2.1 JOB DESCRIPTION - LEADS TERMINAL AGENCY COORDINATOR (TAC)

Size: px
Start display at page:

Download "2.1 JOB DESCRIPTION - LEADS TERMINAL AGENCY COORDINATOR (TAC)"

Transcription

1 2 GETTING STARTED 2.1 JOB DESCRIPTION - LEADS TERMINAL AGENCY COORDINATOR (TAC) 4501: LEADS Terminal Agency Coordinator (TAC). (A) A LEADS terminal agency coordinator, hereafter referred to as TAC, shall be appointed by each terminal agency administrator. The TAC must be fully certified as a LEADS operator and have supervisory authority over the operation of LEADS approved equipment. The TAC is directly responsible to the agency administrator for the operation of LEADS. (1) Duties: LEADS terminal agency coordinator (a) Responsible for the training of LEADS terminal operators in all facets of terminal operation and other affected personnel as to the operational capabilities of the LEADS. Ensure each operator reviews training materials and is recertified every two years. (I) (II) (III) (IV) shall attend the new TAC indoctrination training with in 6 months of appointment. shall attend the annual in-service training session and others as scheduled. shall initially (within six months), train, functionally test and affirm the proficiency of terminal (equipment) operators. shall participate/attend any audit of the employing agency. (b) (c) Responsible for the proper completion of the monthly records validations. Maintain all documentation from LEADS, including but not limited to: (I) (II) (III) (IV) newsletters; LEADS computer messages; manuals; and lesson plans (d) (e) (f) Maintain agency level records of LEADS certified operators and notify LEADS of any changes on the prescribed form provided by LEADS control. Review all entries within a reasonable time frame for accuracy; modify/remove entries as needed. Know the location and use of all LEADS equipment within the agency. LEADS Section 2 - Page 1

2 (g) Biennially provide the functional retesting and reaffirm the proficiency of terminal operators in order to assure compliance with LEADS/NCIC policy and regulations. (2) Requirements: (a) (b) (c) (d) (e) (f) Knowledge of the responsibilities, functions, organization structure, purpose and aims of the agency. Knowledge of methods, procedures and programs in law enforcement. Knowledge of security and computer personnel working directly or indirectly with the computer system. Knowledgeable of the NCIC, NLETS and LEADS rules, regulations, and guidelines. This knowledge includes, but is not limited to, being familiar with what services are available, user agreements, and non-terminal agency agreements. Knowledge of all procedures concerning broadcast messages and their proper use. Knowledge and administration of the general maintenance of the equipment. 2.1A ADDITIONAL TAC RESPONSIBILITES Retention of LEADS materials must be maintained according to the prescribed retention schedule. Newsletters are to be retained for the current year plus two previous years. Teletypes received from LEADS are to be placed where directed in the teletype. Retention of teletypes sent by the agency or received from other agencies are at the discretion of the agency. Updated background checks on all certified operators must be completed every five years as defined in the LEADS Security Policy. At a minimum, an update will consist of an electronic criminal history check. 2.3 TAC RESPONSIBILITIES AS THE POINT OF CONTACT (POC) The TAC will also serve as the Point of Contact (POC) for any security violations or concerns within the department. These responsibilities include: Serve as the security point of contact for the Information Security Officer (ISO) at the local agency. LEADS Section 2 - Page 2

3 Know who is using the equipment and how the equipment is connected to CJIS systems. Ensure that no untrained personnel are using CJIS system terminals. Ensure that hardware has the appropriate security measures in place. Keep the LEADS ISO informed of security incidents. Support policy compliance at the local agency in partnership with the ISO. LEADS Section 2 - Page 3

