South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
|
|
|
- Charles Burke
- 10 years ago
- Views:
Transcription
1 South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications System (CnS) operates under a shared management concept between the South Carolina Law Enforcement Division (SLED), as the service provider, and criminal justice agencies or non-governmental agencies contracting to support certain functions for criminal justice agencies, as the service users, herein after known as "user agencies". Criminal Justice Information and Communications System (CJIS) User Agreement The responsibility of the SLED cns Division is to provide up-to-date, reliable and quality identification and infonnation services to user agencies. The out-of-state data (originating outside of South Carolina) provided by the SLED cns Division are managed and exchanged in cooperation with the FBI cns Division, each state cns Systems Agency (CSA) and its administrator for cns data, the cns Systems Officer (CSO). The cns Systems includes, but is not limited to: the Interstate Identification Index (III); the National Crime Infonnation Center (NCIC); Unifonn Crime Reporting (UCR), whether summary or incident-based reporting to the national Incident-Based Reporting System; the Fingerprint Identification Record System; Law Enforcement National Data Exchange (NDEx); Law Enforcement Online; the National Instant Criminal Background Check System (NICS) and infonnation that is routed from all the states, Canada, and certain federal agencies via the National Law Enforcement Telecommunications System (NLETS) The in-state data (originating within South Carolina) provided by the SLED cns Division are routed from and exchanged with source agencies in South Carolina. This infonnation includes, but is not limited to, the South Carolina Central Repository for Computerized Criminal History (CCH) Record Infonnation, the South Carolina Hot File(s), the South Carolina Incident-Based Reporting System (SCIBRS), the South Carolina Sex Offender Registry (SOR), the South Carolina Automated Fingerprint Identification System (SC AFIS), and the Violent Gang Terrorist Organization File programs. Motor vehicle and motor vehicle operator data managed by the SC Department of Public Safety are routed via interface with that agency. In order to fulfill this responsibility, the SLED cns Division provides the following services to its users: State cns Systems Agency and interface services for NCIC; State cns Systems Agency and interface services for NLETS; National Weather Service and sex offender registry; Operational, technical, and investigative assistance;
2 Policy review of matters pertaining to III, NCIC, NIBRS, IAFIS and CCH, SCIBRS, SC SOR, SC AFIS; Training assistance to each terminal agency coordinator; Ongoing assistance to System users; and System and data integrity auditing. The following documents are incorporated by reference and made part of this agreement: Interstate Identification Index Operational and Technical Manual, NCIC 2000 Operating Manual and related updates (TOUS); and National Incident-Based Reporting System Volumes 1-4; Minutes of the FBI cns Advisory Policy Board meetings; Bylaws for the CJIS Advisory Policy Board and Working Groups; [FBI] cns Security Policy to include all elements of the NCIC Computerized Criminal History Program Background, Concept and Policy; A Policy and Reference Manual; Recommended Voluntary Standards for Improving the Quality of Criminal History Record Information, and NCIC Standards, as recommended by the [FBI] cns Advisory Policy Board; Other relevant documents to include NCIC Technical and Operational Update, cns Information Letter, etc.; SLED Personnel Security Policy 7.6, SLED Technical Security Policies 7.6 et seq., Section of the SC Code of Laws, Section et seq. of the SC Code of Laws, Section et seq. of the SC Code of Laws, SC Appropriations Act Proviso 56DD.8. et seq., Chapter 73 of the SC Regulations, SLED CJIS Operations Manual; South Carolina Incident-Based Reporting System (SCIBRS) Guide/Training Manual; SLED cns NCIC Entry Quality Check Form (CJ-016); SLED cns Missing Person Validation Form (CJ-017); Amber Alert Information; and Other applicable federal and state laws, regulations, guides and forms. The following NCIC or state files are available when direct access is authorized: Identity Theft Unidentified Person Stolen Vehicle Stolen Article Stolen or Recovered Gun Stolen License Plate Wanted Person Stolen Securities Stolen Boat Missing Person US Secret Service Protective Dept. Motor Vehicles Foreign Fugitive Violent Gang / Terrorist Org. Deported Felon Protective Order File Interstate Identification Index SC Sex Offender Registry SC Criminal Histories SC Concealed Weapons SC Alcohol Local Option
