318 CJIS NCIC Procedures (Revised 02-23-2024) 1
FRIDLEY POLICE DATE OF ISSUE NUMBER:
GENERAL ORDER
May 15, 2008 318
SUBJECT: REVISION DATE SECTION:
CJIS/NCIC Procedures February 23, 2024 Yellow
I. PURPOSE
The following procedures are intended to be used as an aid to improve the use of
the CJIS/NCIC systems by this department. This General Order is not intended to
be all inclusive, nor shall it supersede any CJIS/NCIC policies presently in effect.
Rather, it is to be used as a quick reference when using the CCH/III, the CJDN
system and CJIS/NCIC “Hot Files”
Should there be a conflict between this General Order and CJIS/NCIC policy, the
CJIS/NCIC policy shall be adhered to. Furthermore, any future CJIS/NCIC
policy changes shall be adopted immediately until such changes can be
incorporated into this General Order.
II. POLICY
The Fridley Police Department will adhere to the policies and procedures of the
Criminal Justice Information System (CJIS) and the National Crime Information
Center (NCIC). All members of the Fridley Police Department will create, use,
maintain, store, preserve, and dispose of information retrieved from the FBI's
NCIC and the National Law Enforcement Telecommunications System (NLETS)
in accordance with the CJIS/NCIC Security Policy.
III. DEFINITIONS
CCH/III
Computerized Criminal History
CJDN
A dedicated statewide network that provides instant access to criminal justice
information such as criminal background information, driver license and motor
vehicle registration data, as well as other data. This network is interfaced with the
NCIC network that provides nationally indexed criminal and “hot” files. The
CJDN is also interfaced with the NLETS, which links local, state and federal
agencies together for the purpose of exchanging criminal justice information
interstate.
CJIS
Criminal Justice Information System
Hit
2
A positive response from MNJIS and/or NCIC in which the person or property inquired
about appears to match the person or property contained in the response. Queried subject
appears to match the record subject.
Hot Files
Missing person files and stolen/lost property files maintained in NCIC
NCIC
National Crime Information Center
TAC
A designated police department staff member serving as liaison to the Minnesota
Bureau of Criminal Apprehension (BCA). The TAC has the ability to add and
disable users and is also responsible for updating training for users and
certification within the Fridley Police Department for use of the PS Portals 100
Browser-based public safety workstation. This is the system in which the CJDN
is operated.
Personally Identifiable Information (PII)
PII is any information that permits the identity of an individual to be directly or
indirectly inferred, including any information which is linked or linkable to that
individual. Any FBI CJIS provided data may include PII. A criminal history
record for example inherently contains PII as would a Law Enforcement National
Data Exchange (N-Dex) case file.
IV. PROCEDURE
CONTENTS
A. System Security
1. Security of Terminal
2. Authorized Personnel
3. Background Checks
4. Misuse of CJDN
5. Safeguarding Personally
Identifiable Information (PII)
B. Dissemination of Information
C. Criminal History
1. Training
2. Authorized Personnel
3. Release of Information
4. Who May Request a CCH/III
5. Criminal History Inquiry
6. Retention
D. Hot Files
1. Report required.
2. Check appropriate sources
3. Entry/Modify/Cancel Personnel
4. MIS/ Field
5. Second Party Verification
E. Stolen Vehicle File
1. Initial Stolen Report
2. Recovered/Returned Stolen Vehicle
F. Stolen/Recovered Gun File
1. Initial Report
2. Entry to Gun “Hot File”
3. Cancellation of “Hot File” Entry
4. Recovered Stolen Gun, Locate
Message
G. Stolen/Recovered Article File
1. Initial Report
2. Entry to Article “Hot File”
3. Cancellation of “Hot File” Entry
3
4. Recovered Stolen Article Locate
Message
H. Stolen/Recovered Boat
1. Initial Report
2. Entry to Boat “Hot File”
3. Cancellation of “Hot File” Entry
4. Recovered Stolen Boat, Locate
Message
I. Stolen Securities
1. Initial Report
2. Entry to Security “Hot File”
3. Cancellation of “Hot File” Entry
J. Identity Theft
K. Missing/Endangered Persons
See General Order 203 (Orange)
L. Hit Confirmation
M. “Hot File” Validation Report1.
1. Procedure
2. Corrections
3. Record Retention
N. Local Agency Security Officer (LASO)
1. Appointment of LASO
2. LASO Responsibilities
O. Wanted Person Records
1. Document issued
2. Entered into NCIC
3. Locate message and extradition
P. Protection Order Records
1. Validate order
2. Enter ASAP
3. Compare name/DOB
A. SYSTEM SECURITY
Inquiries into the motor vehicle registration, driver license, criminal history or
any other file in the MNJIS/NCIC systems will be performed for Criminal Justice
purposes only.
