CJIS HANDBOOK - CHAPTER 5 SECURITY
AWARENESS
LVMPD has access to Criminal Justice Information Systems (CJIS) such as FBI's,
NCIC, and III, and State of NV NCJIS. This access requires us to ensure we protect the
systems and data correctly. - ANS-
The CJIS systems contain Criminal Justice Information (CJI), Criminal History Record
(CHRI), and Personally Identifying Information (PII). - ANS-
CJIS Security Awareness Training will provide you the fundamentals to understand how
to protect the systems and data during your normal workday. - ANS-
It is policy of the department to comply with all State and Federal requirements for
protecting the CJIS systems and the information they contain. - ANS-
Our access, usage and security of the CJIS systems are governed by the CJIS Security
Policy, NV NCJIS Policy, Nlets Security Policy and Department Policies. - ANS-
CJIS Security encompasses 4 things we are all responsible for: - ANS-Protect the
Facilities, Protect the Systems, Protect the Data, and Proper Dissemination
There are 2 ways CJI and CHRI are accessed: - ANS-through a computer terminal and
from a printout or verbal communication
Examples of "unauthorized access" is: - ANS-if unsure if it is for official use; then
contact TAC, curiosity checks, and query for personal reasons
Any access of the systems and/or dissemination of information obtained for personal
unauthorized and/or non criminal justice purpose are considered a misuse of the
system. - ANS-
Personnel who misuses and/or illegally disseminate information from systems may have
such action considered "Unlawful Acts" per NRS 179A.240 - ANS-
AWARENESS
LVMPD has access to Criminal Justice Information Systems (CJIS) such as FBI's,
NCIC, and III, and State of NV NCJIS. This access requires us to ensure we protect the
systems and data correctly. - ANS-
The CJIS systems contain Criminal Justice Information (CJI), Criminal History Record
(CHRI), and Personally Identifying Information (PII). - ANS-
CJIS Security Awareness Training will provide you the fundamentals to understand how
to protect the systems and data during your normal workday. - ANS-
It is policy of the department to comply with all State and Federal requirements for
protecting the CJIS systems and the information they contain. - ANS-
Our access, usage and security of the CJIS systems are governed by the CJIS Security
Policy, NV NCJIS Policy, Nlets Security Policy and Department Policies. - ANS-
CJIS Security encompasses 4 things we are all responsible for: - ANS-Protect the
Facilities, Protect the Systems, Protect the Data, and Proper Dissemination
There are 2 ways CJI and CHRI are accessed: - ANS-through a computer terminal and
from a printout or verbal communication
Examples of "unauthorized access" is: - ANS-if unsure if it is for official use; then
contact TAC, curiosity checks, and query for personal reasons
Any access of the systems and/or dissemination of information obtained for personal
unauthorized and/or non criminal justice purpose are considered a misuse of the
system. - ANS-
Personnel who misuses and/or illegally disseminate information from systems may have
such action considered "Unlawful Acts" per NRS 179A.240 - ANS-