NLVPD Procedure CH 13 Flashcards
New personal computers (PC) and software will be fiscally budgeted by ________.
Each Division
This indicates that each division is responsible for its own budgeting of PC and software expenses.
IT-related software, hardware, and the purchase of applications require approval from ________.
Both A and B
Approval is needed from both the Police Department IT Liaison and the CNLV IT Division.
The NLVPD will adhere to the pre-determined basic ________ standards provided by CNLV IT.
Software
Compliance with software standards is essential for maintaining operational consistency.
If a specific area needs distinctive hardware upgrades, the requesting Unit must submit them to the ________.
IT Liaison
The IT Liaison acts as the point of contact for hardware upgrade requests.
The requesting Unit is required to outline the needs and ________ from a particular software package.
Expected results
Clarifying expected results helps in evaluating the effectiveness of the software.
Uncommon or proprietary software requires research by the ________.
Requesting Unit
The requesting unit must conduct research to justify the need for uncommon software.
If a computer problem is encountered, it must be reported to the PD designee ________.
IT Liaison
Reporting issues to the IT Liaison ensures proper tracking and resolution.
Supervisors should maintain a record of the CMOS passwords and ________ passwords for computers in their area.
Screen Saver
Keeping track of screen saver passwords is crucial for security management.
The IT Liaison will perform a random review of all personal computers at least ________.
Annually
Regular reviews help ensure compliance and security of personal computers.
Field laptop passwords will be assigned by the ________.
Mobile Data Technician
The Mobile Data Technician is responsible for password management on field laptops.
Employees are not allowed to install passwords unless ________.
They are authorized by their supervisor
Authorization ensures controlled access and security measures are followed.
If computer problems occur after normal working hours, assistance can be obtained by calling ________.
415-7977
This number provides after-hours support for computer issues.
The Department IT Liaison is responsible for reviewing all personal computers to ensure compliance with policies, at least ________ annually.
Once
Annual reviews help maintain adherence to IT policies.
Computer-related problems must be documented in the ________ system with a priority assignment.
Request for Service (HEAT)
Proper documentation in the HEAT system is essential for tracking issues.
Supervisors will only know the passwords that access computers in their ________.
Work area
Limiting password knowledge helps enhance security within the department.
A ________ is a self-published diary or commentary on a particular topic that may allow visitors to post responses, reactions, or comments.
Blog
Blogs serve as platforms for personal expression and interaction.
A ________ is the specific portion of a social media website where content is displayed and managed by an individual or individuals with administrator rights.
Page
Pages are essential for organizing and sharing content on social media.
The act of publishing content on a social media site is known as a ________.
Post
Posting is the primary way users contribute content to social media.
________ is information that a user provides about himself or herself on a social networking site.
Profile
Profiles contain essential information about users on social networks.
________ refers to a category of Internet-based resources that integrate user-generated content and user participation, such as social networking sites, microblogging sites, and photo-sharing sites.
Social Media
Social media encompasses various platforms that promote user interaction.
________ are online platforms where users can create profiles, share information, and socialize with others using a range of technologies.
Social Networks
Social networks facilitate connections and interactions among users.
________ refers to the expression or communication of thoughts or opinions in spoken words, in writing, by expressive conduct, symbolism, photographs, videotape, or related forms of communication.
Speech
Speech encompasses various forms of communication beyond just spoken words.
The second generation of the World Wide Web, focused on shareable, user-generated content, is referred to as ________.
Web 2.0
Web 2.0 emphasizes user interaction and contribution.
A ________ is a web page(s) that can be edited collaboratively.
Wiki
Wikis allow multiple users to contribute and edit content collectively.
Social media pages managed by the Department should include an introductory statement that clearly specifies the ________ and scope of the agency’s presence on the website.
Purpose
Defining the purpose helps users understand the intent of the social media presence.
All Department social media sites or pages must be approved by the ________.
Chief of Police or designee
Approval ensures that all content aligns with departmental policies.
Social media content must comply with applicable ________ laws, regulations, and policies.
All of the above
Compliance with laws ensures responsible use of social media.
Social media pages should clearly indicate that posted comments will be ________ by the Department.
Monitored
Monitoring comments helps maintain a professional environment.
Department personnel using social media must identify themselves as a ________.
Member of the Department
Identification is crucial for transparency and accountability.
Department personnel are prohibited from conducting ________ activities while using social media for Department purposes.
Private business
This restriction helps avoid conflicts of interest.
Social media is a valuable investigative tool for seeking evidence on ________ persons.
Missing
Social media can provide leads and information on missing individuals.
Department personnel should not post, transmit, or otherwise disseminate any information obtained through their employment without ________ from the Chief of Police or designee.