All Fridley Police personnel must adhere strictly to the standards, procedures,
formats, codes and criteria as set forth to assure the proper operation of the
system. Accuracy and promptness are essential.
1. Security of Terminal
Unauthorized access to or routine viewing of CJDN terminals or CJDN
data is not allowed. The terminals must be secure from unauthorized use.
To protect the terminals, access will be restricted to police department
employees. The terminals will be placed in such a manner that they
cannot be viewed by non-department employees or the public.
All personnel who have direct responsibility to configure and maintain
computer systems and networks with direct access to FBI CJIS systems
must successfully pass a fingerprint-based background check.
Criminal History responses, as well as all other CJDN printouts will be
destroyed when no longer needed. These documents will by shredded at
the Fridley Police Department.
2. Authorized Personnel
4
CJDN Operators: Access to the CJDN shall be limited to employees of
the Fridley Police Department who have been certified by the BCA to
operate the terminal. CJDN operators, sworn officers and civilians who
have terminal access (including MDT's) shall be trained and certified
prior to access to CJI and annually thereafter.
CJDN Operators will be provided with a security logon to allow them
access to the system. Those conducting CCH/III inquiries will be
required to have the proper NCIC-CCH Certification level. The
employees authorized to conduct CCH/III inquiries will be restricted.
The Director of Public Safety, or his designee, will make the
determination of who will be authorized to conduct CCH/III inquiries.
The TAC will issue a unique username and password to authorized users
with access to the CJDN and Portal XL. Authorized users will be given a
unique password to have access to criminal histories. This Criminal
History Password will be changed by the TAC at least every 2 years. A
list of these assigned passwords shall be kept by the TAC.
Authorized personnel who have unescorted access to the police
department shall be fingerprint background checked prior to access.
Basic security and privacy training shall be required prior to initial
assignment, and annually thereafter, for all personnel who have access to
Criminal Justice Information, including CJDN terminal operators,
appropriate IT staff, consultants, vendors, contractors, and any other
personnel who have access to FBI Criminal Justice Information.
Sworn and Uniformed Personnel: NCIC requires that all sworn and
uniformed personnel must receive security and privacy training prior to
initial assignment, and annual refreshers thereafter. All training of sworn
officers must be documented.
3. Background Checks
Thorough background screening is required of all employees, sworn and
non-sworn, who will have access to CJIS/NCIC. New employees of the
Fridley Police Department shall be prior to employment or assignment
and the fingerprint cards shall be sent to the BCA for a background
check. A potential new employee of the Fridley Police Department shall
have a background check completed before they are hired. When running
the criminal history on that person, the appropriate purpose code shall be
used. Fingerprint cards on CJDN operators are to be kept by the Fridley
Police Office Coordinator.
4. Misuse of CJDN
a. If the Terminal Agency Coordinator (TAC) becomes aware of an
employee using a CJDN terminal, CJDN terminal generated
information, CJDN equipment, or CJDN access in a manner that
is not in accordance to Fridley Police Department General
5
Orders or NCIC policy and the problem is deemed merely
operator error or substandard job performance, the TAC will
contact the employee and advise him/her of the problem and
provide additional training to correct the issue.
b. If the above step does not rectify the problem, or the problem is
deemed to be greater than mere operator error or substandard job
performance, the TAC will submit a report to the Administrative
Division Commander. At this time, the TAC may suspend the
employee's CJDN access until an investigation is conducted.
1) If the investigation does not substantiate that the
employee was in violation of Fridley Police Department
General Orders or NCIC Policy, the will contact the
TAC requesting to reinstate the employee's CJDN
terminal access.
2) If the investigation substantiates that the employee was
in violation of Fridley Police Department General
Orders or NCIC Policy, disciplinary action may be taken
against the employee in accordance with applicable labor
agreements in the case of unionized employees or City
of Fridley policies in the case of non-unionized
employees. The TAC will deny CJDN terminal access
to the employee until directed by the Administrative
Division Commander to change this status.
3) If the TAC determines that an employee is using a CJDN
terminal, CJDN terminal generated information, CJDN
equipment, or CJDN equipment access in a manner not
in accordance with Fridley Police Department General
Orders or NCIC policy, and there is evidence that the
employee is performing this action as a result of
intentional misconduct that could be in violation of state
or federal statute, the TAC will submit a report to the
Administrative Division Commander for review. If the
misconduct is deemed to be criminal, the Administrative
Division Commander will report the behavior of
criminal nature to the Public Safety Director for
determining the appropriate action. To assist in
evaluating breaches of CJDN security, the
Administrative Division Commander shall be exempt
from the requirements of General Order 401 section
V.A.2.e.1).
