Loading...
318 CJIS NCIC Procedures (Revised 06-19-2013) 1 FRIDLEY POLICE DATE OF ISSUE NUMBER: GENERAL ORDER May 15, 2008 318 SUBJECT: REVISION DATE SECTION: CJIS/NCIC Procedures June 19, 2013 Yellow I. PURPOSE The following procedures are intended to be used as an aid to improve the use of the CJIS/NCIC systems by this department. This General Order is not intended to be all inclusive, nor shall it supersede any CJIS/NCIC policies presently in effect. Rather, it is to be used as a quick reference when using the CCH/III, the CJDN system and CJIS/NCIC “Hot Files” Should there be a conflict between this General Order and CJIS/NCIC policy, the CJIS/NCIC policy shall be adhered to. Furthermore, any future CJIS/NCIC policy changes shall be adopted immediately until such changes can be incorporated into this General Order. II. POLICY The Fridley Police Department will adhere to the policies and procedures of the Criminal Justice Information System (CJIS) and the National Crime Information Center (NCIC). All members of the Fridley Police Department will create, use, maintain, store, preserve, and dispose of information retrieved from the FBI's NCIC and the National Law Enforcement Telecommunications System (NLETS) in accordance with the CJIS/NCIC Security Policy. III. DEFINITIONS CCH/III Computerized Criminal History CJDN A dedicated statewide network that provides instant access to criminal justice information such as criminal background information, driver license and motor vehicle registration data, as well as other data. This network is interfaced with the NCIC network that provides nationally indexed criminal and “hot” files. The CJDN is also interfaced with the NLETS, which links local, state and federal agencies together for the purpose of exchanging criminal justice information interstate. CJIS Criminal Justice Information System Hit 2 A positive response from MNJIS and/or NCIC in which the person or property inquired about appears to match the person or property contained in the response. Queried subject appears to match the record subject. Hot Files Missing person files and stolen/lost property files maintained in NCIC NCIC National Crime Information Center TAC A designated police department staff member serving as liaison to the Minnesota Bureau of Criminal Apprehension (BCA). The TAC has the ability to add and disable users and is also responsible to update training for users and certification within the Fridley Police Department for use of the PS Portals 100 Browser-based public safety workstation. This is the system in which the CJDN is operated. Personally Identifiable Information (PII) PII is any information that permits the identity of an individual to be directly or indirectly inferred, including any information which is linked or linkable to that individual. Any FBI CJIS provided data may include PII. A criminal history record for example inherently contains PII as would a Law Enforcement National Data Exchange (N-Dex) case file. IV. PROCEDURE CONTENTS A. System Security 1. Security of Terminal 2. Authorized Personnel 3. Background Checks 4. Misuse of CJDN 5. Safeguarding Personally Identifiable Information (PII) B. Dissemination of Information C. Criminal History 1. Training 2. Authorized Personnel 3. Release of Information 4. Who May Request a CCH/III 5. Criminal History Inquiry 6. Retention D. Hot Files 1. Report required. 2. Check appropriate sources 3. Entry/Modify/Cancel Personnel 4. MIS/ Field 5. Second Party Verification E. Stolen Vehicle File 1. Initial Stolen Report 2. Recovered/Returned Stolen Vehicle F. Stolen/Recovered Gun File 1. Initial Report 2. Entry to Gun “Hot File” 3. Cancellation of “Hot File” Entry 4. Recovered Stolen Gun, Locate Message G. Stolen/Recovered Article File 1. Initial Report 2. Entry to Article “Hot File” 3. Cancellation of “Hot File” Entry 4. Recovered Stolen Article Locate Message 3 H. Stolen/Recovered Boat 1. Initial Report 2. Entry to Boat “Hot File” 3. Cancellation of “Hot File” Entry 4. Recovered Stolen Boat, Locate Message I. Stolen Securities 1. Initial Report 2. Entry to Security “Hot File” 3. Cancellation of “Hot File” Entry J. Identity Theft K. Missing/Endangered Persons See General Order 203 (Orange) L. Hit Confirmation M. “Hot File” Validation Report1. 1. Procedure 2. Corrections 3. Record Retention N. Local Agency Security Officer (LASO) 1. Appointment of LASO 2. LASO Responsibilities A. SYSTEM SECURITY Inquiries into the motor vehicle registration, driver license, criminal history or any other file in the MNJIS/NCIC systems will be performed for Criminal Justice purposes only. All Fridley Police personnel must adhere strictly to the standards, procedures, formats, codes and criteria as set forth to assure the proper operation of the system. Accuracy and promptness are essential. 1. Security of Terminal Unauthorized access to or routine viewing of CJDN terminals or CJDN data is not allowed. The terminals must be secure from unauthorized use. To protect the terminals, access will be restricted to police department employees. The terminals will be placed in such a manner that they cannot be viewed by non-department employees or the public. All personnel who have direct responsibility to configure and maintain computer systems and networks with direct access to FBI CJIS systems must successfully pass a fingerprint-based background check. Criminal History responses, as well as all other CJDN printouts will be destroyed when no longer needed. These documents will by shredded at the Fridley Police Department. 