4 2.3 AGENCY ADMINISTRATOR INFORMATION - NON-TERMINAL AGENCIES LEADS is responsible for maintaining the agreements with the non-terminal agencies. LEADS shall provide the non-terminal agency with a copy of the participation agreement, a copy of the LEADS Administrative Rules, copy of the LEADS Operating Manual Section 1.9 covering Validation, and training materials applicable to LEADS Practitioners (road officers, secretaries, clerks, etc.) Terminal agencies may disseminate information to a non-terminal agency providing the nonterminal agency is in good standing with LEADS. The non-terminal agency ORIs must be used in transactions run for those agencies. When using these ORIs the transaction will be accepted or rejected, if the transaction is rejected, the agency is not in good standing with LEADS and LEADS information should not be disseminated to the non-terminal agency in question. 2.4 LEADS OPERATOR CERTIFICATION The Omnixx software allows operators to do a variety of things concerning certification. Each individual can pull up their own certification information by going to Trainer and it will have a list of their certifications, status and expiration date. Also in the Trainer portion of Omnixx you can take an actual course that will allow you to see what type of questions will be given on the test. At the end of the course it will give the total number of questions in the exercise, and percentage of questions that were correct. At the bottom of the screen it will have a list of each area covered on the test (i.e., detainer, administration, locate) and give you a percentage of how you did in each category. 2.4A Exam Retrieval When the operator is ready to test: Click on Trainer Click on TESTS on the toolbar Click on the desired test At the bottom of the page click on START TEST The test will be displayed At completion of the test click on SUBMIT You will be notified 30 days prior to the expiration of your certification. It is best to take your test during this window period. LEADS Section 2 - Page 4

5 The list below indicates the current certifications available in LEADS. All tests must be completed within 8 hours. TAC test is 45 questions. FQO (Fully Qualified Operator) test is 35 questions. (Entry capability). INQ (Inquiry Only Operator) test is 25 questions. (Non-entering capability). MDT (Mobile Data Terminal) test is 25 questions. (Non-entering capability, mobile device access only). CCH test is 25 questions. Refer to the BCI & I Training Manual for Computerized Criminal History/Civilian Applicant Card Processing for the CCH testing procedures. The test will consist of 25 questions and the test is to be taken every two years. 2.4B Grading the Exam The exam will be graded automatically after the operator has completed the test. Even though it will not display questions missed it will give a percentage of how the operator did in each category. 2.4C LEADS Operator Tracking System The LEADS Operator Tracking System is designed to protect LEADS from unauthorized use and keep track of transactions for each operator. Each operator must login before using the workstation and logout whenever the workstation is unattended. A user-id identifies each LEADS operator. The operator user-id will be the same as the operator s license number (OLN) or state identification number. If the operator does not have an OLN or state ID, LEADS Control will assign a user-id to the operator. New operators must use the default password, "Their OLN" when they initially login. Passwords must be at least eight (8) characters and no more than fifteen (15) characters in length and are case sensitive. Passwords can contain numbers and uppercase letters. Passwords cannot be reused for 1 year. A password must contain at least one alpha, one numeric, and one special character. Example of valid passwords is: IL2WIT$P. The accepted special characters are,. /? < > : ; $ % & * ( ) _ - + = { } [ ] \ `. If your password has expired, you will have to contact LEADS Control to be reset. Enter only a password of your choice in accordance with the requirements above and transmit. Once you have entered a valid password, you will be prompted to confirm your password a second time. LEADS Section 2 - Page 5

6 LEADS OPERATOR UPDATE FORM DATE: Please use this form each time there is a change in your operator list. TAC: MAIL TO: OHIO LEADS ORI: PO BOX COLUMBUS OH AGENCY: ACTION TYPE: Add/Delete/ Modify NAME: Last, First, MI DATE OF BIRTH OLN # / STATE ID # / LEADS ASSIGNED # ORI* TYPE OF CERTIFICATION (TAC, FQO, INQ, MDT) DATE CERTIFIED *The ORI listed must be the ORI associated with the operator s certification. This may be a different ORI than the agency submitting the form, since MDT service may be provided by a different agency. LEADS Section 2 - Page 6

7 2.5 SENSITIVITY OF DATA The LEADS continues to grow as criminal justice agencies elect to become active participants. There is more data stored each day and more inquiries into the files. As we continue to expand, we must continually be aware of the responsibility and liability associated with the data we contribute and the data we retrieve. Data accessed through LEADS, NCIC, NLETS and other intra-state systems is restricted to the use of duly authorized law enforcement and/or criminal justice agencies and is not to be sold, transmitted or disseminated to any non-law enforcement agency, non-criminal justice agency or unauthorized person. Participating agencies have assumed responsibility for system security and integrity by signing the LEADS participation agreement (LEADS Administrative Rule 4501: ). LEADS terminal agencies can provide data received via LEADS to other criminal justice agencies. To be considered as a criminal justice agency they must have an Originating Agency Identifier (ORI) assigned and be active in the system. 2.6 AUDIT TRAIL When an inquiry is made into the system it is automatically recorded to a log at LEADS Control and if the inquiry is sent to NCIC it will be logged there also. The log is the start of the audit trail. It can be searched later, upon request through the LEADS Security Office, to determine when and if an inquiry was made about a particular person, vehicle, article, etc. The LEADS log is maintained for six years. LEADS operators can also place the name, unit number, badge number or other identifier of the requestor for social security number checks, operator s license number checks, and vehicle registration number checks in the requester field. When running inquiries for non-terminal agencies, you must substitute their ORI in the inquiry for your ORI. Other inquiries can also include the requestor s name, unit number, etc. When a computer printout is transmitted or disseminated to an authorized individual or criminal justice agency, the participating agency should indicate through the body of the computer printout: 1. To whom the printout will be given; 2. Date and time stamped (or handwritten) to document when the printout was forwarded to the receiving individual, court, etc. The terminal ORI should be left intact on the printout and not removed or defaced so an audit trail is in place. LEADS Section 2 - Page 7