4) In certain cases where criminal intent is involved or the
actions involved have or will impact upon more than just
the Fridley Police Department, the TAC may (after
review by the Administrative Division Commander) also
forward the above report to the Minnesota Department
6
of Public Safety, Control Terminal Officer (CTO) and/or
to the FBI/NCIC Criminal Justice Information Services.
5. Safeguarding Personally Identifiable Information (PII) Extracted From
Criminal Justice Information (CJI).
PII shall be extracted from CJI for the purpose of official business only
and shall only be accessed when there is a need for the information that
relates to official duties.
a) PII extracted from CJI may be disseminated only in accordance
with CJIS Security Policy, the laws and statutes of the State of
Minnesota, the ordinances of the City of Fridley and the policies
of the Police Department.
b) PII extracted from CJI may not be left unattended and
unsecured and may be saved, stored, or hosted only on agency
equipment. PII extracted from CJI in electronic form must be
encrypted. Paper documents containing PII extracted from CJI
must be under the control of the employee or stored in a space
where access control measures are employed to prevent
unauthorized access by members of the public or other persons
without a need to know (e.g., the police department office
where access is controlled by a card reader). The retention of PII
extracted from CJI should not to extend beyond the records
retention schedule adopted by the City. Appropriate destruction
techniques (shredding or electronic wiping) shall be used to
dispose of PII extracted from CJI.
c) Any employee that suspects or knows that PII extracted from CJI
has been handled in a way that violates this policy, the policies
of the Police Department, the ordinances of the City of Fridley,
the laws and statutes of the State of Minnesota, or CJIS Security
Policy must report the incident to a supervisor as soon as it is
suspected or confirmed. Section IV.A.4. Discipline for Misuse of
CJDN shall be followed.
d) The Local Agency Security Officer shall conduct periodic
assessments to support policy compliance and ensure that
appropriate security measures to protect PII extracted from CJI
are in place.
B. DISSEMINATION OF INFORMATION
Data in the computerized “Hot Files” and CCH/III are documented criminal
justice information. Access is restricted to authorized criminal justice agencies
for Criminal Justice purposes.
C. CRIMINAL HISTORY
7
The ability to access the state and national files through the CJIS computer by
means of a terminal device or satellite computer, is limited to criminal justice
agencies in the discharge of their official mandated responsibilities.
1. Training
Personnel performing CCH/III inquiries will complete the BCA/CJIS or
TAC training as appropriate. They will be required to have appropriate
NCIC certification.
2. Authorized Personnel
The employees authorized to conduct CCH/III inquiries will be
restricted. The Chief of Police, or his designee, will make the
determination who will be authorized to conduct CCH/III inquiries. .
3. Release of Information
ALL information obtained through a CCH/III inquiry is restricted to law
enforcement use only. This includes not only positive results but also
any negative results of an inquiry. Copies may be given to the City
Attorney and the County Attorney as part of a case file when requesting
charges on the subject. The Secondary dissemination log should be
completed whenever a CCH is distributed.
4. Who May Request a CCH/III
a. A sworn officer of this department for purposes of a criminal
investigation, permits for explosives, licensing, gun permits, and
background checks on new department personnel.
b. The City Clerk, City Manager, Human Resources Director, and
any City department head may request a background check as
per City Ordinance for purposes of licensing and/or employment.
Only a summary of the results of the CCH may be released by
the Police Department to the hiring or licensing authority.
c. It shall be the policy of this department that all other requests be
referred to the BCA.
5. Criminal History Inquiry
Criminal history inquiries shall be made as follows, on a terminal
designated for the inquiry.
QH / QHN / QHM
QR / QRN / QRM
IQ
FQ
AQ
QPGC
6. Retention
8
Hard copies of a CCH/III printout will not be retained after the case has
been completed, unless being referred to City or County Attorney for
charging. Copies not being referred for charging will be destroyed by
shredding.
D. HOT FILES
1. Before an item can be entered in the Hot Files, a theft report describing
the item, including the serial number or owner applied number, must be
filed with the Fridley Police Department.
2. A check of all appropriate sources for information (e.g. DNR, DVS, etc)
shall be performed and documented in the case file.
3. Hot File entries, modifications and cancellations will be performed by
either Central Communications or Fridley Police personnel per the ‘Hot
Files and Hit Confirmation Agreement with Anoka County Central
Communications’ contract.
