FLORIDA DEPARTMENT OF JUVENILE JUSTICE PROCEDURE



Similar documents
803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 7.00: CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)

Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.

CRIMINAL JUSTICE AGENCY ACCESS AGREEMENT

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

Delete Regulation 73-40(1)-(36) and replace with the proposed regulations ( through ).

DEPARTMENT OF STATE POLICE CRIMINAL RECORDS DIVISION CRIMINAL JUSTICE INFORMATION SYSTEMS

Computer Security Incident Reporting and Response Policy

LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL

CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION

CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS

ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES

Arkansas Crime Information Center. ACIC Training Policy

Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users

Pennsylvania State Police COMMONWEALTH LAW ENFORCEMENT ASSISTANCE NETWORK ADMINISTRATIVE REGULATIONS. Version 4.7

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

Quincy Police Department One Sea Street Quincy, MA (617) TTY: (617)

How To Improve The Criminal History Record Check Program

Approved By: Agency Name Management

Rules. Of The Georgia Crime Information Center Council

For MINNESOTA January 2009

How To Protect The Time System From Being Hacked

STATE OF WISCONSIN DEPARTMENT OF JUSTICE

Peoria Police Department Policy and Procedure Manual

September 2011 Report No

MCOLES Information and Tracking Network. Security Policy. Version 2.0

CJIS Division Update

1.02 Authorized Recipient means an entity authorized by statute to receive background check information for noncriminal justice purposes.

Next Generation Identification Program (NGI) Rap Back Service

Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34

Senate Bill No. 38 Committee on Transportation and Homeland Security

Basic Law Enforcement Recruit Training Program Information Packet

SUBCHAPTER 4H ORGANIZATIONAL FUNCTIONS AND DEFINITIONS

Criminal Justice Information Exchange and Dissemination.

11B Criminal Justice Training Schools Request for Certification,

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

Justice Information Sharing Division ( ND CJIS ), and

FBI CJIS SECURITY ADDENDUM

Law Enforcement Records Management Systems

About DCJS. DCJS is comprised of 11 program areas:

Department of Defense INSTRUCTION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION

APPENDIX H SECURITY ADDENDUM

Departmental Policy for Handling of Domestic Violence Incidents Involving Law Enforcement Officers 1

How To Be A Successful University

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan

SEALING OF RECORDS. Conviction / Acquittal / Dismissal CLARK COUNTY DISTRICT ATTORNEY S OFFICE. DAVID ROGER District Attorney

FLORIDA HIGHWAY PATROL POLICY MANUAL

FLORIDA HIGHWAY PATROL POLICY MANUAL

Answering Questions About Your Juvenile Criminal History on a Job Application in Florida

Livescan cards, when received, apply electronically to the DCI & FBI records

Security awareness training is not a substitute for the LEADS Security Policy.

What Is Expungement?...1 When Can I File For Expungement?...2 Case Information...3 Petitions For Expungement...3 What Do the Dispositions Mean and

Criminal Justice Information Services (CJIS) Law Enforcement National Data Exchange (N-DEx) Policy and Operating Manual

Proposed Method of Payment: Self Pay VA Assistance Financial Aid Bright Futures Florida Prepaid Paid Agency Sponsor/Agency Name:

HIPAA COMPLIANCE PLAN. For. CHARLES RETINA INSTITUTE (Practice Name)

Criminal Justice Selection Center

Filing Fee $ Instructions for Sealing a Criminal Record

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /25/2014 9/25/2014

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Criminal Justice Institute 2013 August 27, Gary Kalstabakken Product Manager: BCA-MNJIS

INSTRUCTIONS FOR SEALING/EXPUNGING AN ADULT CRIMINAL COURT RECORD

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

FLORIDA HIGHWAY PATROL POLICY MANUAL

EXPUNCTIONS IN TEXAS

Criminals; Rehabilitation CHAPTER 364 CRIMINAL OFFENDERS; REHABILITATION

Classification: Probationary Communications Operator Title Code: V07440 Pay Range: E01