Authorization
Authorization protects sensitive information from unauthorized sharing.
Social media content can be used for community outreach by providing crime prevention tips and ________ opportunities.
Reporting
Engaging the community through social media enhances public safety efforts.
________ can be used to make time-sensitive notifications related to events like road closures or weather emergencies.
Social Media
Social media serves as an effective platform for urgent communications.
Employees must ________ Department logos, uniforms, or identifying items on personal web pages without authorization.
Avoid
Unauthorized use of departmental identifiers can lead to misrepresentation.
Department personnel are prohibited from posting ________ on personal social media accounts that could negatively affect public perception of the Department.
Personal opinions
Maintaining a professional image is crucial for public trust.
E-mails directed to the email group “________” must be approved by the Assistant Chief.
CNLV PD
Approval ensures that communications are appropriate and relevant.
E-mails directed to the email group “CNLV PD” or “NLVCCC” should be forwarded through the requestor’s chain of command to the ________ for review.
Sr. Office Assistant
This process helps manage and streamline email communications.
If the e-mail request is approved, the following statement must be added to the text: “This message has been approved by ________.”
[name of the Assistant Chief]
Including this statement provides necessary authorization for the email.
E-mails directed to the email group “________” must be approved by the Chief of Police.
CNLV Everyone
This ensures that all communications to a broad audience are vetted.
The proposed e-mail for the “CNLV Everyone” group must be forwarded to the ________ through the requestor’s chain of command for review and approval.
Chief’s Executive Secretary
This role is key in managing high-level communications.
Those directly under the Chief’s command should forward requests to the ________ for review.
Chief’s Executive Secretary
This ensures requests are handled appropriately.
A notification will be sent back to the requestor indicating that the e-mail request is either ________ or ________.
approved, denied
This feedback process is important for communication clarity.
There are ______ types of laptop assignments issued by the NLVPD System Support Division.
3
Understanding the types of assignments helps in resource allocation.
One type of laptop assignment issued by the NLVPD System Support Division is a laptop assigned to a ________.
Patrol unit (Toughbook)
Toughbooks are specifically designed for field use.
The information in this chapter does not apply to laptops checked out from _________.
Another NLVPD Division, like Training
This distinction helps clarify policy applicability.
In compliance with NCJIS Security Policy 5.6.2.2, a ________ will be issued to all laptop users to ensure two-factor authentication.
fob
Two-factor authentication enhances security for laptop users.
When a laptop needs repair, the laptop with the entire kit will be delivered to the ________.
Mobile Data Unit
This unit is responsible for handling repairs and maintenance.
In the event of a laptop assigned to a Patrol unit being damaged, the officer is responsible for filling out a ________.
work order
A work order documents the need for repairs.
The laptop assigned to a Patrol unit will be the responsibility of the ________.
Assigned officer for the shift
Accountability is crucial for the management of departmental equipment.
If a laptop in a Patrol unit is damaged due to improper use, the officer will need to write a ________ through their chain of command explaining the damage.
memo
A memo provides a formal record of the incident.
Laptops assigned to a Bureau or Division are issued on an ________ basis unless a laptop is purchased for the Bureau or Division.
availability
Availability determines how resources are allocated among divisions.
Employees will not load any software on a Department-owned laptop computer without approval from the ________.
Department Computer Committee
This committee oversees software installations to maintain security.
The Agency Support Specialist will collect all laptops turned in and destroy all data stored on the hard drives using a ________ tool.
Department of Defense (DOD)
Secure data destruction is vital for protecting sensitive information.
Employees will not use laptops in the vehicle unless the vehicle is at a ________.
complete stop
This policy is in place to ensure safety while operating vehicles.
All employees will have access to the Motorola P1 Mobile program after being entered into the program’s ________.
server databases
Access management is crucial for system security.
All commissioned supervisors (sergeant and above) and civilian supervisors will have ________ user rights on the Motorola P1 Mobile program.
query privileged
Query privileges allow supervisors to access necessary information.
If an employee has a ride-along who is not certified for JLINK access, they will not be allowed to view any screen with ________ information.
confidential
Protecting confidential information is a key aspect of operational security.
If a supervisor needs to print talk messages from the Motorola P1 Mobile program, they must write a ________ identifying why the information is needed.
request memo
This ensures that the request for information is documented and justified.
Employees will be required to use JLINK in the patrol vehicle only for ________ purposes.
lawful investigation
Limiting use to lawful investigations helps maintain integrity.
Any employee found to have violated this policy/procedure may be subject to ________.
disciplinary action
Enforcement of policies ensures adherence and accountability.
Employees will be required to use JLINK in the patrol vehicle only for ________ purposes.
lawful investigation
This underscores the importance of using JLINK strictly for professional duties.