4. The Fridley Police Department is a non-24 hour agency, therefore all hot
file entries will include in the MIS field either the ORI or the telephone
number (including area code) for Anoka County Emergency
Communications Center (ECC) which has responsibility for responding to a hit
confirmation request.
5. Second Party Verification: Fridley records personnel other than the
entering party will conduct a 2nd party verification check of information
entered in the NCIC/CJIS Hot Files. This verification should include
querying and reviewing the record, ensuring that the record is ‘packed’
with all available information, that any available cross-checks (e.g, driver
license and motor vehicle records) were made, and that data contained in
the NCIC record matches and is documented by data in the police report.
The Second Party check will be documented in the case file.
E. STOLEN VEHICLE FILE
1. Initial Stolen Report: Verification that the vehicle is owned by the party
making the stolen report will be made by the officer taking the report.
This will be done by showing proof of ownership through a registration
check or the possession of a vehicle title. A copy of this proof of
ownership will be attached to the case file.
2. If possible, the vehicle will be entered the same day it is reported stolen,
or the next business day, by ECC or office personnel of this department.
A copy of the CJIS/NCIC printout will be attached to the report.
RECOVERED/RETURNED STOLEN VEHICLE
When the vehicle is recovered, the officer receiving that information will have
Fridley or ECC personnel remove the vehicle from the “Hot File”. The officer
will request ECC send a copy of the cancel notification showing the CJIS/NCIC
9
numbers to our state printer. A hard copy of this print-out will be added to the
report. A supplemental report will be made advising what action was taken.
F. STOLEN/RECOVERED GUN FILE
The Gun File is designed to provide law enforcement agencies with a central
location for the maintenance and retrieval of information on stolen and recovered
guns. Any gun with a unique serial number or owner applied number that meets
the requirements of CJIS Operations Manual section 6.2 may be entered into the
CJIS/NCIC Gun File.
1. Initial Report
An officer taking the report will obtain the unique serial number or
owner applied number, the brand name, model name or number, caliber
or gauge, type, date of the theft (not the date of the report), barrel size
and any other unique feature of the gun.
2. Entry to Gun “Hot File”
The gun will be entered the same day it is reported stolen/recovered, if
possible, or the next business day, by ECC or office personnel of this
department. with the EG function. A copy of the CJIS/NCIC printout
will be attached to the report.
3. Cancellation of “Hot File” Entry
When a gun is located/recovered or this department releases a recovered
gun to another agency, insurance company or owner and does not
physically have the gun in possession it will immediately be removed
from the “Hot File”. A copy of the cancellation will be attached to the
report. A supplemental report will be made concerning the action
concerning the cancellation.
4. Recovered Stolen Gun, Locate Message
When a stolen gun is recovered by this department, a locate message will
be sent to the entering agency. This will be done on the same day as the
recovery, if possible, or the next business day.
G. STOLEN ARTICLE FILE
The Article “Hot File” is designed to provide law enforcement agencies with a
central location for the maintenance and retrieval of information on stolen
articles. Any item with a unique serial number or owner applied number that
meets the criteria of CJIS Operations Manual Section 7 may be entered into the
CJIS/NCIC “Hot File”.
1. Initial Report
10
An officer taking the report will obtain the unique serial number or
owner applied number, the brand name, model name or number, type,
date of the theft (not the date of the report), and any other unique feature
of the article.
2. Entry to Article “Hot File”
a. The article will be entered the same day it is reported stolen, if
possible, or the next business day, by ECC or office personnel of
this department. via the EA function. A copy of the CJIS/NCIC
printout will be attached to the report.
b. The article will be entered the same day it is reported stolen, if
possible, or the next business day by the office personnel of this
department. A copy of the CJIS/NCIC printout will be attached
to the report.
c. The rules and procedures covering the entry of an article into the
“Hot File” are covered in the CJIS Operations Manual Section 7.
3. Cancellation of “Hot File” Entry
When a stolen article is located/recovered or this department releases a
recovered article to another agency, insurance company or owner and
does not physically have the article in possession it will be removed
immediately from the “Hot File”. A copy of the cancellation will be
attached to the report. A supplemental report will be made concerning
the action covering the cancellation.
4. Recovered Stolen Article, Locate Message
When a stolen article is recovered by this department, a locate message
will be sent to the entering agency. This will be done on the same day as
the recovery, if possible, or the next business day.
H. STOLEN/RECOVERED BOAT
The Boat “Hot File” is designed to provide law enforcement agencies with a
central location for the maintenance and retrieval of information on stolen and
recovered boats. Any boat with a unique serial number or owner applied number
that meets the criteria of CJIS Operations Manual Section 5 may be entered into
the CJIS/NCIC “Hot File”.