8 Faxing of LEADS printouts is permissible provided you are confident the person on the receiving end is criminal justice personnel and entitled to receive the information. Before faxing the printouts, they must be marked with an audit trail as defined above. In the case of CCH printouts, the receiving person must fax back a signed receipt. 2.7 MESSAGE SWITCHING GUIDELINES Message switching, simply defined, is sending a message from one workstation location to another workstation at a different location. In order to accomplish the message switching through the computer, the information to be transmitted must be in a prescribed format. The message format is flexible and allows for the handling of original messages as well as additions or replies. Strict adherence to the standard formats will ensure accuracy and minimize delay in message handling. There are eight different message types. However, the basic message format is the same for each type. An example of the different messages and construction is explained in this section. All traffic over the system must be in the prescribed message form. Unnecessary messages with superfluous verbiage or embellishments are prohibited. Information of no value to the receiving agency must be avoided, i.e., the address or telephone number of parents reporting a runaway child are of no value to another department. The originating department, not the parents, will be notified of any apprehension. Avoid expressions such as "Arrest and Hold", "Hold for Investigation", "Hold and Notify", "Detain for this Department, "Wanted as Suspect", etc. The name of the crime is to be clearly specified and if a warrant has been issued, it is to be entered in the LEADS/NCIC system. In view of the many persons who can receive messages, the use of non-standard abbreviations must be avoided. Keep in mind many abbreviations which may be common within one department or in one state can be entirely unknown and confusing to another department or state. Departmental radio codes must not be used. It is imperative departments originating any type of "want message"; cancel the message when it no longer applies. Messages can be canceled only by the originating department. Do not resend the original message when canceling. Departments apprehending a wanted subject or recovering stolen or wanted property must send a notification to the originating agency, reporting the apprehension or recovery using the prescribed hit confirmation form. The originating department must then cancel their outstanding messages and clear their LEADS/NCIC file entry. Ohio agencies may receive an incoming administrative message coming from a state that uses a Control Field. A control field is a ten-digit alpha-numeric identifier used by some states instead of for the attention of, or for routing purposes to a specific person or section. Ohio does LEADS Section 2 - Page 8

9 not use a control field, except in response to an incoming message. With a control field, you must use the identical field on your reply message. 2.7A Message Construction Each message sent over the LEADS consists of six basic lines of information. Based on the information being sent and the message type, some slight variations may exist from one message to another. Example of an administrative message form: 2.7B Message Header LEADS Section 2 - Page 9

10 The message header (ORI) is a nine-character NCIC assigned agency identifier which directs the message to its proper location(s). A message can be addressed to a total of five individual agencies by using the ORI for each agency. DRI OHOHP0000 OH OH OH OHCOP0000 If you wish to obtain a copy of the message for your files, key in your ORI as one of the individual headers you are using to send the message. When using Ohio broadcast code messages, i.e., OHALLTERM or QUAD, more than one Ohio header may be used. You may also use the Ohio broadcast codes in conjunction with an individual agency ORI. If you want to direct the message to another state at the same time simply place the two letter state code identifier after the ALLTERM/QUAD header. Do not use a nine digit ORI for QUAD and ALLTERM requests to other states; use only the two character header. Example: DRI OHALLTERM PA Note: The sending of ALLTERM and QUAD messages to other states sends the message to their control center for dissemination as they see fit. 2.7C Destination ORIs This line consists of the originating agency's message number and is for original messages only. When the message is delivered, the computer will add a line indicating the sending agency's ORI, automatic message number, the time and date. 2.7D Sending Agency (AGY) Agency sending the message; i.e,. your agency. 2.7E Destination (AGY) This is the name of the department(s) or agency(s) who is/are to receive the message. If it is desirable to send the message to a specific section within a department, it can be added on the same line, i.e., SO COLUMBUS OH DEP. SMITH TRAFFIC BUREAU. 2.7F Message Number, Initials, and Date LEADS Section 2 - Page 10

