Signature: Signed by GNT Date Signed: 5/29/15

Size: px
Start display at page:

Download "Signature: Signed by GNT Date Signed: 5/29/15"

Transcription

1 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Applicable To: All sworn employees Approval Authority: Chief George N. Turner Signature: Signed by GNT Date Signed: 5/29/15 Table of Content 1. PURPOSE 1 2. POLICY 1 3. RESPONSIBILITIES 1 4. ACTION Stops Checks Precautions Field Interview/Contact Procedure Using ICIS Completing (FCI) on ICIS via the Computer Acquiring & Printing (FCI) from the ICIS Server Completing the (FCI) on ICIS via the Lap Top 5 5. DEFINITIONS 8 6. CANCELLATIONS 8 7. REFERENCES 8 1. PURPOSE 2. POLICY To establish procedures and guidelines for an active approach to the reduction of suppressible crimes, such as pedestrian robbery, residential burglaries, and larceny, by encouraging officers to contact, identify, and document encounters with suspicious persons and vehicles. The field interview process is intended to increase patrol visibility, and remove the anonymity of potential criminals, thereby reducing suppressible crimes. 3. RESPONSIBILITIES 3.1 Section and unit commanders will monitor the field interview process. 3.2 Supervisors will ensure that officers comply with this directive. 3.3 Officers and investigators will use field interviews to identify and document encounters with suspicious persons and vehicles. 3.4 PRAU will contact the City of Atlanta Department of Law prior to making any revisions, amendments, or deletions in this Standard Operating Procedure. 4. ACTION 4.1 Stops Officers may detain an individual only when they have reasonable articulable suspicion that the individual is involved in criminal activity. If, following the stop, the officer reasonably believes that the person is both armed and presently dangerous, the officer may frisk for weapons. Form APD-700, revised 2/04

2 *This Subsection, 4.1.1, may not be deleted, revised, or amended pursuant to the May 19, 2015 Order in Calhoun, et al. v. Pennington, et al. 1:09-CV-3286-TCB. Consult the City of Atlanta Department of Law with any questions or concerns.* Before an officer stops a suspicious person, the officer will pull out of service with the dispatcher and give the following information: location, number of persons, sex, race, approximate age, and clothing description. Avoid making stops in a crowd When making stops at night, direct the vehicle lights, spotlights, or flashlight on the subject(s). 4.2 Checks After the person has been frisked, if necessary, the officer will obtain the person's name, date of birth, address, and identification, and inquire as to what the person was doing and why he or she was observed at a particular location. Officers will make wanted checks on suspicious persons that are stopped whenever possible. 4.3 Precautions Watch the suspect closely and make the suspect keep his or her hands in view at all times. If the officer believes that the person is armed, a frisk will be conducted before questioning Frisk the suspect from the rear with the suspect in a kneeling position, if possible. If the kneeling position is not feasible, then position the person utilizing a standing position. Instruct the person to spread his or her legs to a position that would require the use of a major muscle group for him or her to regain their balance, if the person decides to attack. When frisking, never pat or glide the hands over the suspect s body, but feel for weapons. The officer may wear latex gloves for protection against bodily fluids. Use the hands only, but avoid bodily contact as much as possible. Always stay alert for the possibility that the person will attack. Ask the suspect if he or she has anything on their person that can prick (needles) or cut (razors, knifes, etc.) prior to the pat-down Except in unusual situations, an officer will obtain assistance before making a stop of two or more persons After stopping a person and the officer finds that he or she has a legitimate reason for being at the location and the officer's suspicions have been satisfied, the officer will de-escalate the situation by courteously explaining what prompted the stop. Officers will tactfully alter the encounter into a less formal citizen contact and not detain the person any longer than necessary. 4.4 Field Interview/Contact Procedure Using ICIS If the stop and subsequent investigation do not result in the immediate arrest of the subject or in totally removing the officer's suspicions about the subject, the officer will document the contact on the Field Contact section of the Incident Crime Information System (ICIS). The officer will, by the end of his or her tour of duty, electronically submit all completed Field Contact information via ICIS, to the Server, or to the designated supervisor. The collected field contact information will be accessible for use by investigators and officers, in developing leads and establishing crime patterns. The Field Contact information is also useful as an official Department record of the field interview and the circumstances that prompted the officer to conduct it. Page 2 of 8

