CPU policy Flashcards
What are the conditions under which agencies outside the department can access data?
- Acting as agent for LFUCG, 2. Requested by govt/police, 3. Approved open records request, 4. Authorized policy/agreement, 5. Approved by Chief of Police.
What does User Security involve?
Securing login credentials, keeping passwords confidential, reporting suspected password loss, and annual audits by CIS.
What is required before operating a mobile data computer?
Training from CIS/Training Section, including orientation and LINK/NCIC training if not previously attended.
What precautions should be taken to ensure the security of Mobile Data Computers (MDC)?
Securing MDC in home or vehicle trunk when not in use, locking vehicle if MDC is logged on and unattended, and not introducing unauthorized software/files.
What actions must be taken in case of any problem with the MDC network?
Immediately report to CIS regardless of the time of day to minimize possible impact on other users.
What procedures should LINK/NCIC transactions adhere to?
Current policies’ procedures should be followed for all LINK/NCIC transactions.
What is the protocol for Hit confirmations on the MDC?
Hit confirmations will be confirmed by E911; no enforcement action will occur solely based on MDC hit without confirmation.
What is strictly prohibited while using the MDC?
Playing games of any kind on the MDC is strictly prohibited.
What should employees avoid doing while operating the vehicle with an MDC?
Avoid introducing software/files not issued/approved by CIS and avoid playing games on the MDC.
What steps should be taken to protect the MDC from potential theft while not in use?
Secure MDC in home or vehicle trunk, and lock the vehicle if MDC is left unattended and logged on.
What are the restrictions on email usage?
Email is for work purposes; attachments from unsolicited mail must not be opened or saved.
What is the default Exchange mailbox size?
2GB for total storage of Inbox, Sent Items, Calendar, Contacts, and Deleted Items.
Who can add or remove authorized users from shared computer files?
Computer technicians are responsible for adding or removing authorized users.
When can computer technicians delete game files or trouble-causing programs?
Computer technicians are authorized to delete game files or problematic programs.
Under what conditions can email be opened and read by CIS?
When needed to protect network integrity, comply with court orders, or for investigations.
Where should suspicious email sender addresses be reported?
Report sender’s address to CISHelpDesk@lexingtonpolice.ky.gov for suspicious emails.
What happens to data stored on computer local drives, according to CIS policy?
Data stored on local drives will not be backed up and may be deleted.
Who owns the data stored on media owned by the department?
Data stored on department-owned media is the property of the department.
What does G.O. 2015-06A pertain to?
Computer Policy of the Lexington Police Department
When was G.O. 2015-06A effective?
12/02/16
What is the purpose of the Computer Policy outlined?
To manage the department’s computers and network
Which policy guidelines must department employees follow for computer use?
GP 25, FBI CJIS Security Policy, and training guidelines
Who is responsible for proper backup procedures of data on the AS/400?
Computer Information Systems Unit (CIS)
Define Computer Hardware as per the course notes.
Components like laptops, servers, peripherals, and wiring
What is the role of Mobile Data Computers (MDC) in vehicles?
To access wireless resources within the department
How are computer hardware and software purchases approved?
Forwarded to the Computer Information Systems (CIS) Unit
Who should requests for computer support or repair be made to?
CIS Help Desk (CISHelpDesk@lexingtonpolice.ky.gov)
Who is permitted to move desktop computers without CIS permission?
No one, without the permission of CIS
When are employees discouraged from typing or entering information into the MDC?
While the vehicle is in motion.
What are the two categories MDC updates fall into?
Computer Information Systems Unit updates and employee updates.
How often must employees complete the AVG Anti-Virus update?
At least once per month.
What is the procedure for disposing of digital media like tape, diskette, compact disks, and hard drives?
Securely store in the Computer Information Systems Unit Network office prior to destruction.
Which department is responsible for establishing and maintaining procedures for saving work products stored for data sharing and retrieval?
CIS.
What must be done to all backup or long-term storage media that is no longer usable before disposal?
Magnetized, formatted, and disassembled to discourage data retrieval.
What requirements must be addressed in a written agreement when the agency uses a service provider for electronic data storage?
Data ownership, sharing, access, security, loss, recovery, retention, redundancy, reports, logistical requirements, and financial arrangements.
What action must be taken if there is damage to any computer equipment?
Report it to CIS immediately.
What should be done if potential threats to network security are detected?
Report them to CIS immediately.
What is required prior to purchasing or installing non-standard computer software?
Approval from CIS.
What is the procedure for handling preinstalled game software on department computers?
Contact CIS to have it removed.
Who should conduct software installations on the network server and computers?
Only CIS.
Who is authorized to perform installation and maintenance of computer network connections?
Computer technicians or CIS designee.
What is the procedure for requests related to shared directories on the network system?
Coordinate through CIS.
Can department employees access web sites with pornographic content for personal reasons?
No, unless required by job assignment or investigative function.
What is the permissible use of Internet access for department employees?
Business-related purposes for the Department of Public Safety.