1. Initial Report
An officer taking the report will obtain the unique serial number or
owner applied number, the brand name, model name or number, type,
date of the theft (not the date of the report), and any other unique feature
of the boat.
11
2. Entry to Boat “Hot File”
a. The boat will be entered the same day it is reported
stolen/recovered, if possible, or the next business day by ECC or
office personnel of this department.. A copy of the CJIS/NCIC
printout will be attached to the report.
b. If other items, including the trailer and outboard motor, are taken
with the boat, they will be entered as a supplemental trailer and
add-on boat parts, to the stolen boat entry.
c. The boat will be entered the same day it is reported
stolen/recovered, if possible, or the next business day by the
office personnel of this department. A copy of the CJIS/NCIC
printout will be attached to the report.
d. The rules and procedures covering the entry of a boat into the
“Hot File” area covered in the CJIS Operations Manual.
3. Cancellation of “Hot File” Entry
When a boat is located/recovered or this department releases a recovered
boat to another agency, insurance company or owner and does not
physically have the boat in possession, it will immediately be removed
from the “Hot File”. A copy of the cancellation will be attached to the
report. A supplemental report will be made covering the action covering
the cancellation.
4. Recovered Stolen Boat, Locate Message
When a stolen boat is recovered by this department, a locate message
will be sent to the entering agency. This will be done on the same day as
the recovery, if possible, or the next business day.
I. STOLEN SECURITIES
The Securities “Hot File” is designed to provide law enforcement agencies with a
central location for the maintenance and retrieval of information on stolen,
embezzled, missing or counterfeited securities. Any security with a unique serial
number that meets the criteria of Section 8, CJIS Operations Manual may be
entered into the CJIS/NCIC “Hot File”.
1. Initial Report
An officer taking the report will obtain the unique serial number, the type
of security, date of the theft (not the date of the report), and any other
unique feature of the security.
2. Entry to Security “Hot File”
12
a. The security will be entered the same day it was reported stolen,
if possible or the next business day, by ECC or office personnel
of this department. A copy of the CJIS/NCIC printout will be
attached to the report.
b. The rules and procedures covering the entry of a security into the
“Hot File” are covered in the CJIS Operations Manual, Section
8.
3. Cancellation of Hit File Entry
When a security is located/recovered, it will immediately be removed
from the “Hot File”. A copy of the cancellation will be attached to the
report. A supplemental report will be made concerning the action
covering the cancellation.
J. IDENTITY THEFT
Before an entry can be made in the Identify Theft File, an official report
(electronic or hard copy) must be recorded and on file at the Fridley Police
Department. Our agency may make an NCIC Identity Theft entry only if we are
the agency that takes the identify theft complaint and the following criteria are
met:
1. Someone is using a means of identification of the victim,
2. The identify of the victim is being used without the permission of the
victim.
3. The victim's identify is being used or intended to be used to commit
unlawful activity.
4. The victim must sign a consent waiver, which can be found on the CJDN
secure site, prior to the information being entered into the Identify Theft
file.
5. Information on deceased persons may be entered into the file if it is
deemed by the police officer that the victim's information has been
stolen. No consent form is required with the entry of deceased person
information.
6. If the Identify Theft file is going to contain the Social Security Number
of the victim, the Fridley Police Department is required to inform the
individual of this fact and they must sign the "Notice about Providing
Your Social Security Number" form, which can be found on the CJDN
secure site.
7. An Identity Theft complaint has been made to your agency.
8. Deceased persons may be entered into the file if it is deemed by law
enforcement officer that the victim’s information has been stolen. No
consent form is required in these cases.
13
K. MISSING/ENDANGERED PERSONS
Also See General Order 203 (Orange Section)
A law enforcement agency shall accept any report of a missing person without
delay. The law enforcement agency shall not refuse to accept a missing person
report on any basis stated in Minnesota State Statute § 299C.53. If there is a
jurisdiction question, contact the BCA following the entry of the missing person.
CRITERIA FOR ENTRY
The agency must have a missing person report (electronic or hard copy) on file to
support the missing person entry. A missing person record may be entered using
one of the following categories:
• Disability (MKE/EMD): a person of any age who is missing and under
proven physical/mental disability or is senile, thereby subjecting him/herself
or others to personal and immediate danger.
• Endangered (MKE/EME): a person of any age who is missing under
circumstances indicating that his/her physical safety may be in danger.
• Involuntary (MKE/EMI): a person of any age who is missing under
circumstances indicating that the disappearance may not have been
voluntary, i.e., abduction or kidnapping.