3 The following limitations or conditions, if any, for specified state and/or NLETS files are made: By accepting access as set forth above, the user agency agrees to adhere to the following NCIC and SLED CJIS policies in order to ensure continuation ofthat access: 1. TIMELINESS: (Availability, including priority of service): Agency records must be entered, modified, cleared, and canceled promptly in NCIC to ensure maximum system effectiveness. Agencies that provide NCIC access to other agencies, such as through an interface or other process for non-tenninal agencies, must ensure priority service for those agencies. Fingerprints of custodial arrest subjects taken by a law enforcement agency or detention facility for state offenses must be submitted to SLED within three workdays; and wanted persons records meeting entry criteria must be entered into NCIC immediately upon receipt of the arrest warrants by the law enforcement agency (i.e., not more than three days after). 2. QUALITY ASSURANCE: Appropriate and reasonable quality assurance procedures must be in place to ensure that the most complete, accurate, and valid entries are in NCIC. Pursuant to of the SC Code of Laws, a person subjected to a custodial arrest for a state offense must be fingerprinted for identification and to establish records. 3. VALIDA TION: NCIC requires that all records except Article File records be validated days after entry and annually thereafter. The NCIC Validation Policy is defined as: Validation obliges the OR! to confirm the record is complete, accurate, and still outstanding or active. Validation is accomplished by reviewing the original entry and current supporting documents. Recent consultation with any appropriate complainant, victim, prosecutor, court, motor vehicle registry files, or other appropriate source or individual also is required with respect to the Wanted Person, Missing Person, and Vehicle Files. In the event the OR! is unsuccessful in its attempts to contact the victim, complainant, etc., the entering authority must make a determination based on the best information and knowledge available whether or not to retain the original entry in the file. Validation procedures must be formalized, and copies of these procedures must be onfilefor review during an NCIC audit. SLED cns requirements include, but are not necessarily limited to, conducting quarterly Missing Person Validations, completing the Missing Person Validation Form and the NCIC Entry Quality Check Form. 4. HIT CONFIRMATION: Each agency entering records must, within ten minutes or onehour depending on priority, furnish to an agency requesting a record confirmation a response indicating a positive or negative confirmation or notice of the specific amount of time necessary to provide a response to the request for record confirmation. 5. SECURITY: See Technical Security Policies 7.6 (Available through SLED ISO). 6. DISSEMINATION: See Dissemination Policy 7.13 (Located in FBI/CnS Security Policy & S.C Code of Laws. 7. AUDIT: See FBI/CnS Security Policy. (Located on LEMS.WEB & LEO 8. NCIC & SCIBRS TRAINING: Each agency will be responsible for complying with mandated training requirements
4 9. PERSONNEL BACKGROUND SCREENING: According to the FBI cns Security Policy, all personnel who have authorized access to FBI cns systems must be fingerprinted within 30 days of initial employment or assignment to include personnel directly responsible to configure and maintain computer systems and networks with direct access to FBI cns systems (4.5.1, (a)). Agencies should send to SLED Records on (1) completed blue applicant fmgerprint card with "Criminal Justice Applicant" as the reason. 10. LOGGING: See Technical Security Policies. 11. USE OF THE SYSTEM: According to any NCIC/state policies not specifically listed above: A. B. C. D. The user agency will provide fingerprints for all custodial arrests made or brought by that agency, or ensure that they are provided, in tum, by another agency on behalf of the arresting or charging agency either via electronic submission or fingerprint card that meet submission criteria. Each user agency with an interface to SLED CJIS must establish and maintain an information security structure that is satisfactory to the SLED Information Security Officer (ISO). The user agency is responsible for the system access by that agency and any other agency that is, in tum, served by their agency. Each user agency is to have a Terminal Agency Coordinator (T AC) to ensure adherence to NCIC and SLED cns procedures and policies within each user agency. Acknowledgment and Certification We hereby acknowledge the duties and responsibilities