CPU policy Flashcards
What are the conditions under which agencies outside the department can access data?
- Acting as agent for LFUCG, 2. Requested by govt/police, 3. Approved open records request, 4. Authorized policy/agreement, 5. Approved by Chief of Police.
What does User Security involve?
Securing login credentials, keeping passwords confidential, reporting suspected password loss, and annual audits by CIS.
What is required before operating a mobile data computer?
Training from CIS/Training Section, including orientation and LINK/NCIC training if not previously attended.
What precautions should be taken to ensure the security of Mobile Data Computers (MDC)?
Securing MDC in home or vehicle trunk when not in use, locking vehicle if MDC is logged on and unattended, and not introducing unauthorized software/files.
What actions must be taken in case of any problem with the MDC network?
Immediately report to CIS regardless of the time of day to minimize possible impact on other users.
What procedures should LINK/NCIC transactions adhere to?
Current policies’ procedures should be followed for all LINK/NCIC transactions.
What is the protocol for Hit confirmations on the MDC?
Hit confirmations will be confirmed by E911; no enforcement action will occur solely based on MDC hit without confirmation.
What is strictly prohibited while using the MDC?
Playing games of any kind on the MDC is strictly prohibited.
What should employees avoid doing while operating the vehicle with an MDC?
Avoid introducing software/files not issued/approved by CIS and avoid playing games on the MDC.
What steps should be taken to protect the MDC from potential theft while not in use?
Secure MDC in home or vehicle trunk, and lock the vehicle if MDC is left unattended and logged on.
What are the restrictions on email usage?
Email is for work purposes; attachments from unsolicited mail must not be opened or saved.
What is the default Exchange mailbox size?
2GB for total storage of Inbox, Sent Items, Calendar, Contacts, and Deleted Items.
Who can add or remove authorized users from shared computer files?
Computer technicians are responsible for adding or removing authorized users.
When can computer technicians delete game files or trouble-causing programs?
Computer technicians are authorized to delete game files or problematic programs.
Under what conditions can email be opened and read by CIS?
When needed to protect network integrity, comply with court orders, or for investigations.
Where should suspicious email sender addresses be reported?
Report sender’s address to CISHelpDesk@lexingtonpolice.ky.gov for suspicious emails.
What happens to data stored on computer local drives, according to CIS policy?
Data stored on local drives will not be backed up and may be deleted.