CPU policy Flashcards

1
Q

What are the conditions under which agencies outside the department can access data?

A
  1. Acting as agent for LFUCG, 2. Requested by govt/police, 3. Approved open records request, 4. Authorized policy/agreement, 5. Approved by Chief of Police.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does User Security involve?

A

Securing login credentials, keeping passwords confidential, reporting suspected password loss, and annual audits by CIS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is required before operating a mobile data computer?

A

Training from CIS/Training Section, including orientation and LINK/NCIC training if not previously attended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What precautions should be taken to ensure the security of Mobile Data Computers (MDC)?

A

Securing MDC in home or vehicle trunk when not in use, locking vehicle if MDC is logged on and unattended, and not introducing unauthorized software/files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What actions must be taken in case of any problem with the MDC network?

A

Immediately report to CIS regardless of the time of day to minimize possible impact on other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What procedures should LINK/NCIC transactions adhere to?

A

Current policies’ procedures should be followed for all LINK/NCIC transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the protocol for Hit confirmations on the MDC?

A

Hit confirmations will be confirmed by E911; no enforcement action will occur solely based on MDC hit without confirmation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is strictly prohibited while using the MDC?

A

Playing games of any kind on the MDC is strictly prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should employees avoid doing while operating the vehicle with an MDC?

A

Avoid introducing software/files not issued/approved by CIS and avoid playing games on the MDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What steps should be taken to protect the MDC from potential theft while not in use?

A

Secure MDC in home or vehicle trunk, and lock the vehicle if MDC is left unattended and logged on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the restrictions on email usage?

A

Email is for work purposes; attachments from unsolicited mail must not be opened or saved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the default Exchange mailbox size?

A

2GB for total storage of Inbox, Sent Items, Calendar, Contacts, and Deleted Items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who can add or remove authorized users from shared computer files?

A

Computer technicians are responsible for adding or removing authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When can computer technicians delete game files or trouble-causing programs?

A

Computer technicians are authorized to delete game files or problematic programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Under what conditions can email be opened and read by CIS?

A

When needed to protect network integrity, comply with court orders, or for investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where should suspicious email sender addresses be reported?

A

Report sender’s address to CISHelpDesk@lexingtonpolice.ky.gov for suspicious emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What happens to data stored on computer local drives, according to CIS policy?

A

Data stored on local drives will not be backed up and may be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who owns the data stored on media owned by the department?

A

Data stored on department-owned media is the property of the department.

19
Q

What does G.O. 2015-06A pertain to?

A

Computer Policy of the Lexington Police Department

20
Q

When was G.O. 2015-06A effective?

A

12/02/16

21
Q

What is the purpose of the Computer Policy outlined?

A

To manage the department’s computers and network

22
Q

Which policy guidelines must department employees follow for computer use?

A

GP 25, FBI CJIS Security Policy, and training guidelines

23
Q

Who is responsible for proper backup procedures of data on the AS/400?

A

Computer Information Systems Unit (CIS)

24
Q

Define Computer Hardware as per the course notes.

A

Components like laptops, servers, peripherals, and wiring

25
Q

What is the role of Mobile Data Computers (MDC) in vehicles?

A

To access wireless resources within the department

26
Q

How are computer hardware and software purchases approved?

A

Forwarded to the Computer Information Systems (CIS) Unit

27
Q

Who should requests for computer support or repair be made to?

A

CIS Help Desk (CISHelpDesk@lexingtonpolice.ky.gov)

28
Q

Who is permitted to move desktop computers without CIS permission?

A

No one, without the permission of CIS

29
Q

When are employees discouraged from typing or entering information into the MDC?

A

While the vehicle is in motion.

30
Q

What are the two categories MDC updates fall into?

A

Computer Information Systems Unit updates and employee updates.

31
Q

How often must employees complete the AVG Anti-Virus update?

A

At least once per month.

32
Q

What is the procedure for disposing of digital media like tape, diskette, compact disks, and hard drives?

A

Securely store in the Computer Information Systems Unit Network office prior to destruction.

33
Q

Which department is responsible for establishing and maintaining procedures for saving work products stored for data sharing and retrieval?

A

CIS.

34
Q

What must be done to all backup or long-term storage media that is no longer usable before disposal?

A

Magnetized, formatted, and disassembled to discourage data retrieval.

35
Q

What requirements must be addressed in a written agreement when the agency uses a service provider for electronic data storage?

A

Data ownership, sharing, access, security, loss, recovery, retention, redundancy, reports, logistical requirements, and financial arrangements.

36
Q

What action must be taken if there is damage to any computer equipment?

A

Report it to CIS immediately.

37
Q

What should be done if potential threats to network security are detected?

A

Report them to CIS immediately.

38
Q

What is required prior to purchasing or installing non-standard computer software?

A

Approval from CIS.

39
Q

What is the procedure for handling preinstalled game software on department computers?

A

Contact CIS to have it removed.

40
Q

Who should conduct software installations on the network server and computers?

A

Only CIS.

41
Q

Who is authorized to perform installation and maintenance of computer network connections?

A

Computer technicians or CIS designee.

42
Q

What is the procedure for requests related to shared directories on the network system?

A

Coordinate through CIS.

43
Q

Can department employees access web sites with pornographic content for personal reasons?

A

No, unless required by job assignment or investigative function.

44
Q

What is the permissible use of Internet access for department employees?

A

Business-related purposes for the Department of Public Safety.