Romano-ISM Flashcards
Who is the owner of ISM?
Assistant Chief of ISM
The ______, ______, ______ is the foundation for the JSO local security policy.
Federal Bureau of Investigations (FBI)
Criminal Justice Information Services (CJIS)
Security Policy (CSP)
Computers shall not be accessible to the _____.
public.
Bluetooth network connectivity or data sharing and transfer are ____ ________.
not permitted.
If a virus is detected, the individual will immediately do the following: (5)
- Stop all work on the affected machine
- Turn off the computer
- Do not allow others to use the computer
- Call ISM Help Desk
- ISM will perform the removal of the virus, if possible, or reloading of software if necessary.
Access to Driver and Vehicle Information Database (DAVID) is for?
criminal justice purposes only.
Confirmed _____ (of DAVID) will be reported to Florida Department of Highway Safety and Motor Vehicles (DSHMV) per the Memorandum of Understanding between JSO and DSHMV.
misuse
DAVID
Emergency Contact Information (ECI) shall only be used for the purpose of notifying an individual’s registered emergency contact in the event of a serious injury, death, or other incapacitation. ECI shall not be used to develop leads or for?
criminal investigative purposes.
If a criminal history is retrieved from FCIC/NCIC and is subject to secondary dissemination, then the following information must be recorded in a secondary
dissemination log: (8)
- The date the criminal history was released
- The subject (name) of the criminal history request
- The FBI or State Identification number (SID).
- The name of the person who the information was released to
- The requestor’s agency name
- The name of the person who released the information to the requestor
- The reason the criminal history was requested
- The purpose code used to run the criminal history.
The secondary dissemination log must be retained for ____ years.
four
If positive control of a mobile device is lost for any period of time, notify __________.
ISM Help Desk
All Inter-agency access shall be authorized by the ______ or designee.
Sheriff
JSO users should be aware that they have no ___________________ while using any
information technology resources.
expectation of privacy
Specific personnel who routinely require access to secured information systems such as, local, state, and national criminal justice systems, to perform essential
administration functions critical to the continued operation of the agency qualify for additional access. Such access is often termed ______ or _______.
administrative or privileged
Administrative or privileged accounts shall be authorized by _______ level approvals.
director