NLVPD Policy CH 13 Flashcards

1
Q

What is the primary purpose of the NLVPD Computer Policy?

A

To ensure computers and related systems are used for business purposes to serve the interests of the NLVPD and the citizens

This policy provides guidance for proper use of personal computers and related systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for ensuring that employees understand and follow the computer usage guidelines?

A

Each employee, as part of a team effort

Effective information system security is a team effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Before granting remote access to the City network, whose review and approval are required?

A

The State of Nevada Local Agency Security Officer (LASO) and the Chief of Police

Approval process includes a vetting process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data created on NLVPD computer systems is considered the property of?

A

The City of North Las Vegas (CNLV)

All data created on NLVPD systems is owned by CNLV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Employees should expect privacy when using NLVPD computer systems.

A

False

Employees should not expect privacy when using NLVPD systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following activities is explicitly prohibited under the Computer Policy?

A

Downloading unauthorized software or transmitting copyrighted material without permission

Engaging in illegal, fraudulent, or malicious conduct is forbidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If an employee uses the City’s network for illegal activities, what may occur?

A

Their access may be revoked and they could face disciplinary action under NRS 1279A

Illegal activities conducted via remote access are strictly prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the employee’s responsibility regarding personal use of employer computer systems?

A

To exercise good judgment and use the systems primarily for business purposes

Acceptance of computer use policies is implied by using NLVPD systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What must supervisors and higher-level employees do regarding email usage?

A

They must check and read all email messages each work day

Supervisors and above are required to check email daily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Violation of the NLVPD Computer Policy may result in:

A

Disciplinary action up to and including termination

Improper or prohibited use of employer property can lead to serious consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote access refers to accessing _______ from off-site locations.

A

City/Department data or resources

Supports NLVPD operations by allowing authorized personnel to work remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitoring of NLVPD computer systems is conducted to ensure _______.

A

security, prevent unlawful conduct, and help maintain a productive work environment

Monitoring allows the employer to review any files or communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prohibited communications include those that are _______.

A

offensive, disruptive, harassing, threatening, derogatory, defamatory, pornographic, or indicative of illegal activity

Discriminatory messages based on various factors are also not allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The NLVPD reserves the right to access all information on its _______.

A

computers, laptops, and servers

Users may be required to provide passwords for encrypted or protected files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employees must check email at least _______.

A

once per week

Supervisors and above must check email daily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Improper activities include engaging in _______.

A

chain letters, union-related solicitations, political or religious activities, and outside employment activities

These activities are explicitly prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sharing passwords or permitting family access when using work systems is _______.

A

prohibited

Security violations also include unauthorized access to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the business purpose of providing laptops according to the policy?

A

To serve the interests of the NLVPD, the City of North Las Vegas (CNLV), and its citizens for business purposes during normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who is responsible for effective security of laptops?

A

Every NLVPD employee and affiliate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the policy outline regarding acceptable use of laptop equipment?

A

To protect both the employee and the City.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does proper use of laptops help prevent?

A
  • Virus attacks
  • Data integrity compromises
  • Resource misuse
  • Legal issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Who owns the data created on NLVPD systems?

A

The department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What must employees do regarding personal use of laptops?

A

Exercise good judgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are authorized personnel allowed to do regarding laptops?

A

Monitor systems for maintenance and audit laptops periodically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What classification is the JLINK data interface?

A

Confidential and sensitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What must employees maintain to access JLINK data?

A

JLINK certification.

27
Q

What is required to be set for laptops when unattended?

A

A password-protected screen saver activated after 30 minutes or logoff.

28
Q

Are employees allowed to engage in illegal activities using department resources?

A

No, it is prohibited.

29
Q

What action is strictly forbidden regarding copyrighted material?

A

Unauthorized copying or installing unlicensed software.

30
Q

What should employees not do with their passwords?

A

Share them with others.

31
Q

What is considered a breach of policy regarding access?

A

Accessing data or systems that you are not authorized to use.

32
Q

What is the purpose of JLINK data?

A

Strictly for officer notification within the scope of official duties.

33
Q

What type of messages are prohibited on Motorola P1 Mobile?

A

Harassing e-mails or repeated non-business messages.

34
Q

What must officers ensure about Mobile Data Terminals (MDTs)?