OFFICE OF THE STATE ATTORNEY NINTH JUDICIAL CIRCUIT OF FLORIDA PRE-TRIAL DIVERSION

Reciprocity Application 12/2012

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Article 6. Background Check CRIMINAL RECORD CLEARANCE 87355

First Regular Session Seventieth General Assembly STATE OF COLORADO INTRODUCED SENATE SPONSORSHIP

Criminal Justice Information Services (CJIS) Security Policy

Houston Regional Intelligence Service Center (Fusion Center) Privacy Policy. Privacy, Civil Rights, and Civil Liberties Policy

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry

The Colorado arrest record for the person noted to follow.

NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION

California s Alternative Sentencing Law for Veterans and Members of the U.S. Military

PART VIII. AUTOMATED CRIMINAL JUSTICE INFORMATION SYSTEMS

Criminal Justice Institute

Anthony ISD Bank of America and American Express Card Program Policy and Procedures Manual

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law)

Kamala D. Harris Attorney General California Department of Justice

Transcription:

PROCEDURE Title: Florida Crime Information Center (FCIC), National Crime Information Center (NCIC), Criminal Justice Network (CJNet), Judicial Inquiry System (JIS), and Driver And Vehicle Information Database (DAVID) Access and Use Procedures Short Title: FCIC, NCIC CJNet, JIS, and DAVID Access and Use Procedures Related Policy: FCIC, NCIC, CJNet, JIS, and DAVID Access and Use (FDJJ-1805) I. DEFINITIONS Agency Head - For purposes of these procedures, refers to the Secretary of the Department of Juvenile Justice (DJJ). Agency Terminal Agency Coordinator (TAC) - For purposes of these procedures, refers to the Department s Background Screening Unit Manager. Central Communication Center (CCC) - The unit within the Department that is charged with receiving reports regarding incidents from all DJJ and provider facilities, programs, offices, or sites operated by DJJ, a provider, or grantee and reporting the information to the proper authorities. Computer Security Incident - Any event resulting in the Department s computer systems, networks or data being viewed, manipulated, damaged, destroyed or made inaccessible by an unauthorized activity. Criminal History Report Information - Crimes or arrests of an individual that are reported and maintained by the state where the offense occurred, with the report containing identifying information about the individual along with arrest, disposition, and incarceration information. This term also includes information related to sealed or expunged criminal records. Criminal Justice Information Services (CJIS) - The central repository of criminal history records for the State of Florida, providing criminal identification screening to criminal justice and non-criminal justice agencies and private citizens to identify persons with criminal warrants, arrests and convictions that impact employment, licensing, eligibility to purchase a firearm, as well as a variety of criminal justice functions. CJIS provides a clearinghouse of missing and endangered persons to assist law enforcement and the public in recovering missing children and adults, and provides information to criminal justice agencies and the public on career offenders, sexual offenders and predators. Additionally, CJIS provides statistical information regarding crime for use by policy-makers and that is of interest to the public, including the compilation of Uniform Crime Report (UCR) and Hate Crime information collected from local law enforcement agencies. CJIS helps ensure the quality of the data available on the Florida Crime Information Center (FCIC) system and plays a major role in the development of policy for national sharing of criminal justice information with the FBI and other states. Quarterly seminars are held to provide training to criminal justice/law enforcement personnel on the FCIC and National Crime Information Center (NCIC) systems and to assist those individuals in interpreting and understanding the information correctly. Criminal Justice Network (CJNet) - A secure, private, statewide intranet system managed and maintained by the Florida Department of Law Enforcement (FDLE) to connect Florida criminal justice agencies to various data sources provided by the criminal justice community. Page 1 of 8 Effective Date: 3/23/10