2. Authorized Personnel CJDN Operators: Access to the CJDN shall be limited to employees of the Fridley Police Department who have been certified by the BCA to operate the terminal. CJDN operators, sworn officers and civilians who have terminal access (including MDT's) shall be trained and certified within six months of hire or assignment and biennially thereafter. 4 CJDN Operators will be provided with a security logon to allow them access to the system. Those conducting CCH/III inquiries will be required to have the proper NCIC-CCH Certification level. The employees authorized to conduct CCH/III inquiries will be restricted. The Director of Public Safety, or his designee, will make the determination of who will be authorized to conduct CCH/III inquiries. The TAC will issue a unique username and password to authorized users with access to the CJDN and Portal 100. Authorized users will be given a unique password to have access to criminal histories. This Criminal History Password will be changed by the TAC at least every 2 years. A list of these assigned passwords shall be kept by the TAC. Authorized personnel who have unescorted access to the police department shall be fingerprint background checked Basic security awareness training shall be required within six months of initial assignment, and biennially thereafter, for all personnel who have access to Criminal Justice Information, including CJDN terminal operators, appropriate IT staff, consultants, vendors, contractors, and any other personnel who have access to FBI Criminal Justice Information. Sworn and Uniformed Personnel: NCIC requires that all sworn and uniformed personnel must receive basic, formal MNJIS/NCIC training within the first 12 months of hire, and annual refreshers thereafter. All training of sworn officers must be documented. 3. Background Checks Thorough background screening is required of all employees, sworn and non-sworn, who will have access to CJIS/NCIC. New employees of the Fridley Police Department shall be fingerprinted within 30 days of employment or assignment and the fingerprint cards shall be sent to the BCA for a background check. A potential new employee of the Fridley Police Department shall have a background check completed before they are hired. When running the criminal history on that person, the appropriate purpose code shall be used. Fingerprint cards on CJDN operators are to be kept by the Fridley Police Administrative Assistant. 4. Misuse of CJDN a. If the Terminal Agency Coordinator (TAC) becomes aware of an employee using a CJDN terminal, CJDN terminal generated information, CJDN equipment, or CJDN access in a manner that is not in accordance to Fridley Police Department General Orders or NCIC policy and the problem is deemed merely operator error or substandard job performance, the TAC will contact the employee and advise him/her of the problem and provide additional training to correct the issue. 5 b. If the above step does not rectify the problem, or the problem is deemed to be greater than mere operator error or substandard job performance, the TAC will submit a report to the immediate supervisor and the Technical Support Division Captain. At this time, the TAC may suspend the employee's CJDN access until an investigation is conducted. 1) If the investigation does not substantiate that the employee was in violation of Fridley Police Department General Orders or NCIC Policy, the supervisor will contact the Technical Support Division Captain and the TAC requesting to reinstate the employee's CJDN terminal access. 2) If the investigation substantiates that the employee was in violation of Fridley Police Department General Orders or NCIC Policy, disciplinary action may be taken against the employee in accordance with applicable labor agreements in the case of unionized employees or City of Fridley policies in the case of non-unionized employees. The TAC will deny CJDN terminal access to the employee until directed by the Technical Support Division Captain to change this status. 3) If the TAC determines that an employee is using a CJDN terminal, CJDN terminal generated information, CJDN equipment, or CJDN equipment access in a manner not in accordance with Fridley Police Department General Orders or NCIC policy, and there is evidence that the employee is performing this action as a result of intentional misconduct that could be in violation of state or federal statute, the TAC will submit a report to the Technical Support Division Captain for review. If the misconduct is deemed to be criminal, the Technical Support Division Captain will report the behavior of criminal nature to the Public Safety Director for determining the appropriate action. 4) In certain cases where criminal intent is involved or the actions involved have or will impact upon more than just the Fridley Police Department, the TAC may (after review by the Technical Support Division Captain) also forward the above report to the Minnesota Department of Public Safety, Control Terminal Officer (CTO) and/or to the FBI/NCIC Criminal Justice Information Services. 5. Safeguarding Personally Identifiable Information (PII) Extracted From Criminal Justice Information (CJI). 