11 Mno Int Dat - Message number assigned by agency, operator initials, date message transmitted. 2.7G Time Control Field Time Use military time Hours. 2.7H Message Text The system must not be used for the following types of messages: 1. Social announcements, i.e., holiday messages, retirements, convention notices. Seminars or training classes are not permitted over NLETS. 2. Recruiting of personnel. 3. Messages in which the complainant is interested only in the recovery of property. 4. Attempts To Locate vehicle (Breach of Trust) without warrant. For the protection of the arresting officer, messages are not to be dispatched until a warrant is secured. 5. Excessively long messages. 6. Transmission of subpoenas. 7. Use of vehicle registration or drivers license information obtained via LEADS should not be placed in the message. 8. Messages supportive or in opposition to political issues or announcement of meetings relative to such issues. 9. Messages supportive or in opposition to labor/management issues or announcements relative to such issues. 10. Messages supportive or in opposition of legislative bills. 11. Messages relating to requests for information concerning salary, uniforms, personnel, or related items which can be routinely obtained by correspondence or means other than LEADS/NLETS. 12. Messages relating to the advertisement or sale of equipment. LEADS Section 2 - Page 11

12 13. Individual listing of items stolen is prohibited. A general description of property is permitted. 14. Radio codes in messages must not be used. 15. Special characters, (i.e., ***), must not be used. 2.8 BROADCAST MESSAGE CODES To simplify the sending of a message to more than one agency or department, Ohio law enforcement and criminal justice agencies are grouped into areas, or quadrants. More than one broadcast message code may be used in a header. (Individual agency ORIs may be used with the broadcast codes, providing the individual agency ORI is listed first, followed by the broadcast message code). Messages will be sent to all criminal justice workstations in the areas as defined by the quadrant broadcast codes listed. OHALLPSNW - OHALLPSNE - OHALLPSSW - OHALLPSSE - OHALLPSCO - OHALLOHPD - OHALLOHPT - OHALLOHPS - OHALLGHQT - OHALLOHP# - OHALLTERM - northwest quadrant of Ohio northeast quadrant of Ohio southwest quadrant of Ohio southeast quadrant of Ohio nine county central Ohio area (These workstations also remain in the respective assigned quadrant.) all Highway Patrol District Headquarters and the Training Academy (The sending agency will be notified if any workstation is inoperative.) all Highway Patrol workstations individually, (The sending agency will be notified if any workstation is inoperative.) all Highway Patrol workstations at posts with scales. all Highway Patrol workstations at the Highway Patrol General Headquarters. (replace the # with a Highway Patrol District number) all Highway Patrol workstations within the designated district. all Police, Sheriff, Highway Patrol and other criminal justice workstations (Use this code only for urgent and important messages when it is necessary for every criminal justice agency in the state be alerted.) LEADS Section 2 - Page 12

13 OHALLLAKE - OHALLRIVR - along the Lake Erie shore along the Ohio River shore OHALLIS70 - along Interstate 70 OHALLIS71 - along Interstate 71 OHALLIS75 - along Interstate 75 OHALLIS77 - along Interstate 77 OHALLSHRF - OHALLPLCE - OHALLTNPK - OHALLCNXX - OHADJCNXX - all Sheriff's agencies individually who have LEADS access all Police agencies individually who have LEADS access all agencies along the Ohio Turnpike. This code is only used by the State Highway Patrol Berea District Headquarters (Turnpike) to notify agencies of road conditions, etc. all LEADS users in county XX (XX = county number 01 through 88) all LEADS users in county XX and all adjacent counties (XX = county number 01 through 88) 2.8A LEADS Quadrant Broadcast Boundaries The LEADS broadcast boundaries provide a visual of the exact geographic area of the state to which the various quadrant broadcast covers. Also identified are the counties in each quadrant. This will assist the user to determine if the use of the quadrant broadcast is actually necessary. Many times the purpose can be accomplished by addressing multiple workstations as opposed to the broadcast identifier. LEADS Section 2 - Page 13