SECTION: Customer Support Center (CSC) - A FDLE support center that provides assistance to all CJIS users regarding questions about the CJIS systems, issuing and assigning trouble tickets, assisting with device malfunctions, computer line problems, and routing all terminal messages to the designated agencies or regions of the state. This service is available 24 hours a day 365 days a year by calling toll free (800) 292-3242. Driver And Vehicle Information Database-A web-based application that enables authorized users to query Florida driver and vehicle information. Department - For purposes of these procedures, refers to the Department of Juvenile Justice. Federal Bureau of Investigations (FBI) - An agency of the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency. Florida Crime Information Center (FCIC) - The State of Florida s central database for tracking crimerelated information. Florida Department of Law Enforcement (FDLE) - An agency of the State of Florida that delivers investigative, forensic, and information system services to Florida s criminal justice community. Information Delivery Team (IDT) - A team of FDLE trainers located throughout the state to assist all criminal justice agencies with CJIS related issues. Information Security Officer (ISO) - The individual within the Department who ensures compliance with the FBI - CJIS Security Policy and any other applicable security requirements. ISOs should be knowledgeable about technical aspects of the department s network or be able to confirm information through local technical support. International Justice and Public Safety Information Sharing Network (Nlets) - A computerized, highspeed message switching system created for and dedicated to the criminal justice community for the purpose of providing interstate and/or interagency exchange of criminal justice and related criminal justice information. Judicial Inquiry System (JIS)- A web-based application that enables criminal justice entities and other government agencies access to multiple criminal justice data sources through a single point of entry. Local Agency Instructor (LAI) - A CJIS certified instructor appointed by the agency head to provide CJIS certification/recertification training and testing to criminal justice employees. The CJIS User Agreement does not require LAIs, but agencies may decide to assign an LAI. National Crime Information Center (NCIC) - The United States' central database for tracking crimerelated information. NexTEST - An on-line testing system that is available for CJIS certification via the CJNet. ORION (ORI Online) - A file that allows users to find the Original Agency Identifier (ORI) of agency when only the location (city and state) or federal agency (name of agency and state) is known. It also allows a user to gather information on the agency (such as address, phone, fax number) when only the ORI is known. Public Key Infrastructure (PKI) Certificate - The digital certificate used for access to the Department of Highway Safety and Motor Vehicle's (DHSMV), Driver and Vehicle Information Database (DAVID). Page 2 of 8

SECTION: Public Access System (PAS) - An Internet based application for use by the public to access certain FCIC records available via the FDLE website at www.fdle.state.fl.us. The public may conduct online queries for information regarding stolen property and wanted/missing persons. The response will provide status information only and will not include detailed information on the property or person. Inquiries resulting in a matching response will provide the inquirer the opportunity to send the entering agency tip information. Secondary Dissemination - When a user within the Department shares any part of a criminal history with another authorized criminal justice agency either verbally or in writing. (Note: See FDJJ-1800, Background Screening Policy and Procedure for details on sharing criminal history information.) Secondary Dissemination Log - Any agency that shares criminal history information with another entity must document whom they shared the information with and what information was shared. The dissemination log must be maintained onsite for at least four (4) years. (Note: See CJIS Certification Manual for details on the Secondary Dissemination Log.) Terminal Agency Coordinator (TAC) - The person responsible for ensuring user compliance with CJIS policy and procedures, including validation requirements as they relate to FCIC and NCIC. II. STANDARDS/PROCEDURES A. Access and Dissemination of Criminal History Report Information: 1. Use of the NCIC, FCIC,JIS, DAVID and any system accessed via the CJNet is restricted to the administration of criminal justice or as otherwise specifically authorized or required by statute. 2. The individual user is responsible for remaining current in the applications, procedures, and policies and ensuring he/she attends training sessions to maintain appropriate certifications. 3. Only users who have successfully completed Criminal Justice Information Services (CJIS) certification shall be allowed to have unsupervised access to FCIC, NCIC, and CJNet Systems. 4. FCIC/NCIC operators who are in their initial six months of assignment may be permitted supervised access to FCIC/NCIC. Operators must successfully complete CJIS certification within six months of appointment or assignment to duties requiring direct access to FCIC/NCIC. 5. All personnel, who initiate a transaction to the FCIC, shall successfully complete CJIS certification. The Department will remove from FCIC/NCIC access any employee who fails to achieve required certification standards, whose certification has expired, whose certificate is otherwise rescinded or as directed by Florida Department of Law Enforcement (FDLE). 6. All Information Technology (IT) personnel, including any vendor who will in the course of their official duties initiate a transaction to the FCIC message switch, shall successfully complete CJIS certification. 7. All IT personnel, including any vendor, responsible for maintaining/supporting any IT component used to process, store or transmit any unencrypted information to or from the FCIC message switch, shall successfully complete the CJIS Online Security Training provided by FDLE. 8. Pursuant to a signed interagency agreement as authorized by Florida Statutes and/or federal regulations, the Department may share state Criminal History Report Information (CHRI). Dissemination of information requires compliance with all applicable statutes, FCIC/NCIC and Page 3 of 8