3 1. The Field Contact information data does not take the place of an incident report in any instance that requires an incident report. Information for an investigative unit concerning a specific case will be documented on an incident report. 2. After completing Part One: Main Personal Information (the subject s personal information and description) on the ICIS Field Contact, section, the officer should determine whether the person is wanted. If he or she is not wanted, it is not necessary to detain the subject any longer, as the remaining information is based on the officer's observations Completing the Field Contact Information (FCI) Section on ICIS via the Desktop Computer 1. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. 2. After the ICIS Main Menu is displayed, left-click on the Field Contact module. 3. Upon accessing the Field Contact module, enter the case number in the report/contact # field. Tab over to the Record Type box. Select the appropriate record type from the drop down list (i.e., Truancy Violator, Curfew Violator, Suspicious Person, etc). a. The following Record Types will be entered and submitted via the laptop or desktop computer, onto the ICIS Field Contact module, when appropriate and necessary: (1) Auto Theft (2) Sex Crimes (3) SIS Intelligence (4) Homeland Security (5) Larceny (6) Banishment (7) Alarm- Residence (8) Alarm- Business (9) Burglary (10) Transport to Gateway Center (11) Criminal Trespassing (12) Concerned Citizen (13) Criminal Trespass Warning (14) Gang Member (15) Curfew Violator Page 3 of 8

4 (16) Truancy Violator (17) Narcotics Related (18) Urban Camper (19) Robbery 4. After the appropriate record type is selected, Tab to the Last Name Box. The last name box is located under (Personal Information.) Complete all boxes in this section. a. Also complete the Last Contacted section, as indicated below: (1) DATE: Date of the interview. (2) TIME: Time of the interview. (3) CASE#: Re-enter the same case number in this box. (4) OFFICER ID: Put in your four (4) digit ID number then press the tab key. (5) RD: Is the Reporting district/beat where the interview took place. (6) LOCATION: Address where the interview took place. (a) (b) Fill out the BLDG/APT box if appropriate. Fill in the City, State, CITY and Zip Code box. 5. Select ADD. This will add the record. (Add is located at the bottom of the page in the center). 6. After add is selected, a box will appear. a. When the hour glass disappears, record added will display at the top of the record. 7. Complete all sections in tab #2 (Personal), including the sub tabs. a. Address (Person you are interviewing home address). b. Vehicle (Person you are interviewing vehicle information). c. Employer information (Person you are interviewing). d. School information ( Person you are interviewing). e. Military Information (Person you are interviewing). f. Appearance (Scars/Marks/Tattoos/Clothing is part of the appearance section). Page 4 of 8

5 g. AKAs (Which also includes date of birth s (DOB s) and Social Security numbers (SSN s). 8. After all tabs in the Personal section are completed, go to tab #4 (History/Narrative) and complete the Additional Narrative section. Note: Tab #4 (History / Narrative) must be completed. (See sections 4.4.1). 9. Once tab #4 is complete, to print a copy of your completed field interview form, select File (file is located at the top left of the page), Select Print Field Contact Report, then click Print. After printing, click Exit. 10. Select tab #6 (Workflow). Enter your (4) digit unique I.D. number then press the tab key. 11. Select UPDATE. (Update is located at the bottom center of the page). 12. Enter your password then select OK. This will send the completed Field Contact Information (FCI) to the server and automatically take you back to the ICIS main menu page. a. Use the same case number to complete additional field interview information for groups of people who are together. b. Remember, this is a field interview, an effective field interview requires an officer to complete all sections in its entirety (i.e., AKAs, Scars, Marks, Tattoos, Employment Information, Phone Number, etc) Acquiring and Printing Completed Field Contact Information from the ICIS Server 1. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. 2. After the ICIS Main Menu is displayed, left-click on the Field Contact module. 3. Enter the case number in the Report/Contact # field, and then select Search. 4. When the hour glass disappears, the Field Interview Contact Information will be displayed. 5. To print a copy of your completed field interview form, select File (file is located at the top left of the page), select Print Field Contact Report, and then click Print. After printing, click Exit Completing the Field Contact Information (FCI) Section on ICIS via the Lap Top Computer 1. Accessing the Field Contact Information System. a. Log onto the System and make sure the system shows Connected/Registered at the bottom left corner of the screen. b. If the System shows Not Connected/Not Registered, this means you are not connected with the message switch. Click on the X, which is located at the Top right corner of the screen. Page 5 of 8

