Standard of Conduct 1.9.2 & TPS Equity Stratagy
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of Standard of Conduct 1.9.2?

  • To develop new technological resources for information security
  • To promote gender-biased policing
  • To restrict the rights of gender-diverse individuals
  • To enhance public trust and confidence in police services (correct)
  • Which action is explicitly prohibited under Standard of Conduct 1.9.2?

  • Allowing an individual access to appropriate facilities
  • Addressing individuals by their preferred pronoun
  • Respecting an individual's self-identified gender
  • Disclosing a person's gender identity without consent (correct)
  • Which of the following behaviors aligns with the principles of trans-inclusive policing?

  • Misgendering individuals intentionally to assert authority
  • Limiting access to facilities based on stereotypical gender traits
  • Using language that respects an individual's gender identity (correct)
  • Engaging in discussions about individual gender identities in public settings
  • Under what circumstances may a police member disclose a person's gender identity?

    <p>When it is relevant for duty performance or a health and safety risk</p> Signup and view all the answers

    Which principle is essential for respecting an individual's gender expression?

    <p>Allowing access to clothing and facilities that match their gender identity</p> Signup and view all the answers

    What is a direct consequence of engaging in gender-biased policing?

    <p>Erosion of public trust in law enforcement</p> Signup and view all the answers

    Which of the following best describes the intent of the Information Security Policy?

    <p>To define acceptable use of TPS-IT resources for confidentiality and integrity</p> Signup and view all the answers

    What responsibility do Authorized Users have under the Information Security Policy?

    <p>To ensure the protection of TPS-IT information assets</p> Signup and view all the answers

    The guiding principles of the Information Security Policy include:

    <p>Preventing loss or misuse of information assets</p> Signup and view all the answers

    What should members of the Service refrain from to comply with Standard of Conduct 1.9.2?

    <p>Repeating misgendering of individuals</p> Signup and view all the answers

    Which group of individuals does NOT qualify as an Authorized User of the Toronto Police Service’s IT resources?

    <p>Unauthorized individuals</p> Signup and view all the answers

    What responsibility do Authorized Users have regarding TPS-IT resource records?

    <p>They are property of the Service and must be maintained.</p> Signup and view all the answers

    Which statement is true regarding personal devices used for police business?

    <p>They may be examined by TPS if necessary for investigations.</p> Signup and view all the answers

    What is a key security responsibility of Authorized Users when using TPS-IT resources?

    <p>To ensure devices are logged off when left unattended.</p> Signup and view all the answers

    What type of information is classified as Confidential Information within the TPS context?

    <p>Personal information collected under applicable laws.</p> Signup and view all the answers

    Which of the following actions is prohibited for Authorized Users while using TPS-IT resources?

    <p>Sharing passwords with colleagues.</p> Signup and view all the answers

    What should an Authorized User do if they discover a misuse of TPS-IT resources?

    <p>Report it to a supervisor or ISO immediately.</p> Signup and view all the answers

    When is approval needed from the Chief Information Officer (CIO)?

    <p>Before acquiring any new technology.</p> Signup and view all the answers

    What should be done with hardcopy materials when they are no longer needed?

    <p>Shred them or discard them in secure bins.</p> Signup and view all the answers

    What does the term 'Workplace Technology Device' encompass?

    <p>Mobile devices like smartphones and tablets.</p> Signup and view all the answers

    What is the expectation of personal privacy for authorized users of TPS-IT resources?

    <p>They have a significantly diminished expectation of privacy.</p> Signup and view all the answers

    What action is considered a violation of policy non-compliance regarding unauthorized access?

    <p>Attempting to exploit security functions.</p> Signup and view all the answers

    What may happen if a violation of TPS policy is substantiated?

    <p>Disciplinary action up to termination may be enforced.</p> Signup and view all the answers

    Which of the following actions is permissible while using TPS-IT resources?

    <p>Installing licensed software as needed.</p> Signup and view all the answers

    How does TPS gather system information as part of compliance monitoring?