SECTION: Interstate Identification Index (III) rules, regulations and operating procedures, including logging. The Department must maintain confidentiality of such record information that is otherwise exempt from Section 119.07(1), F.S., as provided by law. 9. CHRI will be accessed, shared and disseminated only as outlined in the FDLE CJIS Certification Manual and the Department s policy and procedure, FDJJ-1800-Background Screening. Any unauthorized access, use, viewing or dissemination of CHRI or use that would violate the terms of the Department s user agreement with FDLE will result in disciplinary action up to and including immediate dismissal, and/or potential criminal prosecution. 10. Employees who access CJNet for purposes that are not authorized, disclose information to unauthorized individuals, or violate FCIC/NCIC or III rules, regulations or operating procedures are subject to disciplinary action, up to and including immediate dismissal, and/or potential criminal prosecution under Chapter 815, Florida Statutes, or other applicable federal, state, or local laws or policies. B. Access and Use of FDLE, JIS, and DAVID Computers and Networks: 1. Employees shall at all times protect State of Florida property from loss or abuse and shall use state property, equipment, and personnel only in a manner that is beneficial to the Department. 2. Employees utilizing FDLE, JIS and DAVID computers or the FDLE, JIS or DAVID network are subject to monitoring of any and all access to the Internet and use of any and all FDLE, JIS and DAVID administered information systems. Employees must affirmatively acknowledge this during their log-on to department computers and networks by clicking OK to the following: This is a Department of Juvenile Justice computer system that is for official use by authorized users and is subject to monitoring at any time. Unauthorized or improper use of this system is a violation of Federal law and may be prosecuted resulting in criminal or administrative penalties including fines and/or imprisonment. If criminal activity is discovered, the information will be provided to the appropriate law enforcement officials. Suspected access violations or rule infractions should be reported to the Chief, Management Information Systems, and. 3. Employees having access to any FDLE, JIS, and DAVID administered system, including but not limited to those containing active criminal intelligence, criminal investigative information or law enforcement sensitive information, must adhere to the operating guidelines associated with these respective systems. Any misuse of an FDLE, JIS and DAVID administered system or failure to comply with the system operating guidelines may result in an administrative, internal, and/or criminal investigation. Misuse can include inappropriate access to or dissemination of any FDLE, JIS and DAVID administered systems or data. 4. Supervisors of employees having access to FDLE, JIS, and DAVID administered systems shall conduct random spot-check reviews of their subordinates use of these systems to ensure compliance with this and other applicable policies and procedures. 5. To obtain query reports associated with an authorized user s access to FDLE, JIS, and DAVID administered information systems, supervisors must obtain written approval through their chain of command. Upon approval from the Assistant Secretary or his/her designee, the supervisor shall send a request specifying the user s name and time period for which a report is being sought to the Agency Page 4 of 8