A

Confidential information must not be released to the general public.

35
Q

What must not be done with MDTs in public places?

A

They must never be left unattended.

36
Q

What is the primary purpose of the Laptop Computers policy?

A

To ensure laptops are used for business purposes and protect department data and resources.

37
Q

Data created on NLVPD systems is considered the property of: _______

A

The City of North Las Vegas (CNLV).

38
Q

Which of the following is a responsibility of all laptop users under this policy?

A

Exercising good judgment regarding personal use of the device.

39
Q

How must laptops be secured when left unattended?

A

They must have a password-protected screen saver set to activate automatically in 30 minutes or less or be logged off.

40
Q

What does the policy state about using department resources for illegal activities?

A

It is strictly prohibited and punishable by law.

41
Q

Which of the following actions is NOT permitted under the Unacceptable Use section?

A

Installing licensed software purchased by the department.

42
Q

What is required for individuals who monitor JLINK information?

A

JLINK certification and adherence to strict confidentiality requirements.

43
Q

According to the policy, what is the expectation of privacy for employees using NLVPD laptops?

A

No expectation of privacy since management may access all information.

44
Q

Which of the following is true regarding the use of MDTs (Mobile Data Terminals) as described in the policy?

A

MDTs should not be left unattended in public places to prevent unauthorized access.

45
Q

What consequence does the policy specify for improper or prohibited use of laptop resources?

A

Disciplinary action up to and including termination.

46
Q

What is the purpose of the JLINK system?

A

Provides a secure connection to several criminal justice applications

Applications include NCIC, NCJIS, CJIS, SCOPE, and WVS.

47
Q

What does NCIC stand for?

A

National Crime Information Center

A nationwide system serving local, state, and federal criminal justice agencies.

48
Q

What is the function of NCJIS?

A

Facilitates automated exchange of criminal justice data among authorized Nevada agencies

Nevada Criminal Justice Information System.

49
Q

What does CJIS stand for?

A

Criminal Justice Information System

A federal system for exchanging accurate criminal justice information.

50
Q

What is SCOPE?

A

Shared Computer Operations for Protection and Enforcement

A 24-hour online system containing criminal and non-criminal history information.

51
Q

What does WVS provide?

A

24-hour information on stolen, towed, repossessed, or hit-and-run vehicles

Also under Clark County control.

52
Q

What type of data is stored in NCJIS JLINK?

A

Confidential criminal justice data

Must only be accessed for authorized criminal justice purposes.

53
Q

What is unauthorized inquiry or dissemination?

A

Accessing or sharing information for curiosity or non-official purposes

Strictly forbidden.

54
Q

What are the two types of access defined for JLINK data?

A

Direct Access and Indirect Access

Direct Access involves terminal access; Indirect Access involves passing information between agencies.

55
Q

What are the physical security requirements for accessing JLINK?

A

Computers and workstations must meet CJIS policy security standards

TACs and ATACs ensure compliance.

56
Q

What must visitors do to access JLINK information?

A

Sign the CJIS visitor’s log and remain accompanied

Must not have visual access to monitors displaying JLINK information.

57
Q

What must personnel undergo to access JLINK?

A

FBI fingerprint-based background check

Includes national fingerprint checks and wants/warrant checks.

58
Q

What certification is required for personnel accessing JLINK?

A

NCIC/NCJIS certification

Must be obtained within six months and renewed every two years.

59
Q

What is the restriction on Criminal History Record Information (CHRI)?

A

Must not be released to unauthorized users

Includes restrictions on transmission via social media.

60
Q

What must be done with hard copies of JLINK information?

A

Stored securely and shredded when disposed

Confidential information must be handled appropriately.

61
Q

What audits does the NLVPD undergo?

A

Audits by the State and FBI to ensure compliance

The LVMPD audits SCOPE and WVS systems biennially.

62
Q

What are the consequences of unauthorized inquiries of JLINK information?

A

Disciplinary actions up to termination and potential criminal prosecution

Violations will be thoroughly investigated.

63
Q

What is required for personnel accessing SCOPE information?

A

Passing a fingerprint-based background check

Other identifiers are not acceptable.

64
Q

How often must the NLVPD conduct audits for SCOPE?

A

At least every two years

The NLVPD TAC must perform an annual internal audit.