as set out in this agreement. We acknowledge that these duties and responsibilities have been developed and approved by NCIC System users in order to ensure the reliability, confidentiality, completeness, and accuracy of all information contained in or obtained by means of the FBI / SLED CJIS Systems. We further acknowledge that a failure to comply with these duties and responsibilities will subject our access to various sanctions as approved by the [FBI] Criminal Justice Information Services Advisory Policy Board. These sanctions may include the termination of NCIC services to the agency. We may appeal these sanctions through our cns Systems Agency. Name of User Agency Address for User Agency Mark A. Keel, Chief ORI for User Agency Signature ofcso Address Signature of User Agency Head TitlelDate TitlelDate
5 Agencies Serviced By User Agency Agency Name ORI Number Agency Name ORINumber Agency Name ORINumber Agency Name ORINumber Non-terminal User Agreement(s) with the above agencies must be on file with the user agency. Revised 03/29/
6 South Carolina Law Enforcement Division License Plate Reader file access Introduction Several law enforcement agencies (user agencies) in South Carolina have instituted stateof-the-art license plate screening technology from mobile and fixed sites. Their vendors provide software and screening devices that have the capability of scanning license plates and searching a local database loaded into a patrol vehicle computer or other location controlled by the agency. Data is provided to the law enforcement agency, not the vendor. Consequently, these law enforcement agencies have requested that SLED obtain relatively current information from the NCIC files in order to compare scanned numbers against stolen license plate information. The FBI will provide SLED with extracts from the Vehicle File, the License Plate File, and vehicle information in the Wanted Person File. SLED will request this file twice a day from the FBI/CnS division. SLED will make this file (NCICEXT) available via a secure method to agencies who meet the following criteria: Criteria to Gain Access to NCICEXT File The agency requesting this file must be a South Carolina Law Enforcement or criminal justice agency. Access to this file must be requested from SLED by the agency TAC. The agency must have a current NCIC agreement on file at SLED. If an NCIC agreement is not in place, the agency TAC must fill out this agreement, attach it to the request, and forward it to the SLED DATA CENTER CTO office at [email protected]. A blank 'User Agreement and System Responsibilities of Terminal Agency Coordinator' form can be found at The agency is responsible for purchasing, installing and maintaining any necessary software and hardware for this technology. SLED recommends that the vendor incorporate scripts or other technologies to download the updated file from SLED during the LPR installation. This should be a scheduled periodic download to maintain the latest file for the LPR system. The NCICEXT file can be used for law enforcement purposes only. The agency must update its local database as FBI updates become available, ensuring that those numbers deleted from the NCIC system are also deleted from all local databases. The agency must use NCIC client software to confirm extract hits are still active in NCIC, at the earliest reasonable opportunity, in accordance with current hit confirmation policy
7 It is the user agencies' responsibility to ensure that the vendor has had proper background checks and security agreements are signed and in place between the user agency and the vendor. By accepting this file, the user agency agrees to adhere to any NCIC and SLED policies in order to ensure continuation of that access. The access and use of the NCICEXT file is subject to all security, auditing, and access requirements for use ofncic data. Sharing of this file with other agencies is not allowed. Approved agencies will be required to have a VPN Client loaded to the hardware receiving the file as well as an FTP userid/password for access to the NCICEXT server. Access to these services will be given to the TAC after the request is approved. There is a 10 day minimum time frame to verify the request and return information to the requesting agency