SECTION: TAC and/or database administrator who shall forward the request to the FDLE, JIS, and/or DAVID System Administrator at TARRequest@fdle.state.fl.us, JIS_support@flcourts.org, and/or DAVIDsupport@flhsmv.gov. 6. Any Department employee who becomes aware of or has knowledge regarding the possible misuse of any FDLE, JIS or DAVID system or network shall immediately report it to their supervisor, or as appropriate, to the Central Communication Center (CCC) at 1-800-355-2280. C. Computer Security Incidents: 1. In the event of a computer security incident, action shall be taken as outlined in the Department s Computer Security Incident Response Team, (C-SIRT) policy and procedure (FDJJ-1250). 2. The Department will immediately notify FDLE, JIS, and/or DAVID system administrators of any suspected compromise of the FCIC, NCIC, CJNet, JIS, and/or DAVID. (Note: Suspected compromise by unauthorized users or hackers shall be reported to the FDLE ISO via e-mail at CJISCSO@fdle.state.fl.us, JIS support at the Florida courts-jis_support@flcourts.org, and/or DAVID support at the Highway Safety and Motor Vehicles-DAVIDsupport@flhsmv.gov. If e-mailed the e-mail should include the following information: date of the incident, locations of incident, systems affected, method of detection, nature of the incident, description of the incident, actions take/resolution, date and contact information for the agency.) III. RESPONSIBILITY AND DUTIES A. Department of Juvenile Justice Employees Responsibilities 1. Employees shall be held responsible for systems security and integrity, to the degree that his or her job requires the use of the FCIC, NCIC, CJNet, JIS, or DAVID. Fulfillment of these responsibilities shall be mandatory, and violation of security requirements or other provision of this policy may be cause for disciplinary action up to termination. B. Agency Head or Designee Responsibilities 1. Designate an individual from its agency to function as the Terminal Agency Coordinator (TAC) and/or Point of Contact (POC). Agencies are strongly recommended to appoint an alternate TAC and or POC to assist the primary TAC. 2. Designate an Information Security Officer (ISO) to ensure security of the FCIC/NCIC, JIS, and DAVID workstations, the connection to these systems, and any access to the information services provided on these systems to or by the Department. The Department s Bureau of Management Information System (MIS) will appoint the ISO. 3. Designate a Point of Contact (POC) to receive and approve the issuance and revocation of Public Key Infrastructure (PKI) certificates for the Department s employees. The POC for PKI will be the Agency TAC or his/her designee. 4. Designate a Public Access System (PAS) Contact. The PAS Contact is responsible for any follow-up activities deemed appropriate by the Department in response to tips resulting from the posting of records on the PAS. Page 5 of 8

SECTION: 5. Ensure that the Department maintains, in current status, and provides upon request by FDLE, Florida Courts, and/or Highway Safety and Motor Vehicles a complete topological drawing, which depicts the Department s network configuration as connected to the CJNet, JIS, and DAVID. This document must clearly indicate all network connections, service agencies, and interfaces to other information systems. The Department s Bureau of MIS will oversee this function. C. TAC/POC Responsibilities: 1. Assist the agency head/designee with decisions regarding the FCIC, NCIC. 2. Shall be CJIS certified and maintain current CJIS certification. 3. Shall complete the Terminal Agency Coordinator Training provided by an IDT Regional Representative within six months of his/her appointment. 4. Shall ensure that all records, warrants and validations for his/her agency are in compliance with CJIS policies and procedures. 5. Serve as the liaison between the Department and FDLE, Florida Courts, and Highway Safety and Motor Vehicles. 6. Serve as the liaison between office personnel and the Agency TAC. 7. Enforce CJIS, JIS, and DAVID policies and procedures. 8. Ensure that the Department is represented at the quarterly Regional Working Group meetings, and scheduling quarterly workgroup meetings with the regional trainer. 9. Ensure Department and its users are in compliance with applicable state and national policies and procedures governing the use of the following: FCIC, NCIC, III, The International Justice and Public Safety Information Network (Nlets), the Criminal Justice Network (CJNet) and FBI CJIS Security Policy. 10. Ensure that all personnel who have access to FCIC/NCIC/JIS data are appropriately trained and those who will have access to terminal areas have been properly background checked. 11. Ensure that written policy is in place on validation procedures. 12. Ensure User Agreements are up-to-date with current Department head s signature. These agreements include one or more of the following as applicable: a. Criminal Justice Agency User Agreement b. CJNet Only Agency User Agreement c. Non-Criminal Justice Agency User Agreement d. Other User Agreement 13. Ensure that the Department is following proper validation procedures and that the source documents for each record entered into the FCIC/NCIC system are reviewed. Page 6 of 8

