Arkansas Crime Information Center. ACIC Training Policy
|
|
|
- Peter Montgomery
- 10 years ago
- Views:
Transcription
1 Arkansas Crime Information Center ACIC Training Policy pg. 1 Approved by the ACIC Supervisory Board December 4, 2015
2 ACIC Training Policy Training is necessary for the proper and effective use of the state and national computer systems. Required training is defined in the ACIC Training Policy, as approved by the ACIC Supervisory Board. All individuals with access to Criminal Justice Information (CJI), must be trained. This includes individuals who may be exposed to the data as part of their job duties, but who do not actually use the data to perform their job. Examples of these individuals include clerical personnel, unescorted janitorial and maintenance personnel, vendors, and information technology (IT) personnel. The ACIC System Regulations, Section 10, contains eligibility requirements to receive CJI. Training must be completed within six (6) months of initial assignment, and biennially thereafter. Contractors who receive CJI as part of a service provided to authorized noncriminal justice recipients of CJI must be retrained annually. CJIS Security Training Personnel who do not access CJI directly through the operation of an access device, can obtain training online at, Contact ACIC, the agency s TAC, or non criminal justice agency coordinator (NAC) to establish a user account. There are 2 Levels of CJIS Security Training: Level 1 All personnel with access to Criminal Justice Information (CJI). This level is designed for people who do not have physical and logical access to CJI but may encounter it in their duties. Level 3 All personnel with Information Technology Roles. This level is designed for all information technology personnel including system administrators, security administrators, network administrator, etc. Direct Access Training Within five (5) days of an employee being hired or reassigned to operate an ACIC Access Device, the terminal agency coordinator (TAC), or other designated personnel, must notify ACIC by completing a Request For ACIC Training form and sending it to ACIC. This form must be utilized and submitted prior to any ACIC training. Upon receiving a Request For ACIC Training form, ACIC personnel will review the form for completeness and accuracy. Upon approval of the form, ACIC will assign the new operator a pg. 2 Approved by the ACIC Supervisory Board December 4, 2015
3 temporary user name and password. The temporary user name and password will be set to expire after the date of the class requested on the Request For ACIC Training form. The TAC must notify ACIC as soon as possible when an operator leaves the employment of the agency. ACIC will update the operator s training record and security authorizations. ACIC training for access device operators consists of two (2) levels. Basic Certification Training Basic Certification training is required of all individuals operating an ACIC access device. Training is required prior to certification. The Basic Certification class consists of at least four (4) hours of training on ACIC policy, procedures and the laws regulating the access and use of the ACIC system and ACIC data. After having attended a Basic Certification training class, the operator must successfully complete an examination with a minimum score of 70%. After successful completion of the class and test, the operator is considered certified to operate an ACIC access device as a Limited Access Operator. Certification is valid for two (2) years from the test date. THERE IS A MANDATORY WAITING PERIOD OF 30 DAYS BETWEEN SUCCESSFUL COMPLETION OF BASIC CERTIFICATION TRAINING AND ATTENDING AN ADVANCED CERTIFICATION TRAINING CLASS. Advanced Certification Training Advanced Certification training is required of all ACIC access device operators who wish to enter or modify data in the ACIC system. Basic Certification training is a prerequisite, and training is required prior to certification. The Advanced Certification class consists of at least thirty two (32) hours of instruction. After successful completion of the class, the operator must successfully complete an examination with a minimum score of 70%. After successful completion of the class and test, the operator is considered certified to operate an ACIC access device as a Full Access Operator. Certification is valid for two (2) years from the test date. Arkansas law and NCIC regulations require that some entries are to be made immediately, (e.g. Missing Persons). Therefore, Full Access Agencies (entry capable), shall provide sufficient quantities of Advanced Certification trained personnel to ensure compliance with this requirement on a 24/7 basis. Retraining pg. 3 Approved by the ACIC Supervisory Board December 4, 2015