8 SLED/CJI Access Form This fonn must be completed by the TAC or ATAC. SLED Help Desk Ticket Number: For additionallnfonnation about this fonn, please refer to "SLED NCIC User Fonn Instructions" found on nextest. Agency Information Agency Name: Agency Street Address: Agency Mailing Address: City: TAC or ATAC: TAC/ATAC ,sc AgencyORI: Zip Code: Agency Phone: User Information First Name: Middle Name: Last Name: User Address: NCIC Certification: D Inquiry (16 hr) D Basic (40 hr) D Instructor Last 5 of SSN: DYes D No Do you currently have a VPN or SLED user logon? If yes: Requested Action D Add New User D Delete Existing User D Modify Existing User D ORI Transfer If deleting an existing user, you must make the user inactive in nextest. Client I System D Datamaxx D LEMS.web D Spartan D Other: Access Level Requested D Inquiry Only D Full Function D Limited I Partial D Mobile D SOR New Name: Modify Existing User Previous Agency: ORI Transfer (nextest Only) Previous ORI: TAC/ATAC Initials: Last four of TAC/A T AC SSN: Date: DYes D No The user is an employee of a Criminal Justice Agency and has been cleared with fingerprint background checks. As a Digital Signature, Please enter the information requested directly above. WarninglTerms/Conditions: The SLED Network is an official South Carolina Government system for authorized use only. Access to the SLED Data Center Network, to include (but not limited to) CCH, NCIC, and SCDMV information, must be in accordance with all applicable laws, regulations, and policies. SLED reserves the right to deny or terminate access at anytime, with or without notice. Return Application to: I (Preferred): Attn: SLED Help Desk / NCIC - USER [email protected] I Fax: I Address: (803) SLED Data Center PO Box Columbia, SC SLED USE ONLY BELOW THIS POINT SLED NCIC Is / Was the user assigned to this agency in nextest? Yes / No Has the user been removed from this agency's ORI in nextest? Operator Certification in nextest: 0 16 Hour 040 Hour 0 Other Was the user's ORI changed in nextest? Certification Expiration: Date information forwarded to TAC/ATAC: Date information forwarded to vendor: Additional information: SLED IT UserlD: Agency No.: Device ID: DeviceORI: Is there a current User Agreement in place? Yes/ No Was the existing User ID updated or changed? Yes/ No nextest: NCIC: LEMS/JX: ALPR: Yes / No Yes / No SLED/CJIS Access Form Rev
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Information and Communications
CRIMINAL JUSTICE AGENCY ACCESS AGREEMENT
ASSIGNED ORI: Al.0050] 3C CRIMINAL JUSTICE AGENCY ACCESS AGREEMENT This document constitutes an agreement between the Commission (Commission), an agency of the State of Alabama with headquarters at 20
SUBCHAPTER 4H ORGANIZATIONAL FUNCTIONS AND DEFINITIONS
Original DATE PRINTED 0 NCAC 0H.00 is adopted with changes as published in :0 NCR 00 as follows: SUBCHAPTER H ORGANIZATIONAL FUNCTIONS AND DEFINITIONS SECTION.000 GENERAL PROVISIONS NCAC 0H.00 SCOPE (a)
FLORIDA DEPARTMENT OF JUVENILE JUSTICE PROCEDURE
PROCEDURE Title: Florida Crime Information Center (FCIC), National Crime Information Center (NCIC), Criminal Justice Network (CJNet), Judicial Inquiry System (JIS), and Driver And Vehicle Information Database
STATE OF WISCONSIN DEPARTMENT OF JUSTICE
STATE OF WISCONSIN DEPARTMENT OF JUSTICE J.B. VAN HOLLEN ATTORNEY GENERAL Kevin St. John Deputy Attorney General December 2014 Division of Law Enforcement Services Crime Information Bureau Walt Neverman,
Overview of Current Criminal Justice Information Systems
Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS
DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS (By authority conferred on the Department of State Police by 1974 PA 163, MCL 28.214, and Executive Reorganization
803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)
803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS) Section 7.01: Purpose and Scope 7.02: Definitions 7.03: Criminal Justice Agency (CJA) Access to Criminal Justice Information System (CJIS) 7.04:
CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION
1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
Criminal Justice Information Services (CJIS) Law Enforcement National Data Exchange (N-DEx) Policy and Operating Manual
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Law Enforcement National Data Exchange (N-DEx) Policy
CJIS Division Update
CJIS Division Update Oregon State Police Criminal Justice Information Services Division Kendele Miyasaki, Training Coordinator Russ Hoskins, Training Specialist CJIS/LEDS Contact Information Criminal Justice
MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network
Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly
For MINNESOTA January 2009
For MINNESOTA January 2009 January 2009 Management Advisory Committee for Community Supervision and Services (MACCSS) Technology Subcommittee Introduction... i Quick Reference - Criminal Justice Information
September 2011 Report No. 12-002
John Keel, CPA State Auditor An Audit Report on The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice Report No. 12-002 An Audit Report
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...