6 PII shall be extracted from CJI for the purpose of official business only and shall only be accessed when there is a need for the information that relates to official duties. a) PII extracted from CJI may be disseminated only in accordance with CJIS Security Policy, the laws and statutes of the State of Minnesota, the ordinances of the City of Fridley and the policies of the Police Department. b) PII extracted from CJI may not be left unattended and unsecured and may be saved, stored, or hosted only on agency equipment. PII extracted from CJI in electronic form must be encrypted. Paper documents containing PII extracted from CJI must be under the control of the employee or stored in a space where access control measures are employed to prevent unauthorized access by members of the public or other persons without a need to know (e.g., the police department office where access is controlled by a card reader). The retention of PII extracted from CJI should not to extend beyond the records retention schedule adopted by the City. Appropriate destruction techniques (shredding or electronic wiping) shall be used to dispose of PII extracted from CJI. c) Any employee that suspects or knows that PII extracted from CJI has been handled in a way that violates this policy, the policies of the Police Department, the ordinances of the City of Fridley, the laws and statutes of the State of Minnesota, or CJIS Security Policy must report the incident to a supervisor as soon as it is suspected or confirmed. Section IV.A.4. Discipline for Misuse of CJDN shall be followed. d) The Local Agency Security Officer shall conduct periodic assessments to support policy compliance and ensure that appropriate security measures to protect PII extracted from CJI are in place. B. DISSEMINATION OF INFORMATION Data in the computerized “Hot Files” and CCH/III are documented criminal justice information. Access is restricted to authorized criminal justice agencies for Criminal Justice purposes. C. CRIMINAL HISTORY The ability to access the state and national files through the CJIS computer by means of a terminal device or satellite computer, is limited to criminal justice agencies in the discharge of their official mandated responsibilities. 1. Training 7 Personnel performing CCH/III inquiries will complete the BCA/CJIS or TAC training as appropriate. They will be required to have appropriate NCIC certification. 2. Authorized Personnel The employees authorized to conduct CCH/III inquiries will be restricted. The Chief of Police, or his designee, will make the determination who will be authorized to conduct CCH/III inquiries. . 3. Release of Information ALL information obtained through a CCH/III inquiry is restricted to law enforcement use only. This includes not only positive results but also any negative results of an inquiry. Copies may be given to the City Attorney and the County Attorney as part of a case file when requesting charges on the subject. The Secondary dissemination log should be completed whenever a CCH is distributed. 4. Who May Request a CCH/III a. A sworn officer of this department for purposes of a criminal investigation, permits for explosives, licensing, gun permits, and background checks on new department personnel. b. The City Clerk, City Manager, Human Resources Director, and any City department head may request a background check as per City Ordinance for purposes of licensing and/or employment. Only a summary of the results of the CCH may be released by the Police Department to the hiring or licensing authority. c. It shall be the policy of this department that all other requests be referred to the BCA. 5. Criminal History Inquiry Criminal history inquiries shall be made as follows, on a terminal designated for the inquiry. QH / QHN / QHM QR / QRN / QRM IQ FQ AQ QPGC 6. Retention Hard copies of a CCH/III printout will not be retained after the case has been completed, unless being referred to City or County Attorney for charging. Copies not being referred for charging will be destroyed by shredding. 8 D. HOT FILES 1. Before an item can be entered in the Hot Files, a theft report describing the item, including the serial number or owner applied number, must be filed with the Fridley Police Department. 2. A check of all appropriate sources for information (e.g. DNR, DVS, etc) shall be performed and documented in the case file. 3. Hot File entries, modifications and cancellations will be performed by either Central Communications or Fridley Police personnel per the ‘Hot Files and Hit Confirmation Agreement with Anoka County Central Communications’ contract. 4. The Fridley Police Department is a non-24 hour agency, therefore all hot file entries will include in the MIS field either the ORI or the telephone number (including area code) for Anoka County Central Communications which has responsibility for responding to a hit confirmation request. 