4 In order to maintain certification, operators must successfully retrain and/or retest before their certification expires. Beginning thirty (30) days prior to the expiration of an operator s certification, each time the operator signs on, the ACIC system will generate reminders that their certification is about to expire. Limited Access certified operators may log onto the CJIS Launchpad to take the appropriate recertification refresher training online, and then complete the nextest recertification test. Successful completion of the test will result in the operator s certification date automatically being extended two (2) years. Full Access certified operators may log onto the CJIS Launchpad to take the appropriate recertification test. Successful completion of the test will result in the operator s certification date automatically being extended two (2) years, or if deemed appropriate by their Agency TAC, they may attend an Advanced Certification refresher class held periodically throughout the year at various locations. Successful completion of the test will result in the operator s certification date automatically being extended two (2) years. Intra Agency Training A terminal agency may provide training on ACIC topics, provided training plans and trainers are approved by ACIC. ACIC can provide training materials to agency instructors; however, before ACIC will approve any agency to conduct any classes, the agency and instructor must provide ACIC with proof that the agency instructor(s) holds a current instructor certification from Arkansas Commission on Law Enforcement Standards and Training (CLEST)and a current Advanced Certification. All materials to be utilized by an agency instructor, including but not limited to, PowerPoint presentations, outlines, handout materials, etc. shall be first provided to ACIC for review and approval. All instruction on the ACIC system shall be under the guidance of the ACIC Training Manager, Operations Administrator, and/or ACIC Director. A copy of the agency instructor s training and certification shall be provided to the ACIC Training Manager and shall remain on file with ACIC as part of the training record. ACIC may audit classes at any time. ACIC Instructors All instructors conducting any training on ACIC subject matter must hold a current instructor certification from Arkansas Commission on Law Enforcement Standards and Training (CLEST). ACIC instructors must hold a current Advanced Certification. Commission on Law Enforcement Standards and Training The ACIC Basic Certification, Advanced Certification, and Recertification classes are certified by the Arkansas Commission on Law Enforcement Standards and Training (CLEST). Students who successfully complete either one of these courses may apply for credit with CLEST by submitting a copy of their class certificate to: pg. 4 Approved by the ACIC Supervisory Board December 4, 2015
5 Office of Law Enforcement Standards #4 State Police Plaza Drive Little Rock, AR Phone: (501) Fax: (501) Special Circumstances Special circumstances may arise in which an operator forgets his or her password or the operator's password or training certification expires unexpectedly. The operator should notify his or her TAC. The TAC should then contact ACIC. In the event the operator is unable to contact their TAC, the operator may contact ACIC directly. The Training Manager, or his or her designee, will verify the training history of the operator and reset the password. In the event the operator s certification has expired, the ACIC Training Manager, or designee, will consult with the TAC and reset the certification expiration date to a reasonable future date to allow the operator an opportunity to renew their certification. Operator may log into the online testing system and recertify up to one year after their certification expires without attending a physical class. If, however, the operator s certification is expired for more than one (1) year, the Training Manager and TAC may coordinate a training plan for the employee. The plan may include online testing or attendance in the first available physical class appropriate for the operator s level of certification. This shall be done at the discretion of the Training Manager or his or her designee. Glossary Access device A computer terminal, microcomputer workstation, mobile data device or other electronic equipment used to communicate with the ACIC computer system. Advanced Certification Training Training required of terminal operators who are considered to have full access and are authorized to enter, modify, clear, and query data. Basic Certification Training The initial training required of all terminal operators that allows operator to only query and clear ACIC data. CJIS Launchpad A web based portal to ACIC documents, training, testing, and other resources for authorized users of the ACIC system. CJIS Online The electronic training module for CJIS Security training for personnel who are exposed to, or use CJI, but who do not operate an ACIC access device. CJIS Online can be accessed at the following URL: pg. 5 Approved by the ACIC Supervisory Board December 4, 2015
6 Criminal Justice Information (CJI) Criminal Justice Information is the term used to refer to all of the ACIC and FBI CJIS provided data necessary for law enforcement and civil agencies to perform their missions including, but not limited to biometric, identity history, biographic, property, and case/incident history data. Full Access Operator A terminal operator who has the authority to enter, modify, clear and query data on the ACIC system, and perform other functions covered in the Advanced Certification course of training. Intra Agency Training ACIC training conducted by the terminal agency. Limited Access Operator A terminal operator who has the authority to conduct query transactions, send administrative messages, and perform other functions covered in the Basic Certification course of training. NAC The Non criminal Justice Agency Coordinator is the primary liaison between a noncriminal agency and ACIC, and represents the agency on matters relating to ACIC. nextest The electronic testing module used by ACIC to certify personnel on training standards. Physical and Logical Access The user has direct contact with a computer or other electronic device that allows the user to query, read, create, modify or delete a file, record or program on a system containing CJI information. TAC The Terminal Agency Coordinator is the primary liaison between the terminal agency and ACIC, and represents the agency on matters relating to ACIC. Terminal Operator Anyone within the agency who uses an access device to access information from the ACIC system. pg. 6 Approved by the ACIC Supervisory Board December 4, 2015