Law Enforcement Records Management Systems
Positron Public Safety Systems Page 1 of 9 Law Enforcement Records Management Systems A Public Safety Primer Positron Public Safety Systems Page 2 of 9 Table of Contents 1.0 INTRODUCTION 3 2.0 COMPONENTS
Rules. Of The Georgia Crime Information Center Council
Rules Of The Georgia Crime Information Center Council October 2007 1 Rules Of The Georgia Crime Information Center Council Chapter 140-1 Organization Table of Contents 140-1-.01 Organization. Amended.
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
How To Improve The Criminal History Record Check Program
PB 2 Performance Report No. 98-74 March 1999 Technology Issues Limit FDLE Criminal Justice Information Program's Success This report assesses the performance of the Criminal Justice Information Program
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users Version 1.2 Hawaii Criminal Justice Data Center March 20, 2014 Table of Contents Table of Contents... 2 I.
Criminal Justice Information Services (CJIS) National Data Exchange (N-DEx) Policy and Operating Manual
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) National Data Exchange (N-DEx) Policy and Operating
South Carolina Name Change Request Packet
South Carolina Name Change Request Packet This packet was created in an effort to assist transgender people in navigating the sometimes overwhelming process of undergoing a legal name change in the state
LAW ENFORCEMENT RECORDS MANAGEMENT SYSTEMS (RMSs)
U.S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division LAW ENFORCEMENT RECORDS MANAGEMENT SYSTEMS (RMSs) as They Pertain to FBI Programs and Systems Integrated
ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES
TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)
Next Generation Identification Program (NGI) Rap Back Service
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Next Generation Identification Program (NGI) Rap Back Service Criminal Justice Policy and Implementation
TIME SYSTEM NEW OPERATOR TRAINING
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM NEW OPERATOR TRAINING Revised 11/19/2013 (2014 New Operator.doc) TO: FROM: RE: New TIME System Operators The Crime Information Bureau (CIB) TIME System
Missouri State Highway Patrol Criminal Justice Information Services Division. Report On Criminal History Background Checks
Missouri State Highway Patrol Criminal Justice Information Services Division Report On Criminal History Background Checks Contents Introduction...1 Overview... 2-3 I. Missouri Criminal History Record
Criminal Justice Information System (CJIS) Vendor Policy Guidelines
Criminal Justice Information System (CJIS) Vendor Policy Guidelines Last Updated: 08/17/2015 Massachusetts Department of Criminal Justice Information Services 200 Arlington Street, Suite 2200 Chelsea,
Washington State Patrol ACCESS Section
Washington State Patrol ACCESS Section ACCESS Overview Business Section Section Manager 3 Auditors 2 Trainers 1 ISO 1 Office Manager Tier 1 Support First line technical support Tier 2 WAJIS Manager 3 ACCESS
FBI CJIS SECURITY ADDENDUM
FBI CJIS SECURITY ADDENDUM The following is an expanded version of the FBI Criminal Justice Information Services (CJIS) Security Addendum. This document was created in order to assist Texas agencies and
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
Quincy Police Department One Sea Street Quincy, MA 02169 (617) 479-1212 TTY: (617) 376-1375
PAUL KEENAN CHIEF OF POLICE Quincy Police Department One Sea Street Quincy, MA 02169 (617) 479-1212 TTY: (617) 376-1375 Please complete the attached Firearms Application. All questions must be answered
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.5 06/01/2016 Prepared by:
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Security awareness training is not a substitute for the LEADS Security Policy.