14 LEADS Section 2 - Page 14

15 2.9 MISCELLANEOUS MESSAGES Attempt-To-Locate (ATL) and Attempt-To-Contact (ATC) are to be used only when all other means have failed and limited to cases of extreme emergency i.e. foul play is suspected or known; death or serious illness messages; or delivery of military orders. An ATL message is to give the area of travel, including vehicle description, time of departure, routes of travel and any known stopovers MESSAGE RETRIEVAL If a message cannot be received at a workstation, the message will be held by the LEADS. When the receiving workstation is ready to receive messages it will automatically be delivered to the workstation when the next operator logs on. 2.10A How to Retrieve Messages Omnixx Force has a feature for message retrieval called Message Log. The Message Log feature allows the user to search and view messages that were sent and received during previous sessions of Omnixx Force. The Message Log menu bar has two components that can accessed. The FILE menu allows you to EXIT and the TOOLS menu has an archive feature which will allow you to archive the current log and begin a new one. LEADS Section 2 - Page 15

16 2.10B How to use search criteria to retrieve messages There are several features that can be used to help narrow the search for information contained in a certain message. Depending on the search criteria used will determine the extent of the information you receive. Below is a list of identifiers you can use to help you with your search: ORI TERM UNIT OPERATOR START DATE END DATE START TIME END TIME SEARCH FOR MKE LEADS Section 2 - Page 16

17 2.10C How to Forward a Received Message In Omnixx force a message that has been received by you can be forwarded to another user. This can be achieved by using either the Message window or the Message Log. 1. Access either the Message Window or Message Log, right click in the selected received message and the following will appear: 2. Click on Forward Message LEADS Section 2 - Page 17

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit.

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. AUDIT QUESTIONNAIRE Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. ORI Person Completing Date Phone Number AGENCY AGREEMENT

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

Computerized Central Records System

Computerized Central Records System POLICY 111.2 Computerized Central Records System REVISED: 02/07, 09/11, 07/17 RELATED POLICIES: CFA STANDARDS: 34.13 REVIEWED: AS NEEDED A. PURPOSE The purpose of this policy is to establish procedures

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Judicial Inquiry System (JIS)

Judicial Inquiry System (JIS) Judicial Inquiry System (JIS) Active Warrant Alert Calendaring System (AWACS) User Manual Office of the State Courts Administrator Created March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3 SCOPE...

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared

More information

TIME System Newsletter Volume February 2016

TIME System Newsletter Volume February 2016 Wisconsin Department of Justice Division of Law Enforcement Services Brad D. Schimel Attorney General TIME System Newsletter Volume 2016-1 February 2016 The TIME System processed 53,556,473 transaction

More information

Table of Contents 6.1 CORRESPONDENCE

Table of Contents 6.1 CORRESPONDENCE Table of Contents Section Page 6.1 CORRESPONDENCE... 6.1-1 6.1.1 In-House Memoranda... 6.1-1 6.1.1.1 General... 6.1-1 6.1.1.2 Format... 6.1-1 6.1.1.3 Signatures... 6.1-1 6.1.1.4 Distribution... 6.1-2 6.1.2

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access

More information

NC Department of Justice

NC Department of Justice Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT

More information

Emergency Nurses Association Privacy Policy

Emergency Nurses Association Privacy Policy Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your

More information

Requirements for Forensic Photography & Imaging Certification (08/2017)

Requirements for Forensic Photography & Imaging Certification (08/2017) Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

MAIL AUDIT QUESTIONNAIRE

MAIL AUDIT QUESTIONNAIRE MAIL AUDIT QUESTIONNAIRE Complete and return by due date to: Crime Information Bureau, P.O. Box 2718, Madison, WI 53701-2718, or email to cibtrain@doj.state.wi.us. Completion may require input by information

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Request For Proposal (RFP) Online Certification Platform

Request For Proposal (RFP) Online Certification Platform Request For Proposal (RFP) Online Certification Platform NAFA Fleet Management Association 125 Village Blvd., Suite 200 Princeton, NJ 08540 Pam Nobles (609) 986-1053 pnobles@nafa.org Page 1 NAFA Online