CJIS Online Overview. CJIS Security Awareness Training & Testing Software
CJIS Online Overview CJIS Security Awareness Training & Testing Software Navigating the CJIS Online site Working with the CJIS Online system: Logging in as a Local Agency Admin Setting up user accounts
CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION
1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with
CJIS Online Administrator Manual
CJIS Online Administrator Manual CJIS Online is used for Security Awareness Training and Certification. All personnel, having access to Criminal Justice Information (CJI), are required to have Security
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
Law Enforcement Agencies Data System (LEADS) Operator Certification Program (LOCP)
Law Enforcement Agencies Data System (LEADS) Operator Certification Program (LOCP) BACKGROUND...2 PROGRAM GOALS...2 CERTIFICATION...3 Overview...3 Who Must Be Certified...4 Registration Procedures...4
STATE OF WISCONSIN DEPARTMENT OF JUSTICE
STATE OF WISCONSIN DEPARTMENT OF JUSTICE J.B. VAN HOLLEN ATTORNEY GENERAL Kevin St. John Deputy Attorney General December 2014 Division of Law Enforcement Services Crime Information Bureau Walt Neverman,
FLORIDA DEPARTMENT OF JUVENILE JUSTICE PROCEDURE
PROCEDURE Title: Florida Crime Information Center (FCIC), National Crime Information Center (NCIC), Criminal Justice Network (CJNet), Judicial Inquiry System (JIS), and Driver And Vehicle Information Database
UNDERSTANDING CJIS ONLINE FOR CJIS SECURITY AWARENESS TRAINING & TESTING
UNDERSTANDING CJIS ONLINE FOR CJIS SECURITY AWARENESS TRAINING & TESTING NAVIGATING THE CJIS ONLINE SITE Walking you through the CJIS Online system: Logging in as an agency administrator Setting up user
CJIS Division Update
CJIS Division Update Oregon State Police Criminal Justice Information Services Division Kendele Miyasaki, Training Coordinator Russ Hoskins, Training Specialist CJIS/LEDS Contact Information Criminal Justice
CJIS Online Security Awareness Training. Vendor Guide
CJIS Online Security Awareness Training Vendor Guide 2015 Preface Welcome to the new CJIS Security Awareness Training software available to Texas vendors and support staff to help meet current CJIS Security
GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject CJIS Security Topic Series Number SPT 302 12 Effective Date March 28, 2014 Related to: GO-SPT-302.08 (Metropolitan Police Department (MPD) Wide Area Network)
Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34
Pay Range: 34 POSITION SUMMARY: This is advanced professional, technical, and consultative work that involves developing, organizing, implementing, and directing all activities associated with a specific
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY
MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY SUBJECT: Training EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 14 REVIEW DATE: 30 November 2015 APPROVED: CHANGE DATE: 20 May 2013 THE POLICIES
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)
803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS) Section 7.01: Purpose and Scope 7.02: Definitions 7.03: Criminal Justice Agency (CJA) Access to Criminal Justice Information System (CJIS) 7.04:
County of Santa Clara Emergency Medical Services System
County of Santa Clara Emergency Medical Services System Policy #201: Emergency Medical Technician Certification EMERGENCY MEDICAL TECHNICIAN CERTIFICATION Effective: September 12, 2014 Replaces: July 1,
Directory and Messaging Services Enterprise Secure Mail Services
Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once
Justice Information Sharing Division ( ND CJIS ), and
Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This
STATE OF COLORADO. Standards for the STANDARDIZED FIELD SOBRIETY TESTING (SFST) PROGRAM
STATE OF COLORADO Standards for the STANDARDIZED FIELD SOBRIETY TESTING (SFST) PROGRAM Presented by Colorado Department of Transportation 4201 E. Arkansas Ave. Denver, CO. 80222 Issue date 04/01/2008 These
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information
CJIS Online Security Awareness Training. TAC Guide
CJIS Online Security Awareness Training TAC Guide 2015 Preface Welcome to the new CJIS Security Awareness Training software available to Texas agencies to help meet current CJIS Security Policy requirements
Next Generation Identification Program (NGI) Rap Back Service
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Next Generation Identification Program (NGI) Rap Back Service Criminal Justice Policy and Implementation
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS (By authority conferred on the Department of State Police by 1974 PA 163, MCL 28.214, and Executive Reorganization
Alien Criminal Response Information Management System (ACRIMe)
for the Alien Criminal Response Information Management System (ACRIMe) DHS/ICE/PIA 020(d) January 24, 2013 Contact Point Gary Mead Enforcement and Removal Operations U.S. Immigration and Customs Enforcement
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.5 06/01/2016 Prepared by:
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users Version 1.2 Hawaii Criminal Justice Data Center March 20, 2014 Table of Contents Table of Contents... 2 I.
