NLVPD Procedure CH 13 Flashcards

1
Q

New personal computers (PC) and software will be fiscally budgeted by ________.

A

Each Division

This indicates that each division is responsible for its own budgeting of PC and software expenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT-related software, hardware, and the purchase of applications require approval from ________.

A

Both A and B

Approval is needed from both the Police Department IT Liaison and the CNLV IT Division.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The NLVPD will adhere to the pre-determined basic ________ standards provided by CNLV IT.

A

Software

Compliance with software standards is essential for maintaining operational consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a specific area needs distinctive hardware upgrades, the requesting Unit must submit them to the ________.

A

IT Liaison

The IT Liaison acts as the point of contact for hardware upgrade requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The requesting Unit is required to outline the needs and ________ from a particular software package.

A

Expected results

Clarifying expected results helps in evaluating the effectiveness of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uncommon or proprietary software requires research by the ________.

A

Requesting Unit

The requesting unit must conduct research to justify the need for uncommon software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a computer problem is encountered, it must be reported to the PD designee ________.

A

IT Liaison

Reporting issues to the IT Liaison ensures proper tracking and resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supervisors should maintain a record of the CMOS passwords and ________ passwords for computers in their area.

A

Screen Saver

Keeping track of screen saver passwords is crucial for security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The IT Liaison will perform a random review of all personal computers at least ________.

A

Annually

Regular reviews help ensure compliance and security of personal computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Field laptop passwords will be assigned by the ________.

A

Mobile Data Technician

The Mobile Data Technician is responsible for password management on field laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Employees are not allowed to install passwords unless ________.

A

They are authorized by their supervisor

Authorization ensures controlled access and security measures are followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If computer problems occur after normal working hours, assistance can be obtained by calling ________.

A

415-7977

This number provides after-hours support for computer issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Department IT Liaison is responsible for reviewing all personal computers to ensure compliance with policies, at least ________ annually.

A

Once

Annual reviews help maintain adherence to IT policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer-related problems must be documented in the ________ system with a priority assignment.

A

Request for Service (HEAT)

Proper documentation in the HEAT system is essential for tracking issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supervisors will only know the passwords that access computers in their ________.

A

Work area

Limiting password knowledge helps enhance security within the department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ________ is a self-published diary or commentary on a particular topic that may allow visitors to post responses, reactions, or comments.

A

Blog

Blogs serve as platforms for personal expression and interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________ is the specific portion of a social media website where content is displayed and managed by an individual or individuals with administrator rights.

A

Page

Pages are essential for organizing and sharing content on social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The act of publishing content on a social media site is known as a ________.

A

Post

Posting is the primary way users contribute content to social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ is information that a user provides about himself or herself on a social networking site.

A

Profile

Profiles contain essential information about users on social networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________ refers to a category of Internet-based resources that integrate user-generated content and user participation, such as social networking sites, microblogging sites, and photo-sharing sites.

A

Social Media

Social media encompasses various platforms that promote user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ are online platforms where users can create profiles, share information, and socialize with others using a range of technologies.

A

Social Networks

Social networks facilitate connections and interactions among users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

________ refers to the expression or communication of thoughts or opinions in spoken words, in writing, by expressive conduct, symbolism, photographs, videotape, or related forms of communication.

A

Speech

Speech encompasses various forms of communication beyond just spoken words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The second generation of the World Wide Web, focused on shareable, user-generated content, is referred to as ________.

A

Web 2.0

Web 2.0 emphasizes user interaction and contribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ________ is a web page(s) that can be edited collaboratively.

A

Wiki

Wikis allow multiple users to contribute and edit content collectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Social media pages managed by the Department should include an introductory statement that clearly specifies the ________ and scope of the agency’s presence on the website.

A

Purpose

Defining the purpose helps users understand the intent of the social media presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

All Department social media sites or pages must be approved by the ________.

A

Chief of Police or designee

Approval ensures that all content aligns with departmental policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Social media content must comply with applicable ________ laws, regulations, and policies.