5. Second Party Verification: Fridley records personnel other than the entering party will conduct a 2nd party verification check of information entered in the NCIC/CJIS Hot Files. This verification should include querying and reviewing the record, ensuring that the record is ‘packed’ with all available information, that any available cross-checks (e.g, driver license and motor vehicle records) were made, and that data contained in the NCIC record matches and is documented by data in the police report. The Second Party check will be documented in the case file. E. STOLEN VEHICLE FILE 1. Initial Stolen Report: Verification that the vehicle is owned by the party making the stolen report will be made by the officer taking the report. This will be done by showing proof of ownership through a registration check or the possession of a vehicle title. A copy of this proof of ownership will be attached to the case file. 2. If possible, the vehicle will be entered the same day it is reported stolen, or the next business day, by Central Communications or office personnel of this department. A copy of the CJIS/NCIC printout will be attached to the report. RECOVERED/RETURNED STOLEN VEHICLE When the vehicle is recovered, the officer receiving that information will have Fridley or Central Communications personnel remove the vehicle from the “Hot File”. The officer will request Central Communications send a copy of the cancel notification showing the CJIS/NCIC numbers to our state printer. A hard copy of this print-out will be added to the report. A supplemental report will be made advising what action was taken. 9 F. STOLEN/RECOVERED GUN FILE The Gun File is designed to provide law enforcement agencies with a central location for the maintenance and retrieval of information on stolen and recovered guns. Any gun with a unique serial number or owner applied number that meets the requirements of CJIS Operations Manual section 6.2 may be entered into the CJIS/NCIC Gun File. 1. Initial Report An officer taking the report will obtain the unique serial number or owner applied number, the brand name, model name or number, caliber or gauge, type, date of the theft (not the date of the report), barrel size and any other unique feature of the gun. 2. Entry to Gun “Hot File” The gun will be entered the same day it is reported stolen/recovered, if possible, or the next business day, by Central Communications or office personnel of this department. with the EG function. A copy of the CJIS/NCIC printout will be attached to the report. 3. Cancellation of “Hot File” Entry When a gun is located/recovered or this department releases a recovered gun to another agency, insurance company or owner and does not physically have the gun in possession it will immediately be removed from the “Hot File”. A copy of the cancellation will be attached to the report. A supplemental report will be made concerning the action concerning the cancellation. 4. Recovered Stolen Gun, Locate Message When a stolen gun is recovered by this department, a locate message will be sent to the entering agency. This will be done on the same day as the recovery, if possible, or the next business day. G. STOLEN ARTICLE FILE The Article “Hot File” is designed to provide law enforcement agencies with a central location for the maintenance and retrieval of information on stolen articles. Any item with a unique serial number or owner applied number that meets the criteria of CJIS Operations Manual Section 7 may be entered into the CJIS/NCIC “Hot File”. 1. Initial Report An officer taking the report will obtain the unique serial number or owner applied number, the brand name, model name or number, type, date of the theft (not the date of the report), and any other unique feature of the article. 10 2. Entry to Article “Hot File” a. The article will be entered the same day it is reported stolen, if possible, or the next business day, by Central Communications or office personnel of this department. via the EA function. A copy of the CJIS/NCIC printout will be attached to the report. b. The article will be entered the same day it is reported stolen, if possible, or the next business day by the office personnel of this department. A copy of the CJIS/NCIC printout will be attached to the report. c. The rules and procedures covering the entry of an article into the “Hot File” are covered in the CJIS Operations Manual Section 7. 3. Cancellation of “Hot File” Entry When a stolen article is located/recovered or this department releases a recovered article to another agency, insurance company or owner and does not physically have the article in possession it will be removed immediately from the “Hot File”. A copy of the cancellation will be attached to the report. A supplemental report will be made concerning the action covering the cancellation. 4. Recovered Stolen Article, Locate Message When a stolen article is recovered by this department, a locate message will be sent to the entering agency. This will be done on the same day as the recovery, if possible, or the next business day. H. STOLEN/RECOVERED BOAT The Boat “Hot File” is designed to provide law enforcement agencies with a central location for the maintenance and retrieval of information on stolen and recovered boats. Any boat with a unique serial number or owner applied number that meets the criteria of CJIS Operations Manual Section 5 may be entered into the CJIS/NCIC “Hot File”. 1. Initial Report An officer taking the report will obtain the unique serial number or owner applied number, the brand name, model name or number, type, date of the theft (not the date of the report), and any other unique feature of the boat. 2. Entry to Boat “Hot File” a. The boat will be entered the same day it is reported stolen/recovered, if possible, or the next business day by Central 11 Communications or office personnel of this department.. A copy of the CJIS/NCIC printout will be attached to the report. b. If other items, including the trailer and outboard motor, are taken with the boat, they will be entered as a supplemental trailer and add-on boat parts, to the stolen boat entry. c. The boat will be entered the same day it is reported stolen/recovered, if possible, or the next business day by the office personnel of this department. A copy of the CJIS/NCIC printout will be attached to the report. d. The rules and procedures covering the entry of a boat into the “Hot File” area covered in the CJIS Operations Manual. 