CHAPTER TWO LICENSURE: RN, LPN, AND LPTN
A. Good moral character. CHAPTER TWO LICENSURE: RN, LPN, AND LPTN SECTION I QUALIFICATIONS B. Completion of an approved high school course of study or the equivalent as determined by the appropriate educational
Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5
Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...
DCF Medication Administration Certification Training
DCF Medication Administration Certification Training DCF Medication Certification Training Options DCF offers two courses in medication administration: Basic certification training and Recertification
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION PRESENTED BY: MICHIGAN STATE POLICE CRIMINAL JUSTICE INFORMATION CENTER SECURITY & ACCESS SECTION A PROUD tradition of SERVICE through EXCELLENCE,
ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES
TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
REGULATION NO. 6 REGULATIONS GOVERNING THE LICENSING AND PRACTICE OF OCCUPATIONAL THERAPISTS
REGULATION NO. 6 REGULATIONS GOVERNING THE LICENSING AND PRACTICE OF OCCUPATIONAL THERAPISTS 1. APPLICATION FOR LICENSURE. Any person who plans to practice as a licensed occupational therapist or occupational
Information Technology. Security Awareness Training for Administrative Personnel
Information Technology Security Awareness Training for Administrative Personnel This training information is intended for criminal justice Administrative Personnel without direct access to IDACS/CJIS systems.
CODE OF MARYLAND REGULATIONS (COMAR) As Amended through August 8, 2011
CODE OF MARYLAND REGULATIONS (COMAR) As Amended through August 8, 2011 Title 12 DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES Subtitle 04 POLICE TRAINING COMMISSION Chapter 01 General Regulations
CHAPTER 11 CONCEALED WEAPON LICENSE POLICY
CHAPTER 11 CONCEALED WEAPON LICENSE POLICY 11-1 PURPOSE AND SCOPE The Sheriff is given the statutory discretion to issue a license to carry a concealed firearm to residents within Yolo County. This policy
Appendix 1: Approved Rap Back Privacy Risk Mitigation Strategies Version 2.1 - June 1, 2014
Appendix 1: Approved Rap Back Privacy Risk Mitigation Strategies Version 2.1 - June 1, 2014 Submitters must work with each one of their Subscribers to identify the Privacy Risk Mitigation Strategies that
Pre-Employment Background Checks. October 2, 2006
Date Effective October 2, 2006 City Manager Revision Date Effective Code Number HR19 Human Resources Responsible Key Business Purpose: The City of Charlotte seeks to ensure the safety and security of employees
Reclamation Manual Directives and Standards
PRA Process 1. Introduction. A. Additional information and requirements supplementing the PRA process are defined in the Directive and Standard (D&S). Terms used within this Appendix can be found in the
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government
CJIS Information Technology Security Audit (ITSA) 2015 Program Update
CJIS Information Technology Security Audit (ITSA) 2015 Program Update Greg Verharst CJIS Information Security Officer [email protected] (503) 934-2335 The 4 W s of CJIS Audits Who receives Information
11B-21.002 Criminal Justice Training Schools Request for Certification,
Certification of Criminal Justice Training Schools 11B-21 32-37 RULE TITLES: RULE NOS.: Local Advisement and Definitions. 11B-21.001 32 Criminal Justice Training Schools Request for Certification, 11B-21.002
SUBCHAPTER 4H ORGANIZATIONAL FUNCTIONS AND DEFINITIONS
Original DATE PRINTED 0 NCAC 0H.00 is adopted with changes as published in :0 NCR 00 as follows: SUBCHAPTER H ORGANIZATIONAL FUNCTIONS AND DEFINITIONS SECTION.000 GENERAL PROVISIONS NCAC 0H.00 SCOPE (a)
Criminal Justice Information Services (CJIS) Law Enforcement National Data Exchange (N-DEx) Policy and Operating Manual