A

All of the above

Compliance with laws ensures responsible use of social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Social media pages should clearly indicate that posted comments will be ________ by the Department.

A

Monitored

Monitoring comments helps maintain a professional environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Department personnel using social media must identify themselves as a ________.

A

Member of the Department

Identification is crucial for transparency and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Department personnel are prohibited from conducting ________ activities while using social media for Department purposes.

A

Private business

This restriction helps avoid conflicts of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Social media is a valuable investigative tool for seeking evidence on ________ persons.

A

Missing

Social media can provide leads and information on missing individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Department personnel should not post, transmit, or otherwise disseminate any information obtained through their employment without ________ from the Chief of Police or designee.

A

Authorization

Authorization protects sensitive information from unauthorized sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Social media content can be used for community outreach by providing crime prevention tips and ________ opportunities.

A

Reporting

Engaging the community through social media enhances public safety efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

________ can be used to make time-sensitive notifications related to events like road closures or weather emergencies.

A

Social Media

Social media serves as an effective platform for urgent communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Employees must ________ Department logos, uniforms, or identifying items on personal web pages without authorization.

A

Avoid

Unauthorized use of departmental identifiers can lead to misrepresentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Department personnel are prohibited from posting ________ on personal social media accounts that could negatively affect public perception of the Department.

A

Personal opinions

Maintaining a professional image is crucial for public trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

E-mails directed to the email group “________” must be approved by the Assistant Chief.

A

CNLV PD

Approval ensures that communications are appropriate and relevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

E-mails directed to the email group “CNLV PD” or “NLVCCC” should be forwarded through the requestor’s chain of command to the ________ for review.

A

Sr. Office Assistant

This process helps manage and streamline email communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

If the e-mail request is approved, the following statement must be added to the text: “This message has been approved by ________.”

A

[name of the Assistant Chief]

Including this statement provides necessary authorization for the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

E-mails directed to the email group “________” must be approved by the Chief of Police.

A

CNLV Everyone

This ensures that all communications to a broad audience are vetted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The proposed e-mail for the “CNLV Everyone” group must be forwarded to the ________ through the requestor’s chain of command for review and approval.

A

Chief’s Executive Secretary

This role is key in managing high-level communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Those directly under the Chief’s command should forward requests to the ________ for review.

A

Chief’s Executive Secretary

This ensures requests are handled appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A notification will be sent back to the requestor indicating that the e-mail request is either ________ or ________.

A

approved, denied

This feedback process is important for communication clarity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

There are ______ types of laptop assignments issued by the NLVPD System Support Division.

A

3

Understanding the types of assignments helps in resource allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

One type of laptop assignment issued by the NLVPD System Support Division is a laptop assigned to a ________.

A

Patrol unit (Toughbook)

Toughbooks are specifically designed for field use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The information in this chapter does not apply to laptops checked out from _________.

A

Another NLVPD Division, like Training

This distinction helps clarify policy applicability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In compliance with NCJIS Security Policy 5.6.2.2, a ________ will be issued to all laptop users to ensure two-factor authentication.

A

fob

Two-factor authentication enhances security for laptop users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

When a laptop needs repair, the laptop with the entire kit will be delivered to the ________.

A

Mobile Data Unit

This unit is responsible for handling repairs and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In the event of a laptop assigned to a Patrol unit being damaged, the officer is responsible for filling out a ________.

A

work order

A work order documents the need for repairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The laptop assigned to a Patrol unit will be the responsibility of the ________.

A

Assigned officer for the shift

Accountability is crucial for the management of departmental equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

If a laptop in a Patrol unit is damaged due to improper use, the officer will need to write a ________ through their chain of command explaining the damage.

A

memo

A memo provides a formal record of the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Laptops assigned to a Bureau or Division are issued on an ________ basis unless a laptop is purchased for the Bureau or Division.

A

availability

Availability determines how resources are allocated among divisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Employees will not load any software on a Department-owned laptop computer without approval from the ________.

A

Department Computer Committee

This committee oversees software installations to maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The Agency Support Specialist will collect all laptops turned in and destroy all data stored on the hard drives using a ________ tool.