6 c. Select the Start icon, and then select the PSSI Response. d. After the PSSI Response is selected, the system should show Connected/Registered. e. Click the Logon icon to log onto the system. (The Logon icon is located at the top left of the screen). f. After the Logon icon is clicked, this will take you to the User Log-On Window. Enter your Unit ID number in the unit ID box then tab into the Officer ID box. g. Enter your four (4) digit unique ID number in the Officer ID box, then tab into the password box. h. Enter your password in the password box then select Transmit or Enter. i. Once you have logged on to the system, an administrative message will appear in the Info/Message window. This message will be the greeting of the day or states currently signed on and show your unit number (The Info/Message window is located at the bottom of the screen). 2. Entering Field Contact Information onto the ICIS via the Laptop Computer. a. To initiate Field Contact Information, you must be dispatched to or pulled out with dispatch on a self initiated call. b. Click on the flashing CAD icon. This will take you to the RESPONSE CAD Data Center. c. Once the RESPONSE CAD Data center is displayed select the incident number or the street address that corresponds to the appropriate location to complete the Field Contact Information. d. After the incident number or the street address is selected, this will take you to the INCIDENT DISPATCH SCREEN. Select Draft report. (Draft report is located at the bottom center of the screen). e. After Draft report is selected, this will take you to the In-Field Report Selection screen. On the In-Field Report Selection screen, under Main Reports, select Field Contact. f. After Field Contact is selected, The ICIS icon will be flashing green. (The ICIS icon is located at the top left corner on the screen). g. Select the green flashing icon. h. After the green flashing icon is selected, your incident number (FCO) will now appear on the left side of the screen under the LOCAL File Folder. i. Select the incident number. After selecting the incident number, your Field Contact screen will display with the case number in the case# box. j. Tab over to the Record Type box. Select the appropriate record type from the drop down list (i.e., Truancy Violator, Curfew Violator, Suspicious Person, etc). Page 6 of 8

7 k. After the appropriate record type is selected, Use the tab key and tab to the Last Name Box Tab#1 (Person). Enter name and ID information for the field contact. l. After Tab#1 (Person) is completed, Select Tab#2 (Vehicle). Enter field contact s vehicle information if appropriate. m. After Tab#2 (Vehicle) is completed, Select Tab# 3 (Contact Info). Enter the date, location and any remarks pertaining to the contact. RD: the Reporting district where the interview took place. Populated by CADS. n. After tab#3 (Contact Info) is completed, Select tab 4 (Address).Enter address and employment/school information for the field contact. o. After tab# 4 (Address) is completed, Select tab# 5 (AKA). Enter Alias/Gang/Monikers. Remember to strike the insert button to enter the information into the grid. p. After tab# 5 (AKA) is completed, Select Tab# 6 (Appearance). Enter appearance and Scars/Marks/Tattoos/Clothing Description. Remember to strike the insert key to enter the data into grid. (1) Once all information is entered for each tab, check and save as a Draft. This is achieved by clicking the Transmit Draft icon. 2. Sending Field Contact Information to the ICIS Server via the Laptop Computer a. Retrieve the Draft Report from the In/Out Box by clicking on the (FCO) report number. This will drop a copy of the Draft FCO into the Reports folder. b. After the Draft FCO drops in the Reports folder, click on the FCO icon. Click on the sign (11) icon and enter your PASSWORD in the Auth Word block. c. After your password is entered, select OK. This will send the completed Field Contact Information to the server. 3. Printing Completed Field Contact Information from the ICIS Server a. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. b. After the ICIS Main Menu is displayed, left-click on the Field Contact module. c. Enter the case number in the report/contact # field, and then select Search. d. When the hour glass disappears, the Field Contact Information will be displayed. e. To print a copy of your completed field interview form, select File. (File is located at the top left of the page). f. Select Print Field Contact Report, and then click Print. After printing, click Exit. Page 7 of 8