Revised 4/2014 This training will discuss some of the duties of the Terminal Agency Coordinator (TAC), Local Agency Security Officer (LASO) and provide basic security awareness training. Security awareness
STEP 5 - EDUCATION You must request Official Transcripts verifying your education, to be sent directly from your college or university.
INFORMATION & INTRUCTIONS FOR CPA CERTIFICATION This application is for CPA Licensure by Original Certification based on an applicant s passing the CPA Examination in another state. The applicant will
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.3 Prepared by: CJIS Information
APPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
Senate Bill No. 38 Committee on Transportation and Homeland Security
Senate Bill No. 38 Committee on Transportation and Homeland Security CHAPTER... AN ACT relating to criminal records; creating the Records and Technology Division of the Department of Public Safety; enumerating
Criminal Justice Institute 2013 August 27, 2013. Gary Kalstabakken Product Manager: BCA-MNJIS
Criminal Justice Institute 2013 August 27, 2013 Gary Kalstabakken Product Manager: BCA-MNJIS BCA Products Overview What information is available? Who Gets What Information? How Do You Get It? Product Specifics
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information
REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM
STATE OF TENNESSEE Alcohol Beverage Commission REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM DATE: JUNE 3, 2015 RFI # 31603-15001 IS AMENDED AS FOLLOWS:
Alan Ferretti CJIS Information Security Officer
Alan Ferretti CJIS Information Security Officer AGENDA What is CJIS? What is the APB? What is new in the latest version of the CJIS Security Policy? Advanced Authentication change Mobile policy for Tablets
Alien Criminal Response Information Management System (ACRIMe) April 22, 2010
for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100
Information Technology. Security Awareness Training for Administrative Personnel
Information Technology Security Awareness Training for Administrative Personnel This training information is intended for criminal justice Administrative Personnel without direct access to IDACS/CJIS systems.
Reciprocity Application 12/2012
The Florida Board of Nursing Certified Nursing Assistants Reciprocity Application 12/2012 Phone.850. 245.4125 Fax.850.412.2207 4052 Bald Cypress Way, BIN C-13 Tallahassee, FL 32399-3252 [email protected]
APPLICATION FOR LICENSURE AS AN INSTALLMENT SELLER
APPLICATION FOR LICENSURE AS AN INSTALLMENT SELLER PART 1 The Pennsylvania Department of Banking and Securities (the Department) welcomes your request for this Installment Seller application. It is the
GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject CJIS Security Topic Series Number SPT 302 12 Effective Date March 28, 2014 Related to: GO-SPT-302.08 (Metropolitan Police Department (MPD) Wide Area Network)
Livescan cards, when received, apply electronically to the DCI & FBI records
Juveniles should be fingerprinted upon being taken into custody for any serious or aggravated misdemeanor or felony charge and the Final Disposition Report started Livescan electronically submits cards
140-2-.04 Criminal Justice Information Exchange and Dissemination.
