451 - ISM Flashcards
Who is the owner of ISM?
Assistant Chief of ISM
The ______, ______, ______ is the foundation for the JSO local security policy.
Federal Bureau of Investigations (FBI)
Criminal Justice Information Services (CJIS)
Security Policy (CSP)
Computers shall not be accessible to the _____.
public.
Bluetooth network connectivity or data sharing and transfer are ____ ________.
not permitted.
If a virus is detected, the individual will immediately do the following: (5)
- Stop all work on the affected machine
- Turn off the computer
- Do not allow others to use the computer
- Call ISM Help Desk
- ISM will perform the removal of the virus, if possible, or reloading of software if necessary.
Access to Driver and Vehicle Information Database (DAVID) is for?
criminal justice purposes only.
Confirmed _____ (of DAVID) will be reported to Florida Department of Highway Safety and Motor Vehicles (DSHMV) per the Memorandum of Understanding between JSO and DSHMV.
misuse
DAVID
Emergency Contact Information (ECI) shall only be used for the purpose of notifying an individual’s registered emergency contact in the event of a serious injury, death, or other incapacitation. ECI shall not be used to develop leads or for?
criminal investigative purposes.
If a criminal history is retrieved from FCIC/NCIC and is subject to secondary dissemination, then the following information must be recorded in a secondary
dissemination log: (8)
- The date the criminal history was released
- The subject (name) of the criminal history request
- The FBI or State Identification number (SID).
- The name of the person who the information was released to
- The requestor’s agency name
- The name of the person who released the information to the requestor
- The reason the criminal history was requested
- The purpose code used to run the criminal history.
The secondary dissemination log must be retained for ____ years.
four
If positive control of a mobile device is lost for any period of time, notify __________.
ISM Help Desk
All Inter-agency access shall be authorized by the ______ or designee.
Sheriff
JSO users should be aware that they have no ___________________ while using any
information technology resources.
expectation of privacy
Specific personnel who routinely require access to secured information systems such as, local, state, and national criminal justice systems, to perform essential
administration functions critical to the continued operation of the agency qualify for additional access. Such access is often termed ______ or _______.
administrative or privileged
Administrative or privileged accounts shall be authorized by _______ level approvals.
director
Passwords on the JSO network are electronically prompted to change every __ days.
90
When an employee leaves JSO the account will be immediately disabled, unless authorized by the ________ or ________.
Undersheriff or Sheriff
Each employee is responsible for checking his e-mail account at least _____________.
once during each workday
Viewing or opening e-mail addressed to an employee creates a _______ by JSO that the employee has read the email and all its attachments.
presumption
Internet Usage
For extremely limited personal use provided that such use does not: (4)
- Directly or indirectly interfere with computer or networking services
- Burden the JSO with additional cost
- Interfere with an individual employees’ assigned duties, employment or other obligations to the JSO
- Reflect negatively on the JSO, the COJ, or its employees
No computer-related hardware purchases will be processed through the JSO Budget Division
or Supply Units without the approval of ___.
ISM
JSO computer equipment will not be moved, removed from, or transferred between locations, unless specifically authorized by ___.
ISM
If a spill should occur, turn the computer ___. If the spill occurs on a desktop, unplug the keyboard and bring it to___. If the spill occurs to a laptop, bring it to ___ as soon as possible.
off
ISM
ISM
DO NOT USE _______ BASED PRODUCTS TO CLEAN A LAPTOP.
AMMONIA
ISM is the only unit allowed to perform any type of __________ or ________ with the exception of standard cleaning.
maintenance or repair
No personally owned devices are allowed to connect to the JSO network unless ________.
authorized
The JSO will not tolerate any employee making or using _________ copies of software.
unauthorized
Requests to purchase new software must be routed through ISM, initiated via a work order, and approved by _____ or above from each unit and ISM.
chief
No software purchases will be processed through the JSO Budget Division or Supply Unit without the approval of ___.
ISM.
When ISM is contacted for database and application design and/or development, the requestor will be redirected to the _________________for prioritization of the proposed project.
Professional Oversight Unit