• Juvenile (MKE/EMJ): a person who is missing and not declared
emancipated as defined by the laws of his/her state of residence and does
not meet any of the entry criteria outlined in 1, 2, 3, or 5.
• Catastrophe Victim (MKE/EMV): a person of any age who is missing after
a catastrophe.
• Other (MKE/EMO): a person not meeting the criteria for entry in any other
category who is missing and 1) for whom there is a reasonable concern for
his/her safety or 2) a person who is under age 21 and declared emancipated
by the laws of his/her state of residence.
MISSING PERSON RECORD ENTRY
1. Missing persons (age 21 and over) shall be entered into NCIC, upon
receipt of the report, not to exceed three days.
a. The agency must have a missing person report (electronic or
hard copy) on file to support a missing person entry.
b. The record for a missing person age 21 and over must have a
signed document supporting the stated conditions under which
the person is declared missing.
i. Forms of acceptable signatures are:
1. Digitized signatures (similar to method used by
the United States Postal Service).
2. Scanned signatures in the RMS.
3. The case officer's typed or signed name in the
report.
2. A person under the age of 21, and individuals determined to be
endangered, shall be entered into NCIC within two hours of receipt of
14
the minimum data required.
a. The missing person report filed with the agency is sufficient
documentation for entering a juvenile in the NCIC Missing
Person File.
ENTRY REQUIREMENTS FOR ALL MISSING PERSON RECORDS
1. Query DVS, III/CHS criminal history, and local records to obtain
additional descriptors and retain a copy in the case file.
a. Any information entered on the record shall be documented in
the case file, including attempts to obtain medical/dental
information.
2. Enter the record in MNHOT/NCIC using the appropriate message key.
Make sure to pack the record with all the information available.
3. When applicable, caution the record using the appropriate caution
indicator(s).
4. Enter Supplemental Data such as additional identifiers, scars, marks and
tattoos, aliases, additional dates of birth, etc., to the record.
5. The agency may enter an image using the message key EIM if an image
is available.
a. The use of a DVS image is available for this purpose.
6. Query MNHOT/NCIC to verify entry and retain a copy in the case file.
7. Complete a second party check per agency policy.
8. If a record remains active for more than 30 days and a data field remains
blank, a $.K. Missing Information Notification will be sent to the
receiving terminal of the ORI of the record.
a. Verify and update the record with the additional information,
including but not limited to Blood Type (BLT); Dental
Characteristics (DCH); Fingerprint Classification (FPC); Jewelry
Type (JWT); and Scars, Marks, Tattoos, and Other
Characteristics (SMT) within 60 days of entry.
b. If no medical/dental information can be obtained, document the
attempt in the case file.
9. Validate the record according to NCIC standards. Retain any updated
documentation used during validation in the case file.
10. Following a confirmed Hit Confirmation, a locate shall be placed on the
record using Message Key Locate Missing (LM).
a. Do not enter a locate on a child removed from the United States
and located in another country until the child has been returned or
the issue of return has been resolved.
15
b. Completing a locate automatically retires the missing person
record.
L HIT CONFIRMATION
1. When Fridley Police receives a potentially matching record(s) in
response to an NCIC inquiry, a ‘hit’ must be confirmed, using the YQ
message, on any record(s) that appear(s) to have been entered for the
person or property inquired upon prior to taking any of the following
actions based upon the NCIC record:
a. Arresting the wanted person,
b. Detaining the missing person,
c. Seizing the stolen property, or
d. Charging the subject with violating a protection order.
2. Additionally, the ‘hit’ must be confirmed before detaining an individual
on local charges where the individual appears identical to the subject of
the wanted person record and is within the geographical area of
extradition.
3. Confirming a hit means to contact the controlling agency to:
a. Ensure that the person or property inquired upon is identical to
the person or property identified in the record;
b. Ensure that the warrant, missing person report, protection order,
or theft report is still outstanding; and
c. Obtain a decision regarding:
1) the extradition of a wanted person when applicable,
2) information regarding the return of the missing person to
the appropriate authorities,
3) information regarding the return of stolen property to its
rightful owner, or
4) information regarding the terms, conditions, and service
of a protection order.
d. Determine if the entering agency wants the record to be located
when the missing person was identified by partial body parts.
4. Hit confirmation procedure is based on two levels of priority: Urgent and
Routine.
a. Priority 1: Urgent
The hit must be confirmed within 10 minutes. In those instances
where the hit is the only basis for detaining a suspect or the
nature of a case requires urgent confirmation of a hit, priority 1
should be specified.
b. Priority 2: Routine
16
The hit must be confirmed within 1 hour. Generally, this priority
will be used when the person is being held on local charges,
property has been located under circumstances where immediate
action is not necessary, or an urgent confirmation is not required.