More information

PRIVACY NOTICE STORM RECRUITMENT UNIT 11, 2 ND FLOOR CHARLESLAND CENTRE, GREYSTONES, CO. WICKLOW 1. INTRODUCTION

PRIVACY NOTICE STORM RECRUITMENT UNIT 11, 2 ND FLOOR CHARLESLAND CENTRE, GREYSTONES, CO. WICKLOW 1. INTRODUCTION PRIVACY NOTICE STORM RECRUITMENT UNIT 11, 2 ND FLOOR CHARLESLAND CENTRE, GREYSTONES, CO. WICKLOW 1. INTRODUCTION 1.1 STORM RECRUITMENT is strongly committed to protecting your Personal Data. This Privacy

More information

Security policy 8/24/2012

Security policy 8/24/2012 SLED Overview of the FBI Criminal Justice Information Services (CJIS) Security Policy Version 5.1 8/09/2012 CJISD-ITS-DOC-08140-5.0 SLEDISO@SLED.SC.GOV ForOfficialUse Only 1 This session will be an overview

More information

PRIVACY POLICY. Personal Information We Collect

PRIVACY POLICY. Personal Information We Collect PRIVACY POLICY Bloomberg Finance L.P. and its operating agent Bloomberg L.P. (together, "the Bloomberg Group") respect the privacy rights of our users and are strongly committed to protecting your privacy.

More information

Schools and Libraries (E-rate) Program FCC Form 472 (BEAR) User Guide

Schools and Libraries (E-rate) Program FCC Form 472 (BEAR) User Guide Schools and Libraries (E-rate) Program FCC Form 472 (BEAR) User Guide 1 Universal Service Administrative Company FCC Form 472 (BEAR) User Guide TABLE OF CONTENTS Contents Filing FCC Form 472... 4 Billed

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

Privacy & Information Security Protocol: Breach Notification & Mitigation

Privacy & Information Security Protocol: Breach Notification & Mitigation The VUMC Privacy Office coordinates compliance with the required notification steps and prepares the necessary notification and reporting documents. The business unit from which the breach occurred covers

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

JAIL TECHNICIAN. Some form of picture identification, such as a driver's license, will be required at examinations.

JAIL TECHNICIAN. Some form of picture identification, such as a driver's license, will be required at examinations. JAIL TECHNICIAN APPLICATION REQUEST AND RELEASE I, (print your name), hereby state that I wish to apply for employment at the Peoria County Sheriff's Office. I understand that as part of the application

More information

STATE OF OKLAHOMA COUNCIL ON LAW ENFORCEMENT EDUCATION AND TRAINING

STATE OF OKLAHOMA COUNCIL ON LAW ENFORCEMENT EDUCATION AND TRAINING STATE OF OKLAHOMA COUNCIL ON LAW ENFORCEMENT EDUCATION AND TRAINING APPLICATION FOR INTERMEDIATE OR ADVANCED LAW ENFORCEMENT CERTIFICATION Law Enforcement Professional's Certification Program In order

More information

OpenFox. Configurator

OpenFox. Configurator OpenFox Configurator Product Guide 2018 OpenFox Configurator Ever-changing technology and demands for information at a faster pace poses the challenge of ensuring your system is flexible and able to adapt

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

Throughout this Data Use Notice, we use plain English summaries which are intended to give you guidance about what each section is about.

Throughout this Data Use Notice, we use plain English summaries which are intended to give you guidance about what each section is about. By visiting and using The Training Hub and associated companies and affiliate s websites, mobile sites, and/or applications (together, the Site ), registering to use our services offered through the Site,

More information

Redirection Of Domestic Mail

Redirection Of Domestic Mail APPLICATION FOR April 2017 Redirection Of Domestic Mail WHAT THE SERVICE OFFERS Jersey Post s domestic mail redirection services enables customers to have their mail redirected to an alternative address

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

Charitable Registration User Guide

Charitable Registration User Guide Charitable Registration User Guide Table of Contents Chapter 1 Online Charitable Registration... 3 A. Creating an Account... 3 I. Employer Identification Number (EIN)... 3 II. Step 2: Create Account...

More information

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0 Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

TITLE 595. DEPARTMENT OF PUBLIC SAFETY CHAPTER 10. CLASS D DRIVER LICENSES AND IDENTIFICATION CARDS AND MOTOR LICENSE AGENT PROCEDURES

TITLE 595. DEPARTMENT OF PUBLIC SAFETY CHAPTER 10. CLASS D DRIVER LICENSES AND IDENTIFICATION CARDS AND MOTOR LICENSE AGENT PROCEDURES TITLE 595. DEPARTMENT OF PUBLIC SAFETY CHAPTER 10. CLASS D DRIVER LICENSES AND IDENTIFICATION CARDS AND MOTOR LICENSE AGENT PROCEDURES RULEMAKING ACTION: EMERGENCY adoption PROPOSED RULES: Subchapter 11.