    <p>Without notice, for lawful purposes.</p> Signup and view all the answers

    What is the primary consequence for users who violate TPS policy?

    <p>They may face termination of employment.</p> Signup and view all the answers

    Which of the following is NOT a violation of policy as per the TPS guidelines?

    <p>Reporting security breaches to a supervisor.</p> Signup and view all the answers

    What is a recommended action for users unsure about policy compliance?

    <p>Seek guidance from a supervisor or Unit Commander.</p> Signup and view all the answers

    Which scenario would constitute unauthorized use of TPS-IT resources?

    <p>Installing unlicensed software for personal use.</p> Signup and view all the answers

    What is one of the key elements of TPS's vision for community engagement?

    <p>Ensuring that member experiences shape community interactions.</p> Signup and view all the answers

    Study Notes

    Respect for Gender Diversity and Trans-Inclusive Policing

    • Service aims to provide police services sensitive to Toronto's diverse communities.
    • Standard 1.9.2 promotes respect for all gender identities and expressions, fostering public trust and confidence.
    • Members must treat individuals with respect, courtesy, and consideration, including trans and gender diverse people.
    • Essential respect areas include:
      • Individual rights to preferred names, pronouns, and gender identification.
      • Freedom to express self-identified gender, including access to facilities and personal items.
      • Privacy and confidentiality regarding gender identity and expression.
      • Conduct that is inclusive and respectful towards gender diverse communities.
    • Prohibited actions for members include:
      • Misgendering individuals knowingly or repeatedly.
      • Using derogatory or offensive language related to gender identity.
      • Engaging in gender-biased policing or making decisions based on gender identity.
      • Disclosing individual’s trans or gender diverse identity without consent, except in necessary circumstances.

    Information Security Policy Overview

    • Policy ensures the confidentiality, integrity, and availability of Toronto Police Service (TPS) information and technology resources.
    • Applies to all Authorized Users with access to TPS-IT resources.
    • Authorized Users include permanent members, contractors, volunteers, temporary staff, and third-party personnel.
    • Workplaces encompass various end-user devices that connect to networks, including computers, mobile devices, and external media.

    Guidelines for Use of TPS-IT Resources

    • TPS-IT resources are exclusive property of the Toronto Police Service and are intended for official police business.
    • Records maintained on TPS-IT resources are owned by the Service and must comply with governance and retention laws.
    • Misuse of resources or violations must be reported immediately to relevant supervisors or Information Security Officers.

    Security Responsibilities

    • Authorized Users must protect all forms of police information, ensuring system access matches job functions.
    • All devices must remain secure, and users are accountable for their online activity.
    • Sensitive materials should be securely disposed of through shredding or authorized bins.
    • Offsite work is considered an extension of TPS work locations, adhering to the same protocols.

    Compliance and Non-Compliance

    • TPS reserves the right to monitor system use and take disciplinary action for policy violations.
    • Unauthorized access, sharing of passwords, and use of unapproved software is strictly prohibited.
    • Violating this policy could lead to significant disciplinary measures, including termination.

    Auditing, Monitoring, and Support

    • Regular auditing of system use is implemented to detect misconduct or policy breaches.
    • Users are encouraged to seek guidance on policy compliance from supervisors or Information Security Officers.
    • Policy breaches may be subject to legal consequences under the Police Services Act.

    Organizational Vision

    • Focus on creating a fair working environment for service members while delivering equitable public safety services.
    • Emphasis on internal organizational culture changes to improve community engagement and public perception.
    • Commitment to understanding the unique experiences of diverse communities and addressing systemic inequities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the key elements of Standard of Conduct 1.9.2 regarding respect for gender diversity and trans-inclusive policing. It highlights the importance of compliance for enhancing public trust in police services within Toronto's diverse communities. Test your understanding of these critical concepts and their implications for police practices.

    More Like This

    The Trans-Atlantic Slave Trade
    6 questions
    Trans-Saharan Trade in Africa
    10 questions
    Vplyv trans-mastných kyselín na zdravie
    272 questions
    Use Quizgecko on...
    Browser
    Browser