Any employee found to have violated this policy/procedure may be subject to ________.
disciplinary action
This indicates the seriousness of adherence to the policy.
Which of the following is a requirement for terminal equipment and/or printers according to NLVPD’s JLINK policy?
They must be placed in physically secure locations away from unauthorized access
This is crucial for protecting sensitive information.
Which of the following actions is NOT required when disposing of hard copy records that contain confidential information?
Throw them away in a regular trash bin
Proper disposal methods are essential to maintain confidentiality.
What must be done before granting access to criminal justice information (CJI) at NLVPD?
A wants/warrants check and NCJIS/NCIC III check must be done
This is part of the vetting process for accessing sensitive information.
Which of the following must be included in the CJIS visitor log at NLVPD facilities?
The visitor’s signature
This helps maintain a record of who accesses sensitive areas.
If a terminal has multiple session capabilities, what must be assigned to each session?
A unique terminal ID and ORI
This ensures accountability for each session.
What is required for accessing NCIC according to the NLVPD JLINK policy?
A complex password with at least 8 characters and specific criteria
Strong passwords are vital for security.
When a user exceeds the maximum number of invalid login attempts, what happens next?
The user is temporarily locked out for 5 minutes
This is a security measure to prevent unauthorized access.
Who must be present when a shred company employee is on-site at the NLVPD?
An authorized user must escort the shred company employee at all times
This is to ensure secure handling of sensitive documents.
What action must be taken if a visitor does not have a proxy card and has not undergone a fingerprint background check?
They must sign the CJIS visitor log and be escorted
This maintains security protocols for visitor access.
Which of the following statements is true regarding NLVPD’s employee security procedures?
Only employees who have successfully passed a fingerprint background check and training are considered authorized
This emphasizes the importance of thorough employee vetting.
What must the TAC do if an employee who has access to JLINK no longer works at NLVPD?
Immediately deactivate/disable the terminal operator access
This is crucial for maintaining security after an employee’s departure.
Which level of training is required for all personnel requiring access to view information from JLINK?
Level 2 – NCIC/NCJIS Practitioner Training
This ensures that all personnel are adequately trained for secure information access.
What is the minimum password length required for NCIC access according to the policy?
8 characters
This is a standard security requirement to enhance password strength.
What is the purpose of the CJIS visitor log at NLVPD facilities?
To monitor visitors in physically secure locations that access criminal justice information
This helps in tracking access to sensitive areas.
What action is prohibited when handling criminal history record information (CHRI)?
Performing inquiries for curiosity or reasons other than authorized
This highlights the importance of using CHRI only for legitimate purposes.
Which of the following electronic devices may be used to transmit Criminal History Record Information (CHRI)?
Electronic devices using wireless or radio technology
This specifies permissible technology for transmitting sensitive information.
CHRI must be maintained in a secure records environment and accessible only to ________.
Authorized personnel
This is essential for protecting sensitive data.
When is the facsimile device authorized to transmit hard copy CHRI?
When both agencies are authorized to receive criminal history information and the device is in a secure location
This ensures secure and authorized transmission.
Which of the following is NOT an authorized method for transmitting CJIS data?
Sending via G-mail
This method lacks the necessary security measures.
What is required when transmitting CJIS data through Law Enforcement Online (LEO)?
The sender and receiver must be in a physically secure location
Security protocols are critical during data transmission.
Secondary dissemination involves sharing criminal history information with ________.
External criminal justice agencies that are authorized to receive CHRI
This ensures that CHRI is only shared with legitimate entities.
Which of the following information must be included in the Secondary Dissemination Form?
The name of the subject of the information and the date of access
This is necessary for tracking information dissemination.
What must happen before CHRI is transmitted via fax?
The receiving agency must be verified to have an authorized NCIC ORI number
This is a critical verification step before transmission.
The correct Purpose Code must be used when querying Triple I (III) to comply with ________.
The Privacy Act of 1974
Compliance with legal standards is crucial during information queries.
How long must the Secondary Dissemination Form be maintained?
Three years
This duration is part of record-keeping requirements.
CHRI must be used exclusively for ________.
Criminal justice purposes
This emphasizes the limited scope of CHRI usage.
Which of the following is an authorized method for sending CJIS data?
Sending via P: drive folder
This method is secure and compliant with policies.
CHRI must be destroyed by _______ when no longer needed.
Shredding hard copies
Secure destruction of sensitive information is essential.
Which of the following divisions can disseminate printed criminal justice information to an outside agency?
Narcotics Bureau
This division has specific authority for dissemination.
The use of G-mail for transmitting CJIS data is prohibited because ________.
It lacks necessary encryption
Security is a primary concern in data transmission.