5. After establishing the priority level, Fridley Police will then follow these
procedures:
a. Upon receipt of a hit confirmation request from another agency,
Fridley Police personnel will respond using the appropriate YR
message within the designated timeframe, i.e., a positive or
negative confirmation or notice of the specific amount of time
necessary to confirm or reject.
b. If a substantive response to a Hit Confirmation request is not
received by the Fridley Police within the designated timeframe, a
second request should be generated with a copy to its CSO and
to the CSO of the agency that originated the record. The CSO (or
his/her designee) of the originating agency will initiate
appropriate action to ensure proper response to a hit
confirmation request and to comply with System standards. The
CSO action must include canceling the record.
c. If Fridley still fails to receive a response, Fridley/Anoka County
Emergency Communications Center should then notify the
NCIC Quality Control staff by a third message with a copy to the
CSAs involved. (Failure on the part of any CSA to ensure such
compliance will be brought to the attention of the APB.)
d. The National Law Enforcement Telecommunications System,
Inc. (NLETS) is the recommended network for hit confirmation.
Even if the initial confirmation is handled via telephone, NLETS
should be used for documentation. NLETS has created an
inquiry (YQ) and a response (YR) format for hit confirmation.
1) Responsibilities for the hit confirmation process are
shared between Fridley Police, Anoka County Dispatch,
and the agency that enters the record.
e. Every agency upon taking a person into custody identifying a
missing person, or acquiring property, after confirming the hit, a
locate will be placed on the corresponding NCIC record(s) by
Fridley or Anoka County Emergency Communications Center.
1) Exception: If the missing person has been positively
identified by partial body parts, determine if the entering
agency wants the record to be located. The record may
remain in NCIC for future positive identification in the
event additional body parts are subsequently recovered.
17
f. Copies of the hit, hit confirmation responses and locates should
be attached to the case file.
M. HOT FILE VALIDATION POLICY
To ensure that only accurate information is retained in the “Hot Files,” validation
reports will be provided to this department by the BCA/CJIS. The validation
procedure will verify that the record is complete, accurate and still outstanding or
active. This includes verifying the information contained in the Hot File with the
complainant and/or insurance company. Validation reports include all current
Fridley Hot File entries. Validation takes place 60 - 90 days from the date of
entry and yearly thereafter. A police technician will be assigned by the office
supervisor to complete the validation process.
1. Procedure
Once a month validation information will be provided by the BCA/CJIS
section that contain Fridley Police “Hot File” information for missing
persons (including runaways), boats, license plates, vehicle parts,
vehicles guns and securities.
a. Validation is accomplished by reviewing the entry and current
supporting documents. The original report will be reviewed and
the information contained in the “Hot File” validation report will
be verified with the information in the original report.
b. A letter will be sent to the owner and/or complainant listing the
information on the original/validation report. This letter will
request that the owner and/or complainant verify the information
contained is correct and that the item/person has not been
located.
c. The verification information will be noted on the validation
printout.
2. Corrections
If information contained on the validation printout is found to be
inaccurate, the “Hot File” entry will be corrected or removed from the
“Hot File”. Any corrections or removals will be noted on the original
report.
3. Record Retention
When the validation procedure is completed, the validation printout will
be retained in a file per the Fridley Police Record Retention schedule.
N. LOCAL AGENCY SECURITY OFFICER (LASO)
1. The Local Agency Security Officer (LASO) shall be appointed by the
Public Safety Director.
18
2. Local Agency Security Officer (LASO) Responsibilities.
a. The LASO shall be the liaison between the department and the
CJIS System Agency Information Security Officer (CSA ISO).
b. The LASO is responsible for ensuring that the department
complies with both the FBI CJIS Security Policy and CJDN
Security Policy.
c. Each LASO shall be responsible to:
1) Identify who is using the CSA approved hardware,
software, and firmware and ensure no unauthorized
individuals or processes have access to the same.
2) Identify and document how the equipment is connected
to the state system.
3) Ensure that personnel security screening procedures are
being followed as stated in the FBI CJIS Security policy.
4) Ensure the approved and appropriate security measures
are in place and working as expected.
5) Support policy compliance and keep the state/federal
ISO informed of security incidents.
6) Physical security of all MNJIS terminals;
7) Users receive initial security training and on-going
security training as outlined in the FBI CJIS Security
Policy.
O. WANTED PERSON RECORD ENTRY
Upon receiving a signed warrant from the court, a wanted person record shall be
entered into MNHOT/NCIC immediately, not to exceed three days, when
conditions for entry have been met.