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Law Enforcement National Data Exchange (N-DEx) Policy
Certified Application Counselor Update MTF October 2014
Certified Application Counselor Update MTF October 2014 1 Agenda CAC Recertification Updated Content in the LMS Recertification Timeline Prospective ( New ) CACs Accessing the LMS Questions 2 CAC Recertification2
NC CJIN Governing Board. 13 October, 2011. George A. White
Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements
Criminal Justice Information System (CJIS) Vendor Policy Guidelines
Criminal Justice Information System (CJIS) Vendor Policy Guidelines Last Updated: 08/17/2015 Massachusetts Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200 Chelsea,
Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for
Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for secondary providers seeking certification for a course offered
Learning Management System (LMS) Frequently Asked Questions
Learning Management System (LMS) Frequently Asked Questions 1. When I try to get to the LMS website I get page can not be displayed. Answer: Make sure you have typed or copied the LMS address correctly
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Insurance Adjuster Certification Program
Insurance Adjuster Certification Program Purpose: The purpose of this program is to: 1. set forth the minimum standards of training, experience, and skill that workers compensation adjusters (including
FAQs for Password Self Service
FAQs for Password Self Service Contents 1.1 What is PSS? 1.2 What do I do if I forget my Portal/POS or Network/Workstation password? 1.3 What do I do if my Portal/POS or Network/Workstation password has
YEAR TWO. Total Credits 3 Total Credits 6 Total Credits 3 Total Credits 6 Total Credits 6
FALL 1 START (Online) WINTER 1 (FIRST 8 WEEKS) WINTER 2 (SECOND 8 WEEKS) PUB 5409 3 PUB 5419 3 PUB 5429 3 PUB 5439 3 PUB 5459 3 CJI 0510 3 CJI 0520 3 PUB 5469 3 Total Credits 3 Total Credits 6 Total Credits
CHAPTER 120c. TRAINING AND CERTIFICATION STANDARDS FOR 911 EMERGENCY COMMUNICATIONS PERSONNEL
CHAPTER 120c. TRAINING AND CERTIFICATION STANDARDS FOR 911 EMERGENCY COMMUNICATIONS PERSONNEL Sec. 120c.101. Purpose. 120c.102. Definitions. 120c.103. Certification of county or municipal training programs.
GRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
APPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
City of Oak Creek. Class Title: Emergency Services Dispatcher. Division: Administrative Location: Police Station
City of Oak Creek Class Title: Emergency Services Dispatcher Department: Police Division: Administrative Location: Police Station Job Code Number: Grade Number: Non-Union Summary Description Performs a
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
FBI CJIS SECURITY ADDENDUM
FBI CJIS SECURITY ADDENDUM The following is an expanded version of the FBI Criminal Justice Information Services (CJIS) Security Addendum. This document was created in order to assist Texas agencies and
Agency #016.06. Rules and Regulations. for the. Arkansas Long Term Care Facility. Nursing Assistant Training Program
Agency #016.06 Rules and Regulations for the Arkansas Long Term Care Facility Nursing Assistant Training Program Arkansas Department of Health and Human Services Division of Medical Services Office of
HIPAA Information Security Training (v1.0 10/15/12)
The HIPAA Information Security Training (formerly Information Security Online Training) is an online training test that is required by all DJJ Staff. DJJ Staff include all DJJ Employees, Non-DJJ Employees,
SMALL BUSINESS/SMALL DIVERSE BUSINESS APPLICATION INSTRUCTIONS
SMALL BUSINESS/SMALL DIVERSE BUSINESS APPLICATION INSTRUCTIONS TABLE OF CONTENTS Quick Access Instructions... 2 Small Business... 3 Small Diverse Business... 3 System Requirements... 4 Instructions...