The CHRI records must be disposed of by _______ when no longer needed.
Shredding
This ensures that sensitive information cannot be recovered.
For the transmission of CHRI via fax, what should be verified beforehand?
The receiving agency’s authenticity and NCIC ORI number
Verification is critical to ensure compliance and security.
Which of the following actions is prohibited for CHRI dissemination?
Disseminating it for personal use or gain
This highlights the ethical handling of sensitive information.
When transmitting CHRI data via physical pickup, what is required?
Verification of the identity of the personnel picking up the CHRI
This is necessary to ensure secure handover of sensitive information.
A user querying Triple I must include which of the following in the Attention Line?
The purpose of the inquiry
This is important for accountability and record-keeping.
An NCJIS or NCIC hit alone is ________ probable cause to arrest.
Not sufficient
This emphasizes that additional evidence is needed for legal action.
What does an NCJIS hit provide?
The fact that a warrant has been filed and other pertinent information
This is crucial for understanding the context of a hit.
What additional information does an NCIC hit provide?
The date of the theft, missing person report, or warrant
This information is vital for tracking and investigation.
A hit alone must be added to _______ to establish sufficient legal grounds for probable cause.
Additional facts
This indicates the need for corroborative evidence.
Correct NCJIS and NCIC procedures require the inquiring agency to _______ to confirm that the data is correct and up-to-date.
Contact the agency that placed the record in file
Verification is essential to ensure data accuracy.
As the time period of an entry increases, the significance of the hit ________.
Decreases
Timeliness is a crucial factor in the relevance of information.
A hit confirmed with the originating agency may be adequate grounds to _______.
Recover stolen property, return a missing person, or arrest a fugitive
This highlights the practical applications of confirmed hits.
The primary purpose of confirming a hit with the originating agency is to _______.
Ensure that the information is correct and up-to-date
This is essential for maintaining the integrity of law enforcement actions.
A hit alone would require the officer to _______ to substantiate an arrest.
Obtain additional information
This reinforces the necessity of thorough investigation.
The hit confirmed with the originating agency is most often used for which of the following?
Recovering stolen property, returning a missing person, or arresting a fugitive
This illustrates the practical utility of confirmed hits.
When a hit is confirmed, what might it provide the inquiring officer?
Enough evidence to make an arrest or take action
Confirmation of hits is critical for actionable outcomes.
When does the significance of a hit decrease?
As the time period of the entry increases
This indicates that older hits may be less relevant.
What does the officer need in addition to a hit to establish probable cause?
Additional facts and context
This emphasizes the importance of comprehensive information for legal justification.
What is required to make an arrest or take action?
Enough evidence
When does the significance of a hit decrease?
As the time period of the entry increases
What does an officer need in addition to a hit to establish probable cause?
Additional facts and context
What happens to the significance of an outdated hit?
Its significance decreases, requiring additional information
What specific information does the NCJIS hit provide about the warrant?
The date the warrant was issued
When seizing computer equipment, you should _______ the computer or peripherals.
Power off
After seizing computer equipment, the next step is to _______ the equipment to the Police Department.
Transport
When handling seized computer evidence, you should _______ the System Support Division for assistance.
Contact
The direction to proceed with retrieving data from seized computer equipment will be decided by _______.
The System Support Division
When handling seized computer equipment, you should _______ attempt to retrieve any data immediately.
Never
Seized computer equipment must be handled with care to prevent _______.
Data loss or corruption
If there is uncertainty on how to proceed with seized computer equipment, you should _______.
Wait for instructions from the System Support Division
In the process of preserving computer evidence, the first thing you must avoid is _______.
Powering on the computer
The preservation of seized computer evidence requires cooperation with _______.
The System Support Division
The main goal of preserving seized computer evidence is to _______.
Ensure that the data remains intact and unaltered
Laptop users are required to have an assigned _______ to access the NLVPD’s internal network.
RSA SecurID token
_______ require a token to access and log on to the Police assigned laptop.
Department-issued laptops
Employees are required to immediately report the _______ of Department items assigned to them.
Loss or damage
If an employee loses the SecurID hard token device due to negligence, they must submit a memo containing the _______ surrounding the incident.
Circumstances
The employee will be required to pay _______ for a new SecurID hard token if the loss was due to negligence.
$30.00
To acquire a new SecurID token, an employee must submit a _______ through their chain of command.
Request for Purchase (RFP)
The RFP must specify whether a _______ token is required.
Hard or soft
If the replacement is due to normal wear and tear, the _______ will pay for it.
Department
If the replacement is due to loss or negligence, the _______ will pay for it.
Employee
The employee must bring the approved RFP to the Department’s _______ Division and sign for the token when it is picked up.
NCIC Technology (Systems Support)