SECTION: 14. Ensure that written policy is in place for the penalties users shall receive for the misuse and abuse of the CJIS, JIS, and DAVID Systems. 15. Ensure the following training classes are offered as appropriate: a. CJIS Certification and CJIS Recertification (responsible for compliance if not designated as a Local Agency Instructor). b. On-the-Job Training (internal Computer Aided Dispatch (CAD) systems, jail management systems, records management and other systems utilizing the CJIS/CJNet applications). 16. Enter new users into the Training Information System (TIS) via eagent message keys, update user information, and register users for classes. 17. Enter/modify users in eagent s Client Manager (and/or other system interface). 18. Enter users into the nextest system for online CJIS certification/recertification testing (if designated by the Department as a nextest Administrator) or assist the Department s nextest administrator or Local Agency Instructor (LAI) in entering users. 19. Enter users into CJIS Online Security Training (if designated by the Department as a CJIS Online Administrator). 20. Ensure that all of the Department FCIC/NCIC users are CJIS certified and that they renew their certification every two years as required. 21. Troubleshoot system problems as it relates to FCIC/NCIC. 22. Make deletions of personnel from the FCIC, NCIC, JIS, and DAVID systems upon termination of employment. 23. Review operational issues/enhancements/changes of FCIC, NCIC or the Nlets and make recommendations to appropriate agency/agencies. 24. Monitor criminal history records dissemination and accuracy of dissemination log. 25. Ensure that FCIC, NCIC and CJIS memos, emails and operating manuals are distributed to all users within the Department and new procedures and capabilities are used when made available. 26. Ensure that the Department s workstations are located in a secure location, which prohibits unauthorized use or viewing. 27. Ensure that a secondary dissemination log is maintained for four years as a result of criminal history information being disseminated to employees outside the Department either verbally or in writing. 28. Ensure the Department s address is correct in the Nlets ORION file. If the information needs to be updated the TAC must contact the FDLE Customer Support Center (CSC). Page 7 of 8

SECTION: 29. Ensure that the appropriate personnel within the Department know the name(s) and phone number(s) of the TAC and/or alternate TAC. 30. Ensure the Department s information is correctly entered and maintained in the Customer Information System (CIS) via eagent message keys. 31. Maintain the settings of the Department s workstations/devices in the eagent station tables. 32. Ensure that changes in the TAC or alternate TAC are communicated to FDLE headquarters via the CJIS Agency Designated Contact form within five business days from the date of the change. The communication must be on Department letterhead. 33. Assist the Regional FDLE IDT representative(s) with issues pertaining specifically to the Department. (Example: obtaining signed agency user agreements). 34. Assist FDLE auditors during the Department s triennial audit to include correspondence audits and audits from the FBI. 35. Ensure that the Department adheres to the hit confirmation policy and that appropriate formats are used (NCIC formats are YQ/YR ; the FCIC formats are FYQ/FYR ). (Note: A hit is the positive response that is received when an agency inquires via FCIC/NCIC on a person or property. Details about the hit confirmation process can be found in the CJIS Manual on FDLE s website at: http://www.flcjn.net/cjis-resources.aspx.) IV. ATTACHMENTS N/A Page 8 of 8