More information

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3 Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com Mile Privacy Policy Ticket payment platform with Blockchain Version 1.1 Feb 2018 [ Mile ] www.mileico.com Airline mileage system utilizing Ethereum platform Chapter 1 General Provisions Article_1 (Basic

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.

More information

MENTAL RETARDATION BULLETIN

MENTAL RETARDATION BULLETIN MENTAL RETARDATION BULLETIN COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE DATE OF ISSUE September 6, 2001 EFFECTIVE DATE September 6, 2001 NUMBER 00-01-06 SUBJECT: BY: Announcement of Certified

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET

THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION

More information

As used in these Rules and unless the context otherwise requires: CMIC shall refer to the Capital Markets Integrity Corporation.

As used in these Rules and unless the context otherwise requires: CMIC shall refer to the Capital Markets Integrity Corporation. Section 1. Short Title These Rules may be cited as the DMA Rules. Section 2. Definition of Terms As used in these Rules and unless the context otherwise requires: Algorithmic Trading shall mean the use

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

VETDATA PRIVACY POLICY

VETDATA PRIVACY POLICY Last Updated: April 20, 2018. VETDATA PRIVACY POLICY PLEASE READ THIS PRIVACY POLICY CAREFULLY. Direct Vet Marketing, Inc. and its consolidated affiliates (hereinafter, Vets First Choice, we, us, our )

More information

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

B. Employees are expected to make personal calls on non-work time and to ensure that friends and family members are aware of the City s policy.

B. Employees are expected to make personal calls on non-work time and to ensure that friends and family members are aware of the City s policy. City of Winder Personnel Policy Manual Title: Cellular Phone Use & Reimbursement Date Issued: 08/2016 Policy: 082 Mayor City Administrator 82.10 Purpose The purpose of this policy is to establish requirements

More information

Conjure Network LLC Privacy Policy

Conjure Network LLC Privacy Policy Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy

More information

SOUTHERN CALIFORNIA EDISON COMPANY

SOUTHERN CALIFORNIA EDISON COMPANY SOUTHERN CALIFORNIA EDISON COMPANY COMPLIANCE PROCEDURES IMPLEMENTING FERC ORDER 717C STANDARDS OF CONDUCT Version 1.2 Updated June 14, 2017 Purpose: To provide Southern California Edison s (SCE) overall

More information

Water Quality Association Sustainability Certification Program s Logo Policy. Version 1.0

Water Quality Association Sustainability Certification Program s Logo Policy. Version 1.0 Water Quality Association Sustainability Certification Program s Logo Policy Version 1.0 Effective Date: 7/19/2013 TABLE OF CONTENTS INTRODUCTION... 3 OWNERSHIP & REGISTRATION OF THE SUSTAINABILITY MARK...

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Standard CIP 004 3a Cyber Security Personnel and Training

Standard CIP 004 3a Cyber Security Personnel and Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access

More information

Wisconsin Assessor Certification Program

Wisconsin Assessor Certification Program Search Revenue: Site Map Contact Us Home Business Individual Government Practitioner E-Services Employment En Español FAQs Forms Links Newsroom Publications Reports Training Wisconsin Assessor Certification

More information

Wireless Communication Device Use Policy

Wireless Communication Device Use Policy Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

FAQS Guide for Cellular and Other Mobile Computing Devices Employees and Supervisors

FAQS Guide for Cellular and Other Mobile Computing Devices Employees and Supervisors FAQS Guide for Cellular and Other Mobile Computing Devices Employees and Supervisors FAQS Employees, Pg 1 3 FAQS Supervisors, Pg 4 5 FAQs Employees 1. I am an employee and I think I need a business cell

More information

WYDOT Traffic Control Supervisor Certification Program

WYDOT Traffic Control Supervisor Certification Program Page 1 of 5 WYDOT Traffic Control Supervisor Certification Program INTRODUCTION The purpose of this program is to certify personnel involved in the layout, inspection and design of traffic control plans.