HUDSON VALLEY REGIONAL MEDICAL ADVISORY COMMITTEE REGIONAL CREDENTIALING AND CONTINUING MEDICAL EDUCATION POLICIES AND PROCEDURES
HUDSON VALLEY REGIONAL MEDICAL ADVISORY COMMITTEE REGIONAL CREDENTIALING AND CONTINUING MEDICAL EDUCATION POLICIES AND PROCEDURES This document supersedes all previous documents. Pg 63 SECTION 1: Program
Network Service Policy
Network Service Policy TABLE OF CONTENTS PURPOSE... 3 SCOPE... 3 AUDIENCE... 3 COMPLIANCE & ENFORCEMENT... 3 POLICY STATEMENTS... 4 1. General... 4 2. Administrative Standards... 4 3. Network Use... 5
Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1
Alberta Reliability Stard A. Introduction 1. Title: 2. Number: 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the bulk electric system from individuals
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Noncriminal Justice Agency Guide
\ Arkansas Crime Information Center Noncriminal Justice Agency Guide 1 Contents Acronym Glossary... 4 Introduction... 5 Overview & History... 5 Arkansas... 5 Use of Criminal History Record Information
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications
Security awareness training is not a substitute for the LEADS Security Policy.
Revised 4/2014 This training will discuss some of the duties of the Terminal Agency Coordinator (TAC), Local Agency Security Officer (LASO) and provide basic security awareness training. Security awareness
Vendor User Accounts managing your NAP User Account
This guide explains how to request and manage your NAP User Account so that you may access Web Status. Topics include: Reactivating an existing NAP User Account Requesting a NAP User Account Managing your
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.3 Prepared by: CJIS Information
Delete Regulation 73-40(1)-(36) and replace with the proposed regulations (73-400 through 73-422).
SOUTH CAROLINA LAW ENFORCEMENT DIVISION CHAPTER 73 Statutory Authority: 1976 Code Section 40-18-30 (Administrative Regulations - Effective June 23, 2006) Instructions: Delete Regulation 73-40(1)-(36) and
Virtualization Demystified
Virtualization Demystified Oregon State Police CJIS Statewide Training September 24, 2015 Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program Virtualization Demystified What is
FOR SHARING LAW ENFORCEMENT INFORMATION
INTERLOCAL AGREEMENT BETWEEN COLLIN COUNTY TEXAS AND The City of Austin, Texas; the City of El Paso, Texas; the City of Houston, Texas; and the City of San Antonio, Texas FOR SHARING LAW ENFORCEMENT INFORMATION
BATON TRAINING COURSE ACCREDITATION Guidelines for Accreditation Application
BATON TRAINING COURSE ACCREDITATION Guidelines for Accreditation Application GENERAL INFORMATION The Security Services and Investigators Act (SSIA) focuses on providing higher standards for the security
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
Page 1 of 23. Elections Funds Management Voter Registration Expense System
Page 1 of 23 Elections Funds Management Voter Registration Expense System ELECTIONS FUNDS MANAGEMENT VOTER REGISTRATION EXPENSE SYSTEM TABLE OF CONTENTS OVERVIEW...3 GETTING STARTED:... 3 SIGN-ON PAGE...
CHAPTER 5 SATISFACTION OF MINIMUM PEACE OFFICER TRAINING REQUIREMENTS
CHAPTER 5 SATISFACTION OF MINIMUM PEACE OFFICER TRAINING REQUIREMENTS Section 1. The Basic Training Program. (a) The basic course curriculum and number of training hours shall be approved yearly by the
Department of Criminal Justice Training
Department of Criminal Justice Training Records Retention Schedule Prepared by the State Records Branch Approved by the State Archives and Records Commission This records retention schedule governs retention
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...
General Investigation Training Course Blended Learning Guide
www.cpkn.ca 1.866.357.CPKN (2756) Last updated November 2015 Table of Contents About the GIT Blended Learning Program... 1 Pre-Requisites... 1 Registering to GIT... 1 GIT Payment Policy... 2 Part I: Online
Privacy Impact Assessment Update for the
for the Enforcement Integrated Database (EID) Risk Classification Assessment (RCA 1.0), ENFORCE Alien Removal Module (EARM 5.0), and Crime Entry Screen (CES 2.0) DHS/ICE/PIA-015(d) April 6, 2012 Contact
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.4 Prepared by: CJIS Information
Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary
Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary providers seeking certification for the first time or a course
GUIDELINES FOR THE SMALL BUSINESS PROCUREMENT INITIATIVE HARRISBURG, PENNSYLVANIA PROCUREMENT SERVICES PROCUREMENT GOODS INFORMATION TECHNOLOGY
GUIDELINES FOR THE SMALL BUSINESS PROCUREMENT INITIATIVE PROCUREMENT SERVICES PROCUREMENT GOODS INFORMATION TECHNOLOGY HARRISBURG, PENNSYLVANIA MARCH 6, 2013 EDITION Guidelines for the DGS Small Business