8 5. DEFINITIONS 5.1 Desktop: A personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. 5.2 Laptop: A full featured portable computer. 5.3 PSSI (Public Safety Systems Incorporated): The vendor that produced the ICIS software used on the laptop and desktop computers, for dispatch, incident reports and accident reports. 5.4 Server: A computer server application, operating system, computer, or appliance. 6. CANCELLATIONS, issued April 15, REFERENCES May 19, 2015 Order in Calhoun, et al. v. Pennington, et al. 1:09-CV-3286-TCB Commission on Accreditation for Law Enforcement Agencies (CALEA), 5th Edition Standards and Page 8 of 8

Signature: Signed by ES Date Signed: 01/18/2019

Signature: Signed by ES Date Signed: 01/18/2019 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date January 18, 2019 Applicable To: All sworn employees Approval Authority: Chief Erika Shields Signature: Signed by ES Date

More information

Signature: Signed by GNT Date Signed: 5/26/2015

Signature: Signed by GNT Date Signed: 5/26/2015 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES Page 1 of4 [Administration] [Personnel] [General Operations] [Field Operations] [Criminal Investigations] [ Support Operations] [Special Orders] [Command Memo] [Library] [Search] [Home] Atlanta Police

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Personal. Name Last: First: Middle: City: State: Zip: Contact numbers Home ( ) - Work ( ) - Other ( ) - Cell ( ) -

Personal. Name Last: First: Middle: City: State: Zip: Contact numbers Home ( ) - Work ( ) - Other ( ) - Cell ( ) - Black Hawk Police Department Background Questionnaire Personal Name Last: First: Middle: Other names you have been known by: Address where you reside Street: Apt/unit/PO Box: City: State: Zip: Mailing

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District

Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District Member: Dave Wardell, VP Operations & Public Safety, Central Atlanta Progress Inc. 1. Security Executive Council Public/Private

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Federal Reserve Bank of Dallas

Federal Reserve Bank of Dallas ll K Federal Reserve Bank of Dallas July 12, 2000 DALLAS, TEXAS 75265-5906 Notice 2000-42 TO: The Chief Executive Officer of each financial institution and others concerned in the Eleventh Federal Reserve

More information

The Southern Baptist Theological Seminary IDENTITY THEFT RED FLAGS AND RESPONSE INSTRUCTIONS IDENTITY THEFT AND PREVENTION PROGRAM As of June 2010

The Southern Baptist Theological Seminary IDENTITY THEFT RED FLAGS AND RESPONSE INSTRUCTIONS IDENTITY THEFT AND PREVENTION PROGRAM As of June 2010 IDENTITY THEFT S AND As of June 2010 Suspicious Documents 1. An identification document or card that appears to be forged, altered or inauthentic 2. An identification document or card on which a person's

More information

CRIME ALERTS 2015 BALTIMORE COUNTY POLICE DEPARTMENT WANTED. Identity Sought

CRIME ALERTS 2015 BALTIMORE COUNTY POLICE DEPARTMENT WANTED. Identity Sought CRIME ALERTS 2015 BALTIMORE COUNTY POLICE DEPARTMENT WANTED Identity Sought On 11/20/2015 at 2330 hours, the above suspect entered into 2 separate (unlocked) Towson University Students apartments, located

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

On-Officer Body Camera Program

On-Officer Body Camera Program 1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October

More information

To Access Oracle: Access Oracle at: http://oraprod.district.aps:8051/oa_html/appslocallogin.jsp Enter your Username o Your Username is normally your First Initial, Middle, Full Last Name (For Example:

More information

STEP BY STEP HOW TO COMPLETE THE ELECTRONIC BGC FORM

STEP BY STEP HOW TO COMPLETE THE ELECTRONIC BGC FORM Human Resources Background Check Program backgroundchecks.hr.ncsu.edu 2711 Sullivan Drive, Admin Services II Raleigh, NC 27695 background-checks@ncsu.edu STEP BY STEP HOW TO COMPLETE THE ELECTRONIC BGC

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

CM26: Missing Child Report May 12, 2017

CM26: Missing Child Report May 12, 2017 CM26: Missing Child Report May 12, 2017 Topic Paper Page 1 of 56 Change History Release # or CR# or Change Description Author(s) Section Modified Date Incident # 10/23/2015 Updates resulting from Supported