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015 Definitions Cellular Telephone Service For the purposes of this policy, cellular telephone

More information

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING, dated, is between the Davie County North Carolina Register of Deeds office ( COUNTY ), and ( COMPANY ) with offices located

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

ALG Associates, LLC ( ALG Associates ) operates a website under. and has created this privacy policy to demonstrate its

ALG Associates, LLC ( ALG Associates ) operates a website under.   and has created this privacy policy to demonstrate its PRIVACY STATEMENT ALG Associates, LLC ( ALG Associates ) operates a website under www.warrantyconference.com and has created this privacy policy to demonstrate its commitment to the privacy of the users

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Privacy Policy. Optimizely, Inc. 1. Information We Collect

Privacy Policy. Optimizely, Inc. 1. Information We Collect Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently

More information

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations

More information

UPU quality management certification system

UPU quality management certification system AAnne UPU UNIVERSA L POS TAL UNION CEP C 3 GEAQSPL 2014.1 Doc 4.Annexe 1.Rev 1 UPU quality management certification system Methodology (2014) Berne, 2014 STAN 22.4.2014 2 I. Introduction In resolution

More information

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011 CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004

More information

CORRECTIONS OFFICER OC

CORRECTIONS OFFICER OC LIVINGSTON COUNTY PERSONNEL OFFICE ANNOUNCES THE FOLLOWING CIVIL SERVICE EXAMINATION FOR CORRECTIONS OFFICER OC EXAM NUMBER: 68-271 March 8, 2013 April 13, 2013 LAST FILING DATE EXAMINATION DATE PAY RANGE:

More information

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...

More information

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,

More information

Worker s (Employee) Self-Service User Guide. Ohio Unemployment Employee Benefit Information at Your Fingertips

Worker s (Employee) Self-Service User Guide. Ohio Unemployment Employee Benefit Information at Your Fingertips Worker s (Employee) Self-Service User Guide Ohio Unemployment Employee Benefit Information at Your Fingertips Why Use Employee Self Service? Employee Self-Service offers many benefits in processing your

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

C H R I S. Children s Registry and Information System Data Facilitator Manual. Technical Support Information

C H R I S. Children s Registry and Information System Data Facilitator Manual. Technical Support Information C H R I S Children s Registry and Information System Data Facilitator Manual Technical Support Information 5665 Ponce de Leon Blvd. Coral Gables, FL 33146 (800) 231-5747 chris.um@miami.edu http://www.chris.miami.edu

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

PRIVACY POLICY CORPORATE CUSTOMER

PRIVACY POLICY CORPORATE CUSTOMER CORPORATE CUSTOMER PRIVACY POLICY This privacy policy applies when (Telia) supplies products and services to a corporate customer (the customer) and where Telia is the personal data controller. The policy

More information

DSF 2 PRODUCT LICENSEE PERFORMANCE REQUIREMENTS

DSF 2 PRODUCT LICENSEE PERFORMANCE REQUIREMENTS 1. General 1.1 There are over 165 million address records in the United States Postal Service address database. The DSF 2 Product identifies whether a ZIP + 4 coded address is currently represented in

More information

South Carolina Law Enforcement Division. NCIC 2000 System Usage Requirements

South Carolina Law Enforcement Division. NCIC 2000 System Usage Requirements South Carolina Law Enforcement Division NCIC 2000 System Usage Requirements Version 2.3 January 2004 This document does not constitute a contract and does not alter federal and state law, system regulations,

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy We are very sensitive to privacy issues. The purpose of this Website Privacy Policy is to let you know how Associated Underwriters Insurance, but not limited to, Associated Underwriters

More information

Privacy Policy. Due Diligence Checking Limited ( We or Us ) are committed to protecting and respecting your privacy.

Privacy Policy. Due Diligence Checking Limited ( We or Us ) are committed to protecting and respecting your privacy. Privacy Policy Due Diligence Checking Limited ( We or Us ) are committed to protecting and respecting your privacy. This policy sets out the basis on which any personal data we collect from you, or that

More information

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview Agilent ICP-MS ChemStation Complying with 21 CFR Part 11 Application Note Overview Part 11 in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting electronic

More information

PCI COMPLIANCE IS NO LONGER OPTIONAL

PCI COMPLIANCE IS NO LONGER OPTIONAL PCI COMPLIANCE IS NO LONGER OPTIONAL YOUR PARTICIPATION IS MANDATORY To protect the data security of your business and your customers, the credit card industry introduced uniform Payment Card Industry

More information