P.I. 15-6 Computerized Police Information
Systems
Department of Justice directive, Criminal Justice Information, Title 28, and Code of
Federal Regulations, Part 20 are recognized as the governing directives for - ANS-CJIS
Criminal Justice Information Systems
All information released to the public must adhere to _____________ and other
applicable state and federal laws
and regulations. - ANS-RSMO 610, SunshineLaw, CJIS rules
To ensure that the Department is in compliance with CJIS rules and State Statutes,
department members will not include _________________ in case files submitted to
any prosecutors'office. - ANS-criminal history information
Department members will not make any ______________ of criminal history
information. - ANS-secondary disseminations
Basic security awareness training shall be required, within ____________________ of
initial hire and every two years thereafter, for all personnel who have access to criminal
justice information (CJI). - ANS-six months
__________________ levels of security awareness training will depending on the type
of access a person has to CJI.
be presented - ANS-Three
_______________ are Individuals who have access to CJI, but do not have personal
system access.
Example: Officers who do not have MDC access. - ANS-Level 1
___________________ are Operators with logical access to CJIS systems. Example:
Operators in 911/dispatch centers or records. - ANS-Level 2
_______________________are Technical personnel with programming or configuration
access to CJIS systems. Example: Technical and support personnel with responsibility
for maintaining hardware and network. - ANS-Level 3
, Operators and support personnel who have direct system access will receive security
awareness during their initial _______________ training and recertification. -
ANS-Missouri Uniform Law Enforcement System (MULES)
Operators must complete all appropriate certification training within _______________
of appointment to a terminal operator position. - ANS-six months
All operators with full access must recertify every _______________and attend a
one-day certification course presented by a member of the CJIS training staff. -
ANS-two years
Operators with inquiry access must complete security awareness training every
___________________. - ANS-two years
Inquiry access operators have the option of taking an online recertification test via the
_______________________. - ANS-NexTEST system
Use of ________________ for personal use is prohibited. - ANS-CJIS
Under no circumstances will unauthorized persons be given a copy of a computer
printout that contains _______________, nor will members verbally release this
information to such persons. - ANS-criminal history record information
Criminal History Records Information (CHRI) may be e-mailed if the email network
being used meets the __________________? - ANS-security requirements set forth in
the CJIS security policy
Under no circumstances will e-mails be sent______________, which means that the
part of the address after the "@" must match for both sender and recipient. -
ANS-outside the domain from which they originate
E-mails in which the ______________________ are not secure, even if each individual
system is secure. - ANS-address domains change
When computer printouts, investigation reports, etc., are no longer needed, they will be
_____________ to prevent disclosure of the information contained therein to
unauthorized persons. - ANS-shredded
All inquiries to the REJIS System will require the terminal operator to use a
_____________ for identification of the requesting member. - ANS-numeric identifier
Systems
Department of Justice directive, Criminal Justice Information, Title 28, and Code of
Federal Regulations, Part 20 are recognized as the governing directives for - ANS-CJIS
Criminal Justice Information Systems
All information released to the public must adhere to _____________ and other
applicable state and federal laws
and regulations. - ANS-RSMO 610, SunshineLaw, CJIS rules
To ensure that the Department is in compliance with CJIS rules and State Statutes,
department members will not include _________________ in case files submitted to
any prosecutors'office. - ANS-criminal history information
Department members will not make any ______________ of criminal history
information. - ANS-secondary disseminations
Basic security awareness training shall be required, within ____________________ of
initial hire and every two years thereafter, for all personnel who have access to criminal
justice information (CJI). - ANS-six months
__________________ levels of security awareness training will depending on the type
of access a person has to CJI.
be presented - ANS-Three
_______________ are Individuals who have access to CJI, but do not have personal
system access.
Example: Officers who do not have MDC access. - ANS-Level 1
___________________ are Operators with logical access to CJIS systems. Example:
Operators in 911/dispatch centers or records. - ANS-Level 2
_______________________are Technical personnel with programming or configuration
access to CJIS systems. Example: Technical and support personnel with responsibility
for maintaining hardware and network. - ANS-Level 3
, Operators and support personnel who have direct system access will receive security
awareness during their initial _______________ training and recertification. -
ANS-Missouri Uniform Law Enforcement System (MULES)
Operators must complete all appropriate certification training within _______________
of appointment to a terminal operator position. - ANS-six months
All operators with full access must recertify every _______________and attend a
one-day certification course presented by a member of the CJIS training staff. -
ANS-two years
Operators with inquiry access must complete security awareness training every
___________________. - ANS-two years
Inquiry access operators have the option of taking an online recertification test via the
_______________________. - ANS-NexTEST system
Use of ________________ for personal use is prohibited. - ANS-CJIS
Under no circumstances will unauthorized persons be given a copy of a computer
printout that contains _______________, nor will members verbally release this
information to such persons. - ANS-criminal history record information
Criminal History Records Information (CHRI) may be e-mailed if the email network
being used meets the __________________? - ANS-security requirements set forth in
the CJIS security policy
Under no circumstances will e-mails be sent______________, which means that the
part of the address after the "@" must match for both sender and recipient. -
ANS-outside the domain from which they originate
E-mails in which the ______________________ are not secure, even if each individual
system is secure. - ANS-address domains change
When computer printouts, investigation reports, etc., are no longer needed, they will be
_____________ to prevent disclosure of the information contained therein to
unauthorized persons. - ANS-shredded
All inquiries to the REJIS System will require the terminal operator to use a
_____________ for identification of the requesting member. - ANS-numeric identifier