140-2-.04 Criminal Justice Information Exchange and Dissemination. (1) Exchange and dissemination of criminal justice information by criminal justice agencies: (a) Criminal justice agencies shall exchange
Pre-Employment Background Checks. October 2, 2006
Date Effective October 2, 2006 City Manager Revision Date Effective Code Number HR19 Human Resources Responsible Key Business Purpose: The City of Charlotte seeks to ensure the safety and security of employees
Pennsylvania State Police COMMONWEALTH LAW ENFORCEMENT ASSISTANCE NETWORK ADMINISTRATIVE REGULATIONS. Version 4.7
Pennsylvania State Police COMMONWEALTH LAW ENFORCEMENT ASSISTANCE NETWORK ADMINISTRATIVE REGULATIONS Version 4.7 Bureau of Communications and Information Services 1800 Elmerton Avenue Harrisburg, PA 17110
CJIS Information Security Awareness Training for Texas
CJIS Information Security Awareness Training for Texas Objectives This Information Security Awareness Training is designed to equip those who access the data that moves through TLETS with basic tools needed
INSTRUCTIONS FOR MAKING APPLICATION FOR A PERMANENT EMPLOYEE REGISTRATION CARD (PERC)
INSTRUCTIONS FOR MAKING APPLICATION FOR A PERMANENT EMPLOYEE REGISTRATION CARD (PERC) NOTICE: The PERC shall expire on May 31, 2012 and every 3 years thereafter. You will automatically receive your renewal
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION
NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION PRESENTED BY: MICHIGAN STATE POLICE CRIMINAL JUSTICE INFORMATION CENTER SECURITY & ACCESS SECTION A PROUD tradition of SERVICE through EXCELLENCE,
UCR Highlights Crime in Virginia
Virginia State Police Criminal Justice Information Services (CJIS) Division Newsletter UCR Highlights Crime in Virginia July 2015 Volume 28, Issue 1 Page UCR - Crime in Virginia 1-3 UCR - Group A Offenses
Background Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD The goal of this document is to provide adequate security and integrity for background check information while under the control or management of an
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.4 Prepared by: CJIS Information
Justice Information Sharing Division ( ND CJIS ), and
Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This
Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34
Pay Range: 34 POSITION SUMMARY: This is advanced professional, technical, and consultative work that involves developing, organizing, implementing, and directing all activities associated with a specific
NSA Briefing: Security Risk Assessments for Possession, Use and Transfer of Select Agents
NSABB Briefing: Security Risk Assessments for Possession, Use, and Transfer of Select Agents Robbin S. Weyant Division of Select Agents and Toxins Coordinating Office for Terrorism Preparedness and Emergency
South Carolina Department of Insurance Professional Bondsman / Runner / Surety Bondsman License Application
South Carolina Department of Insurance Professional Bondsman / Runner / Surety Bondsman License Application Staple a passport size full-face photograph of applicant here. Please check only one type of
Assessing Completeness and Accuracy of Criminal History Record Systems: Audit Guide
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Criminal Justice Information Policy Assessing Completeness and Accuracy of Criminal History Record Systems: Audit Guide
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS RENEWAL OF PRIVATE DETECTIVE LICENSE *Complete this renewal form if you are an employee, owner, partner,
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS
PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS IMPORTANT INFORMATION: Complete this application if you are applying to the Board for a pharmacy technician registration. You must answer all questions on
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
How to Clear an Arrest from Your Record in Texas (Expunction)
How to Clear an Arrest from Your Record in Texas (Expunction) Can I clear an arrest from my record? You may be able to clear an arrest from your record through a process called expunction if: charges were
MISSISSIPPI DEPARTMENT OF PUBLIC SAFETY Criminal Information Center
MISSISSIPPI DEPARTMENT OF PUBLIC SAFETY Criminal Information Center Policy The Center currently processes a number of criminal history background checks by name and/or fingerprints. Included below is a
LEIN Policy Manual. Michigan Department of Human Services - Office of the Inspector General 1/1/2002
LEIN Manual Type Access Topic Date CHR Checks - Protective Service to Dignitaries Access to LEIN is granted for protective services pertaining to the physical protection of authorized persons (dignitaries)
The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.