3. Cancellation of “Hot File” Entry When a boat is located/recovered or this department releases a recovered boat to another agency, insurance company or owner and does not physically have the boat in possession, it will immediately be removed from the “Hot File”. A copy of the cancellation will be attached to the report. A supplemental report will be made covering the action covering the cancellation. 4. Recovered Stolen Boat, Locate Message When a stolen boat is recovered by this department, a locate message will be sent to the entering agency. This will be done on the same day as the recovery, if possible, or the next business day. I. STOLEN SECURITIES The Securities “Hot File” is designed to provide law enforcement agencies with a central location for the maintenance and retrieval of information on stolen, embezzled, missing or counterfeited securities. Any security with a unique serial number that meets the criteria of Section 8, CJIS Operations Manual may be entered into the CJIS/NCIC “Hot File”. 1. Initial Report An officer taking the report will obtain the unique serial number, the type of security, date of the theft (not the date of the report), and any other unique feature of the security. 2. Entry to Security “Hot File” a. The security will be entered the same day it was reported stolen, if possible or the next business day, by Central Communications or office personnel of this department. A copy of the CJIS/NCIC printout will be attached to the report. 12 b. The rules and procedures covering the entry of a security into the “Hot File” are covered in the CJIS Operations Manual, Section 8. 3. Cancellation of Hit File Entry When a security is located/recovered, it will immediately be removed from the “Hot File”. A copy of the cancellation will be attached to the report. A supplemental report will be made concerning the action covering the cancellation. J. IDENTITY THEFT Before an entry can be made in the Identify Theft File, an official report (electronic or hard copy) must be recorded and on file at the Fridley Police Department. Our agency may make an NCIC Identity Theft entry only if we are the agency that takes the identify theft complaint and the following criteria are met: 1. Someone is using a means of identification of the victim, 2. The identify of the victim is being used without the permission of the victim. 3. The victim's identify is being used or intended to be used to commit unlawful activity. 4. The victim must sign a consent waiver, which can be found on the CJDN secure site, prior to the information being entered into the Identify Theft file. 5. Information on deceased persons may be entered into the file if it is deemed by the police officer that the victim's information has been stolen. No consent form is required with the entry of deceased person information. 6. If the Identify Theft file is going to contain the Social Security Number of the victim, the Fridley Police Department is required to inform the individual of this fact and they must sign the "Notice about Providing Your Social Security Number" form, which can be found on the CJDN secure site. K. MISSING/ENDANGERED PERSONS See General Order 203 (Orange Section) L HIT CONFIRMATION 1. When Fridley Police receives a potentially matching record(s) in response to an NCIC inquiry, a ‘hit’ must be confirmed, using the YQ message, on any record(s) that appear(s) to have been entered for the 13 person or property inquired upon prior to taking any of the following actions based upon the NCIC record: a. Arresting the wanted person, b. Detaining the missing person, c. Seizing the stolen property, or d. Charging the subject with violating a protection order. 2. Additionally, the ‘hit’ must be confirmed before detaining an individual on local charges where the individual appears identical to the subject of the wanted person record and is within the geographical area of extradition. 3. Confirming a hit means to contact the controlling agency to: a. Ensure that the person or property inquired upon is identical to the person or property identified in the record; b. Ensure that the warrant, missing person report, protection order, or theft report is still outstanding; and c. Obtain a decision regarding: 1) the extradition of a wanted person when applicable, 2) information regarding the return of the missing person to the appropriate authorities, 3) information regarding the return of stolen property to its rightful owner, or 4) information regarding the terms, conditions, and service of a protection order. d. Determine if the entering agency wants the record to be located when the missing person was identified by partial body parts. 4. Hit confirmation procedure is based on two levels of priority: Urgent and Routine. a. Priority 1: Urgent The hit must be confirmed within 10 minutes. In those instances where the hit is the only basis for detaining a suspect or the nature of a case requires urgent confirmation of a hit, priority 1 should be specified. b. Priority 2: Routine The hit must be confirmed within 1 hour. Generally, this priority will be used when the person is being held on local charges, property has been located under circumstances where immediate action is not necessary, or an urgent confirmation is not required. 