1. Query DVS, CHS/III criminal history files, and RMS to obtain additional
descriptors. Retain a copy of these queries in the case file.
2. Verify extradition limits
a. 1 – Felony - Full Extradition: Pickup anywhere in the nation
b. 2 – Felony - Limited Extradition
i. Pickup outside MN to locations indicated in the MIS field.
c. 3 – Felony - Surrounding States Only
i. Pickup in North Dakota, South Dakota, Iowa and Wisconsin.
d. 4 – Felony - No Extradition
19
i. Pickup in Minnesota only, any limits indicated in the MIS
field.
e. A – Gross Misdemeanor and Misdemeanor - Full Extradition
i. Pickup anywhere in the nation
f. B – Gross Misdemeanor and Misdemeanor - Limited Extradition
i. Pickup outside MN to locations indicated in the MIS field.
g. C – Gross Misdemeanor and Misdemeanor – Surrounding States
Only
i. Pickup in North Dakota, South Dakota, Iowa and Wisconsin.
h. D – Gross Misdemeanor and Misdemeanor - No Extradition
i. Pickup in Minnesota only, any limits indicated in the MIS
field.
i. S - Sign and Release (MN only)
i. No pickup, enter dispatch contact for court date information
in MIS field.
3. Determine if the warrant is nightcapped.
a. Gross Misdemeanor and Felony warrants are automatically
nightcapped.
b. Misdemeanor warrants require an additional signature from the
judge.
4. Enter the warrant in MNHOT/NCIC using the message key Enter Warrant
(EW). Make sure to pack the record with all information available.
5. When applicable, caution the record using the appropriate caution
indicator(s).
6. Enter Supplemental Data such as additional identifiers, scars, marks and
tattoos, aliases, additional dates of birth, etc., to the record.
7. The agency may enter an image using the message key EIM if an image is
available.
a. The use of a DVS image is available for this purpose
8. Query MNHOT/NCIC to verify entry and retain a copy for the case file.
9. Complete a second party check per agency policy.
10. Validate the record according to NCIC standards. Retain any updated
documentation used during validation in the case file.
11. Following a confirmed Hit Confirmation
a. For those records authorizing an arrest, a locate shall be placed on
the record using Message Key Locate Wanted (LW)
b. For sign and release warrants, completion of Sign and Release
Warrant- Court Date and Defendant Information Form
20
12. Within five days of a locate being placed, a detainer shall be placed on the
record using the message key Detain Wanted (DW).
13. The record will remain in the active until extradition occurs.
P. PROTECTION ORDER RECORD MAINTENANCE
Orders for Protection (OFP), Minnesota Domestic Abuse No Contact Orders
(DANCO), Harassment Restraining Orders (HRO) and Extreme Risk Protection
Orders (ERPO), are issued by Minnesota courts. Once entered by the courts,
orders are sent electronically to the Bureau of Criminal Apprehension (BCA) for
validation before entry into National Crime Information Center (NCIC).
Minnesota courts are directed to send a copy of all issued protection orders to
their local sheriff’s office, who is deemed responsible for the record.
The Sheriff’s Office is not able to modify specific data entered by the Courts.
However, Sheriff’s Offices have the ability to pack the record by adding
supplemental information such as aliases, scars/marks/tattoos, additional
identifiers, caution indicators, images, etc. to make the record accurate and
complete. The Sheriff’s Office is also responsible to second party check and
validate the protection order while maintaining a case file for audit purposes.
1. Upon receipt from courts, verify the information on the record to ensure data
accurately matches the information in the signed order.
a. If data entry error is discovered, contact the issuing courts for
correction.
2. Query DVS, III/CHS criminal history, and local records to obtain additional
descriptors and retain a copy in the case file.
3. Additional descriptors shall be added using message key EPNO.
a. If the agency is aware court data does not match known personal
identifiers, the agency shall add the information to the record as a
supplemental identifier to produce a hit.
4. If an image is available, the agency may enter an image using message key
EIM.
a. The use of a DVS image is available for this purpose
5. Query MNHOT/NCIC to verify supplemental data was entered and retain a
copy in the case file.
6. Complete a second party check per agency policy.
7. Following service of the order, the serving agency shall enter service
information into NCIC using message key SPO. A copy of service shall also
be forward to the issuing court.
8. Validate the record according to NCIC standards. Retain any updated
documentation used during validation in the case file.
It is the court’s responsibility to notify law enforcement when these orders are no longer
active. Records cancelled by courts or expired will be sent electronically to the BCA for
removal.