diverse people.
- Essential respect areas include:
- Individual rights to preferred names, pronouns, and gender identification.
- Freedom to express self-identified gender, including access to facilities and personal items.
- Privacy and confidentiality regarding gender identity and expression.
- Conduct that is inclusive and respectful towards gender diverse communities.
- Prohibited actions for members include:
- Misgendering individuals knowingly or repeatedly.
- Using derogatory or offensive language related to gender identity.
- Engaging in gender-biased policing or making decisions based on gender identity.
- Disclosing individual’s trans or gender diverse identity without consent, except in necessary circumstances.
Information Security Policy Overview
- Policy ensures the confidentiality, integrity, and availability of Toronto Police Service (TPS) information and technology resources.
- Applies to all Authorized Users with access to TPS-IT resources.
- Authorized Users include permanent members, contractors, volunteers, temporary staff, and third-party personnel.
- Workplaces encompass various end-user devices that connect to networks, including computers, mobile devices, and external media.
Guidelines for Use of TPS-IT Resources
- TPS-IT resources are exclusive property of the Toronto Police Service and are intended for official police business.
- Records maintained on TPS-IT resources are owned by the Service and must comply with governance and retention laws.
- Misuse of resources or violations must be reported immediately to relevant supervisors or Information Security Officers.
Security Responsibilities
- Authorized Users must protect all forms of police information, ensuring system access matches job functions.
- All devices must remain secure, and users are accountable for their online activity.
- Sensitive materials should be securely disposed of through shredding or authorized bins.
- Offsite work is considered an extension of TPS work locations, adhering to the same protocols.
Compliance and Non-Compliance
- TPS reserves the right to monitor system use and take disciplinary action for policy violations.
- Unauthorized access, sharing of passwords, and use of unapproved software is strictly prohibited.
- Violating this policy could lead to significant disciplinary measures, including termination.
Auditing, Monitoring, and Support
- Regular auditing of system use is implemented to detect misconduct or policy breaches.
- Users are encouraged to seek guidance on policy compliance from supervisors or Information Security Officers.
- Policy breaches may be subject to legal consequences under the Police Services Act.
Organizational Vision
- Focus on creating a fair working environment for service members while delivering equitable public safety services.
- Emphasis on internal organizational culture changes to improve community engagement and public perception.
- Commitment to understanding the unique experiences of diverse communities and addressing systemic inequities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the key elements of Standard of Conduct 1.9.2 regarding respect for gender diversity and trans-inclusive policing. It highlights the importance of compliance for enhancing public trust in police services within Toronto's diverse communities. Test your understanding of these critical concepts and their implications for police practices.