A

Department of Defense (DOD)

Secure data destruction is vital for protecting sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Employees will not use laptops in the vehicle unless the vehicle is at a ________.

A

complete stop

This policy is in place to ensure safety while operating vehicles.

56
Q

All employees will have access to the Motorola P1 Mobile program after being entered into the program’s ________.

A

server databases

Access management is crucial for system security.

57
Q

All commissioned supervisors (sergeant and above) and civilian supervisors will have ________ user rights on the Motorola P1 Mobile program.

A

query privileged

Query privileges allow supervisors to access necessary information.

58
Q

If an employee has a ride-along who is not certified for JLINK access, they will not be allowed to view any screen with ________ information.

A

confidential

Protecting confidential information is a key aspect of operational security.

59
Q

If a supervisor needs to print talk messages from the Motorola P1 Mobile program, they must write a ________ identifying why the information is needed.

A

request memo

This ensures that the request for information is documented and justified.

60
Q

Employees will be required to use JLINK in the patrol vehicle only for ________ purposes.

A

lawful investigation

Limiting use to lawful investigations helps maintain integrity.

61
Q

Any employee found to have violated this policy/procedure may be subject to ________.

A

disciplinary action

Enforcement of policies ensures adherence and accountability.

62
Q

Employees will be required to use JLINK in the patrol vehicle only for ________ purposes.

A

lawful investigation

This underscores the importance of using JLINK strictly for professional duties.

63
Q

Any employee found to have violated this policy/procedure may be subject to ________.

A

disciplinary action

This indicates the seriousness of adherence to the policy.

64
Q

Which of the following is a requirement for terminal equipment and/or printers according to NLVPD’s JLINK policy?

A

They must be placed in physically secure locations away from unauthorized access

This is crucial for protecting sensitive information.

65
Q

Which of the following actions is NOT required when disposing of hard copy records that contain confidential information?

A

Throw them away in a regular trash bin

Proper disposal methods are essential to maintain confidentiality.

66
Q

What must be done before granting access to criminal justice information (CJI) at NLVPD?

A

A wants/warrants check and NCJIS/NCIC III check must be done

This is part of the vetting process for accessing sensitive information.

67
Q

Which of the following must be included in the CJIS visitor log at NLVPD facilities?

A

The visitor’s signature

This helps maintain a record of who accesses sensitive areas.

68
Q

If a terminal has multiple session capabilities, what must be assigned to each session?

A

A unique terminal ID and ORI

This ensures accountability for each session.

69
Q

What is required for accessing NCIC according to the NLVPD JLINK policy?

A

A complex password with at least 8 characters and specific criteria

Strong passwords are vital for security.

70
Q

When a user exceeds the maximum number of invalid login attempts, what happens next?

A

The user is temporarily locked out for 5 minutes

This is a security measure to prevent unauthorized access.

71
Q

Who must be present when a shred company employee is on-site at the NLVPD?

A

An authorized user must escort the shred company employee at all times

This is to ensure secure handling of sensitive documents.

72
Q

What action must be taken if a visitor does not have a proxy card and has not undergone a fingerprint background check?

A

They must sign the CJIS visitor log and be escorted

This maintains security protocols for visitor access.

73
Q

Which of the following statements is true regarding NLVPD’s employee security procedures?

A

Only employees who have successfully passed a fingerprint background check and training are considered authorized

This emphasizes the importance of thorough employee vetting.

74
Q

What must the TAC do if an employee who has access to JLINK no longer works at NLVPD?

A

Immediately deactivate/disable the terminal operator access

This is crucial for maintaining security after an employee’s departure.

75
Q

Which level of training is required for all personnel requiring access to view information from JLINK?

A

Level 2 – NCIC/NCJIS Practitioner Training

This ensures that all personnel are adequately trained for secure information access.

76
Q

What is the minimum password length required for NCIC access according to the policy?

A

8 characters

This is a standard security requirement to enhance password strength.

77
Q

What is the purpose of the CJIS visitor log at NLVPD facilities?

