Podcast
Questions and Answers
What is the primary purpose of Standard of Conduct 1.9.2?
What is the primary purpose of Standard of Conduct 1.9.2?
- To develop new technological resources for information security
- To promote gender-biased policing
- To restrict the rights of gender-diverse individuals
- To enhance public trust and confidence in police services (correct)
Which action is explicitly prohibited under Standard of Conduct 1.9.2?
Which action is explicitly prohibited under Standard of Conduct 1.9.2?
- Allowing an individual access to appropriate facilities
- Addressing individuals by their preferred pronoun
- Respecting an individual's self-identified gender
- Disclosing a person's gender identity without consent (correct)
Which of the following behaviors aligns with the principles of trans-inclusive policing?
Which of the following behaviors aligns with the principles of trans-inclusive policing?
- Misgendering individuals intentionally to assert authority
- Limiting access to facilities based on stereotypical gender traits
- Using language that respects an individual's gender identity (correct)
- Engaging in discussions about individual gender identities in public settings
Under what circumstances may a police member disclose a person's gender identity?
Under what circumstances may a police member disclose a person's gender identity?
Which principle is essential for respecting an individual's gender expression?
Which principle is essential for respecting an individual's gender expression?
What is a direct consequence of engaging in gender-biased policing?
What is a direct consequence of engaging in gender-biased policing?
Which of the following best describes the intent of the Information Security Policy?
Which of the following best describes the intent of the Information Security Policy?
What responsibility do Authorized Users have under the Information Security Policy?
What responsibility do Authorized Users have under the Information Security Policy?
The guiding principles of the Information Security Policy include:
The guiding principles of the Information Security Policy include:
What should members of the Service refrain from to comply with Standard of Conduct 1.9.2?
What should members of the Service refrain from to comply with Standard of Conduct 1.9.2?
Which group of individuals does NOT qualify as an Authorized User of the Toronto Police Service’s IT resources?
Which group of individuals does NOT qualify as an Authorized User of the Toronto Police Service’s IT resources?
What responsibility do Authorized Users have regarding TPS-IT resource records?
What responsibility do Authorized Users have regarding TPS-IT resource records?
Which statement is true regarding personal devices used for police business?
Which statement is true regarding personal devices used for police business?
What is a key security responsibility of Authorized Users when using TPS-IT resources?
What is a key security responsibility of Authorized Users when using TPS-IT resources?
What type of information is classified as Confidential Information within the TPS context?
What type of information is classified as Confidential Information within the TPS context?
Which of the following actions is prohibited for Authorized Users while using TPS-IT resources?
Which of the following actions is prohibited for Authorized Users while using TPS-IT resources?
What should an Authorized User do if they discover a misuse of TPS-IT resources?
What should an Authorized User do if they discover a misuse of TPS-IT resources?
When is approval needed from the Chief Information Officer (CIO)?
When is approval needed from the Chief Information Officer (CIO)?
What should be done with hardcopy materials when they are no longer needed?
What should be done with hardcopy materials when they are no longer needed?
What does the term 'Workplace Technology Device' encompass?
What does the term 'Workplace Technology Device' encompass?
What is the expectation of personal privacy for authorized users of TPS-IT resources?
What is the expectation of personal privacy for authorized users of TPS-IT resources?
What action is considered a violation of policy non-compliance regarding unauthorized access?
What action is considered a violation of policy non-compliance regarding unauthorized access?
What may happen if a violation of TPS policy is substantiated?
What may happen if a violation of TPS policy is substantiated?
Which of the following actions is permissible while using TPS-IT resources?
Which of the following actions is permissible while using TPS-IT resources?
How does TPS gather system information as part of compliance monitoring?
How does TPS gather system information as part of compliance monitoring?
What is the primary consequence for users who violate TPS policy?
What is the primary consequence for users who violate TPS policy?
Which of the following is NOT a violation of policy as per the TPS guidelines?
Which of the following is NOT a violation of policy as per the TPS guidelines?
What is a recommended action for users unsure about policy compliance?
What is a recommended action for users unsure about policy compliance?
Which scenario would constitute unauthorized use of TPS-IT resources?
Which scenario would constitute unauthorized use of TPS-IT resources?
What is one of the key elements of TPS's vision for community engagement?
What is one of the key elements of TPS's vision for community engagement?
Flashcards are hidden until you start studying
Study Notes
Respect for Gender Diversity and Trans-Inclusive Policing
- Service aims to provide police services sensitive to Toronto's diverse communities.
- Standard 1.9.2 promotes respect for all gender identities and expressions, fostering public trust and confidence.
- Members must treat individuals with respect, courtesy, and consideration, including trans and gender diverse people.
- Essential respect areas include:
- Individual rights to preferred names, pronouns, and gender identification.
- Freedom to express self-identified gender, including access to facilities and personal items.
- Privacy and confidentiality regarding gender identity and expression.
- Conduct that is inclusive and respectful towards gender diverse communities.
- Prohibited actions for members include:
- Misgendering individuals knowingly or repeatedly.
- Using derogatory or offensive language related to gender identity.
- Engaging in gender-biased policing or making decisions based on gender identity.
- Disclosing individual’s trans or gender diverse identity without consent, except in necessary circumstances.
Information Security Policy Overview
- Policy ensures the confidentiality, integrity, and availability of Toronto Police Service (TPS) information and technology resources.
- Applies to all Authorized Users with access to TPS-IT resources.
- Authorized Users include permanent members, contractors, volunteers, temporary staff, and third-party personnel.
- Workplaces encompass various end-user devices that connect to networks, including computers, mobile devices, and external media.
Guidelines for Use of TPS-IT Resources
- TPS-IT resources are exclusive property of the Toronto Police Service and are intended for official police business.
- Records maintained on TPS-IT resources are owned by the Service and must comply with governance and retention laws.
- Misuse of resources or violations must be reported immediately to relevant supervisors or Information Security Officers.
Security Responsibilities
- Authorized Users must protect all forms of police information, ensuring system access matches job functions.
- All devices must remain secure, and users are accountable for their online activity.
- Sensitive materials should be securely disposed of through shredding or authorized bins.
- Offsite work is considered an extension of TPS work locations, adhering to the same protocols.
Compliance and Non-Compliance
- TPS reserves the right to monitor system use and take disciplinary action for policy violations.
- Unauthorized access, sharing of passwords, and use of unapproved software is strictly prohibited.
- Violating this policy could lead to significant disciplinary measures, including termination.
Auditing, Monitoring, and Support
- Regular auditing of system use is implemented to detect misconduct or policy breaches.
- Users are encouraged to seek guidance on policy compliance from supervisors or Information Security Officers.
- Policy breaches may be subject to legal consequences under the Police Services Act.
Organizational Vision
- Focus on creating a fair working environment for service members while delivering equitable public safety services.
- Emphasis on internal organizational culture changes to improve community engagement and public perception.
- Commitment to understanding the unique experiences of diverse communities and addressing systemic inequities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.