The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is
Oregon Uniform Crime Reporting. Oregon State Police Criminal Justice Information Services Michael Hawkins UCR/LEDS Program Manager
Oregon Uniform Crime Reporting Oregon State Police Criminal Justice Information Services Michael Hawkins UCR/LEDS Program Manager Why Do We Report Crime Statistics ORS 181.550 mandates that all law enforcement
Delete Regulation 73-40(1)-(36) and replace with the proposed regulations (73-400 through 73-422).
SOUTH CAROLINA LAW ENFORCEMENT DIVISION CHAPTER 73 Statutory Authority: 1976 Code Section 40-18-30 (Administrative Regulations - Effective June 23, 2006) Instructions: Delete Regulation 73-40(1)-(36) and
Dress is business casual. Please wear comfortable shoes as the CJIS Division is a large complex.
The Federal Bureau of Investigation s Criminal Justice Information Services (CJIS) Division is hosting Uniform Crime Reporting (UCR) training at the CJIS Complex located in Clarksburg, West Virginia. The
Tennessee s Integrated Criminal Justice Portal
Tennessee s Integrated Criminal Justice Portal Users Guide Version 5 October 15, 2010 Table of Contents Tennessee s Integrated Criminal Justice Portal... 1 What s New in TNCRIM?... 4 Accessing TNCRIM...
APPLICANT INFORMATION (please print or type)
STATE OF MINNESOTA DEPARTMENT OF COMMERCE 85 7 TH PLACE EAST, SUITE 600 ST. PAUL, MINNESOTA 55101 (651) 539-1599 (For Department Use Only) DESIGNATED HOME STATE BUSINESS ENTITY INSURANCE ADJUSTER LICENSE
APPLICATION FOR EMPLOYMENT Please TYPE or print using BLACK or BLUE ink
Name: First Last 11878 Avenue of Industry San Diego, CA 92128 Telephone: (858) 675-4200 Fax: (858) 675-9241 APPLICATION FOR EMPLOYMENT Please TYPE or print using BLACK or BLUE ink Date Application Completed:
EXPUNCTIONS IN TEXAS
EXPUNCTIONS IN TEXAS Texas Young Lawyers Association Family Law Committee P.O. Box 12487, Capitol Station Austin, TX 78711-2487 (800) 204-2222 Ext. 1800 For additional family law resources, visit www.tyla.org.
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.
Inform RMS The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Covering the entire life span of records development from initial generation to
Disclosure and Authorization to Obtain Information
Disclosure and Authorization to Obtain Information In connection with my suitability for employment with, (herein Company ) or if employed, I understand that prior to or at the time after my employment
FBI Criminal Justice Information Services (CJIS) Division NICS. Tammy L. Phillips NICS Liaison Specialist NICS Business Unit 2015 NAJIS Conference
FBI Criminal Justice Information Services (CJIS) Division NICS Tammy L. Phillips NICS Liaison Specialist NICS Business Unit 2015 NAJIS Conference The Brady Act The Brady Handgun Violence Prevention Act
1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?
i I, I 1 WHAT IS IPSFRP? The Interstate Photo System Facial Recognition Pilot (IPSFRP) accepts Facial Recognition Search (FRS) requests and returns a s~ore-ranked list of candidates in the Search Results
THE GEORGIA CRIME INFORMATION CENTER Georgia Guide for Non Criminal Justice Agency Access to Criminal History Record Information (Rev.
THE GEORGIA CRIME INFORMATION CENTER Georgia Guide for Non Criminal Justice Agency Access to Criminal History Record Information (Rev. February 2010) 1 Table of Contents Introduction... 3 Authority...
OFFICE OF THE DISTRICT ATTORNEY Third Judicial District Of Kansas Chadwick J. Taylor, District Attorney
OFFICE OF THE DISTRICT ATTORNEY Third Judicial District Of Kansas Chadwick J. Taylor, District Attorney Shawnee County Courthouse Fax: (785) 251-4909 200 SE 7th Street, Suite 214 Family Law Fax: (785)