A

To monitor visitors in physically secure locations that access criminal justice information

This helps in tracking access to sensitive areas.

78
Q

What action is prohibited when handling criminal history record information (CHRI)?

A

Performing inquiries for curiosity or reasons other than authorized

This highlights the importance of using CHRI only for legitimate purposes.

79
Q

Which of the following electronic devices may be used to transmit Criminal History Record Information (CHRI)?

A

Electronic devices using wireless or radio technology

This specifies permissible technology for transmitting sensitive information.

80
Q

CHRI must be maintained in a secure records environment and accessible only to ________.

A

Authorized personnel

This is essential for protecting sensitive data.

81
Q

When is the facsimile device authorized to transmit hard copy CHRI?

A

When both agencies are authorized to receive criminal history information and the device is in a secure location

This ensures secure and authorized transmission.

82
Q

Which of the following is NOT an authorized method for transmitting CJIS data?

A

Sending via G-mail

This method lacks the necessary security measures.

83
Q

What is required when transmitting CJIS data through Law Enforcement Online (LEO)?

A

The sender and receiver must be in a physically secure location

Security protocols are critical during data transmission.

84
Q

Secondary dissemination involves sharing criminal history information with ________.

A

External criminal justice agencies that are authorized to receive CHRI

This ensures that CHRI is only shared with legitimate entities.

85
Q

Which of the following information must be included in the Secondary Dissemination Form?

A

The name of the subject of the information and the date of access

This is necessary for tracking information dissemination.

86
Q

What must happen before CHRI is transmitted via fax?

A

The receiving agency must be verified to have an authorized NCIC ORI number

This is a critical verification step before transmission.

87
Q

The correct Purpose Code must be used when querying Triple I (III) to comply with ________.

A

The Privacy Act of 1974

Compliance with legal standards is crucial during information queries.

88
Q

How long must the Secondary Dissemination Form be maintained?

A

Three years

This duration is part of record-keeping requirements.

89
Q

CHRI must be used exclusively for ________.

A

Criminal justice purposes

This emphasizes the limited scope of CHRI usage.

90
Q

Which of the following is an authorized method for sending CJIS data?

A

Sending via P: drive folder

This method is secure and compliant with policies.

91
Q

CHRI must be destroyed by _______ when no longer needed.

A

Shredding hard copies

Secure destruction of sensitive information is essential.

92
Q

Which of the following divisions can disseminate printed criminal justice information to an outside agency?

A

Narcotics Bureau

This division has specific authority for dissemination.

93
Q

The use of G-mail for transmitting CJIS data is prohibited because ________.

A

It lacks necessary encryption

Security is a primary concern in data transmission.

94
Q

The CHRI records must be disposed of by _______ when no longer needed.

A

Shredding

This ensures that sensitive information cannot be recovered.

95
Q

For the transmission of CHRI via fax, what should be verified beforehand?

A

The receiving agency’s authenticity and NCIC ORI number

Verification is critical to ensure compliance and security.

96
Q

Which of the following actions is prohibited for CHRI dissemination?

A

Disseminating it for personal use or gain

This highlights the ethical handling of sensitive information.

97
Q

When transmitting CHRI data via physical pickup, what is required?

A

Verification of the identity of the personnel picking up the CHRI

This is necessary to ensure secure handover of sensitive information.

98
Q

A user querying Triple I must include which of the following in the Attention Line?

A

The purpose of the inquiry

This is important for accountability and record-keeping.

99
Q

An NCJIS or NCIC hit alone is ________ probable cause to arrest.

A

Not sufficient

This emphasizes that additional evidence is needed for legal action.

100
Q

What does an NCJIS hit provide?

A

The fact that a warrant has been filed and other pertinent information

This is crucial for understanding the context of a hit.

101
Q

What additional information does an NCIC hit provide?

A

The date of the theft, missing person report, or warrant

This information is vital for tracking and investigation.

102
Q

A hit alone must be added to _______ to establish sufficient legal grounds for probable cause.