5. After establishing the priority level, Fridley Police will then follow these procedures: 14 a. Upon receipt of a hit confirmation request from another agency, Fridley Police personnel will respond using the appropriate YR message within the designated timeframe, i.e., a positive or negative confirmation or notice of the specific amount of time necessary to confirm or reject. b. If a substantive response to a Hit Confirmation request is not received by the Fridley Police within the designated timeframe, a second request should be generated with a copy to its CSO and to the CSO of the agency that originated the record. The CSO (or his/her designee) of the originating agency will initiate appropriate action to ensure proper response to a hit confirmation request and to comply with System standards. The CSO action must include canceling the record. c. If Fridley still fails to receive a response, Fridley/Anoka County Dispatch should then notify the NCIC Quality Control staff by a third message with a copy to the CSAs involved. (Failure on the part of any CSA to ensure such compliance will be brought to the attention of the APB.) d. The National Law Enforcement Telecommunications System, Inc. (NLETS) is the recommended network for hit confirmation. Even if the initial confirmation is handled via telephone, NLETS should be used for documentation. NLETS has created an inquiry (YQ) and a response (YR) format for hit confirmation. 1) Responsibilities for the hit confirmation process are shared between Fridley Police, Anoka County Dispatch, and the agency that enters the record. e. Every agency upon taking a person into custody identifying a missing person, or acquiring property, after confirming the hit, a locate will be placed on the corresponding NCIC record(s) by Fridley or Anoka County Dispatch. 1) Exception: If the missing person has been positively identified by partial body parts, determine if the entering agency wants the record to be located. The record may remain in NCIC for future positive identification in the event additional body parts are subsequently recovered. f. Copies of the hit, hit confirmation responses and locates should be attached to the case file. M. HOT FILE VALIDATION POLICY To ensure that only accurate information is retained in the “Hot Files,” validation reports will be provided to this department by the BCA/CJIS. The validation procedure will verify that the record is complete, accurate and still outstanding or active. This includes verifying the information contained in the Hot File with the 15 complainant and/or insurance company. Validation reports include all current Fridley Hot File entries. Validation takes place 60 - 90 days from the date of entry and yearly thereafter. A police technician will be assigned by the office supervisor to complete the validation process. 1. Procedure Once a month validation information will be provided by the BCA/CJIS section that contain Fridley Police “Hot File” information for missing persons (including runaways), boats, license plates, vehicle parts, vehicles guns and securities. a. Validation is accomplished by reviewing the entry and current supporting documents. The original report will be reviewed and the information contained in the “Hot File” validation report will be verified with the information in the original report. b. A letter will be sent to the owner and/or complainant listing the information on the original/validation report. This letter will request that the owner and/or complainant verify the information contained is correct and that the item/person has not been located. c. The verification information will be noted on the validation printout. 2. Corrections If information contained on the validation printout is found to be inaccurate, the “Hot File” entry will be corrected or removed from the “Hot File”. Any corrections or removals will be noted on the original report. 3. Record Retention When the validation procedure is completed, the validation printout will be retained in a file per the Fridley Police Record Retention schedule. N. LOCAL AGENCY SECURITY OFFICER (LASO) 1. The Local Agency Security Officer (LASO) shall be appointed by the Public Safety Director. 2. Local Agency Security Officer (LASO) Responsibilities. a. The LASO shall be the liaison between the department and the CJIS System Agency Information Security Officer (CSA ISO). b. The LASO is responsible for ensuring that the department complies with both the FBI CJIS Security Policy and CJDN Security Policy. 16 c. Each LASO shall be responsible to: 1) Identify who is using the CSA approved hardware, software, and firmware and ensure no unauthorized individuals or processes have access to the same. 2) Identify and document how the equipment is connected to the state system. 3) Ensure that personnel security screening procedures are being followed as stated in the FBI CJIS Security policy. 4) Ensure the approved and appropriate security measures are in place and working as expected. 5) Support policy compliance and keep the state/federal ISO informed of security incidents. 6) Physical security of all MNJIS terminals; 7) Users receive initial security training and on-going security training as outlined in the FBI CJIS Security Policy.