A

Additional facts

This indicates the need for corroborative evidence.

103
Q

Correct NCJIS and NCIC procedures require the inquiring agency to _______ to confirm that the data is correct and up-to-date.

A

Contact the agency that placed the record in file

Verification is essential to ensure data accuracy.

104
Q

As the time period of an entry increases, the significance of the hit ________.

A

Decreases

Timeliness is a crucial factor in the relevance of information.

105
Q

A hit confirmed with the originating agency may be adequate grounds to _______.

A

Recover stolen property, return a missing person, or arrest a fugitive

This highlights the practical applications of confirmed hits.

106
Q

The primary purpose of confirming a hit with the originating agency is to _______.

A

Ensure that the information is correct and up-to-date

This is essential for maintaining the integrity of law enforcement actions.

107
Q

A hit alone would require the officer to _______ to substantiate an arrest.

A

Obtain additional information

This reinforces the necessity of thorough investigation.

108
Q

The hit confirmed with the originating agency is most often used for which of the following?

A

Recovering stolen property, returning a missing person, or arresting a fugitive

This illustrates the practical utility of confirmed hits.

109
Q

When a hit is confirmed, what might it provide the inquiring officer?

A

Enough evidence to make an arrest or take action

Confirmation of hits is critical for actionable outcomes.

110
Q

When does the significance of a hit decrease?

A

As the time period of the entry increases

This indicates that older hits may be less relevant.

111
Q

What does the officer need in addition to a hit to establish probable cause?

A

Additional facts and context

This emphasizes the importance of comprehensive information for legal justification.

112
Q

What is required to make an arrest or take action?

A

Enough evidence

113
Q

When does the significance of a hit decrease?

A

As the time period of the entry increases

114
Q

What does an officer need in addition to a hit to establish probable cause?

A

Additional facts and context

115
Q

What happens to the significance of an outdated hit?

A

Its significance decreases, requiring additional information

116
Q

What specific information does the NCJIS hit provide about the warrant?

A

The date the warrant was issued

117
Q

When seizing computer equipment, you should _______ the computer or peripherals.

118
Q

After seizing computer equipment, the next step is to _______ the equipment to the Police Department.

119
Q

When handling seized computer evidence, you should _______ the System Support Division for assistance.

120
Q

The direction to proceed with retrieving data from seized computer equipment will be decided by _______.

A

The System Support Division

121
Q

When handling seized computer equipment, you should _______ attempt to retrieve any data immediately.

122
Q

Seized computer equipment must be handled with care to prevent _______.

A

Data loss or corruption

123
Q

If there is uncertainty on how to proceed with seized computer equipment, you should _______.

A

Wait for instructions from the System Support Division

124
Q

In the process of preserving computer evidence, the first thing you must avoid is _______.

A

Powering on the computer

125
Q

The preservation of seized computer evidence requires cooperation with _______.

A

The System Support Division

126
Q

The main goal of preserving seized computer evidence is to _______.

A

Ensure that the data remains intact and unaltered

127
Q

Laptop users are required to have an assigned _______ to access the NLVPD’s internal network.

A

RSA SecurID token

128
Q

_______ require a token to access and log on to the Police assigned laptop.

A

Department-issued laptops

129
Q

Employees are required to immediately report the _______ of Department items assigned to them.

A

Loss or damage

130
Q

If an employee loses the SecurID hard token device due to negligence, they must submit a memo containing the _______ surrounding the incident.

A

Circumstances

131
Q

The employee will be required to pay _______ for a new SecurID hard token if the loss was due to negligence.

132
Q

To acquire a new SecurID token, an employee must submit a _______ through their chain of command.

A

Request for Purchase (RFP)

133
Q

The RFP must specify whether a _______ token is required.

A

Hard or soft

134
Q

If the replacement is due to normal wear and tear, the _______ will pay for it.

A

Department

135
Q

If the replacement is due to loss or negligence, the _______ will pay for it.

136
Q

The employee must bring the approved RFP to the Department’s _______ Division and sign for the token when it is picked up.

A

NCIC Technology (Systems Support)