More information

PREVENTION WEB CIVIL CITATION PROGRAM REGISTRATION WIZARD. A JJIS User Guide

PREVENTION WEB CIVIL CITATION PROGRAM REGISTRATION WIZARD. A JJIS User Guide PREVENTION WEB CIVIL CITATION PROGRAM REGISTRATION WIZARD A JJIS User Guide Table of Contents Overview... 2 Logging in to Prevention Web... 2 Program Registration Wizard Youth Search... 3 Program Registration

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

eschoolplus+ Behavior (Discipline) Training Guide

eschoolplus+ Behavior (Discipline) Training Guide eschoolplus+ Version 4.0 July 2018 Arkansas Public School Computer Network This page intentionally left blank Page 2 of 77 Table of Contents Discipline Overview... 5 Behavior (Discipline) Widget... 6 Behavior

More information

POLICE APPLICANT BACKGROUND PACKAGE

POLICE APPLICANT BACKGROUND PACKAGE POLICE APPLICANT BACKGROUND PACKAGE Dear Police Applicant: Enclosed please find three documents that must be completed, signed, and submitted to the Internal Affairs Unit by in order to facilitate a prompt

More information

PREPARATION GUIDELINES FOR SUSPICIOUS ACTIVITY REPORT FORM (SAR) August 2001

PREPARATION GUIDELINES FOR SUSPICIOUS ACTIVITY REPORT FORM (SAR) August 2001 Banking Commission P.O. Box D Majuro, Marshall Islands 96960 Phone: (692) 625-6310 Fax: (692) 625-6309 e-mail: bankcom@ntamar.com PREPARATION GUIDELINES FOR SUSPICIOUS ACTIVITY REPORT FORM (SAR) August

More information

ADVANCE User Manual. Center for Advanced Public Safety

ADVANCE User Manual. Center for Advanced Public Safety ADVANCE User Manual Sponsored by: Alabama Department of Public Safety Alabama Administrative Office of the Courts Alabama Department of Economic and Community Affairs Federal Motor Carrier Safety Administration

More information

Innovative Policing in the 21 st Century Orlando Police Department February 2010

Innovative Policing in the 21 st Century Orlando Police Department February 2010 Innovative Policing in the 21 st Century Orlando Police Department February 2010 OPD Technology Committee Committee was created drawing members from all areas of the Police Department and members of Technology

More information

ServicePoint June, 2011

ServicePoint June, 2011 ServicePoint 5.4.1 June, 2011 Table of Contents Workflow for ServicePoint... 3 Introduction... 4 Logon to ServicePoint... 4 Key Features of the Home Screen... 5 Searching for an Existing Client... 7 Adding

More information

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of

More information

Identity Theft Policies and Procedures

Identity Theft Policies and Procedures Identity Theft Policies and Procedures Davis & Wehrle, LLC 1104 S. Mays, Suite 105 Round Rock, TX 78664-6700 United States (512) 346-1131 Davis & Wehrle Identity Theft Policies & Procedures September 2017

More information

Firefighter Observation Report

Firefighter Observation Report DeKalb County Fire Department Exhibit 47 Firefighter Observation Report (Supplemental Report Required for Investigations) Date of Incident: Location of the fire scene: GPS coordinates of the scene: N:

More information

RUSSELL BOHSE.

RUSSELL BOHSE. RUSSELL BOHSE Peekinv@aol.com Peekinv@aol.com Professional Summary Fire Investigator offering over 30 years of both public and private investigation experience specializing in origin and cause and case

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

3 rd Party Certification of Compliance with MA: 201 CMR 17.00 3 rd Party Certification of Compliance with MA: 201 CMR 17.00 The purpose of this document is to certify the compliance of Strategic Information Resources with 201 CMR 17.00. This law protects the sensitive

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary. MEAD Number:

Washington Metropolitan Area Transit Authority Board Action/Information Summary. MEAD Number: Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 102948 Resolution: Yes No TITLE Metro Transit Police Department Third Quarter Security Report

More information

Cleburne, Texas Johnson County Seat 35 Square Miles 4 Police Districts 54 Sworn Officers $7.75 Million Police Budget

Cleburne, Texas Johnson County Seat 35 Square Miles 4 Police Districts 54 Sworn Officers $7.75 Million Police Budget Cleburne, Texas Johnson County Seat 35 Square Miles 4 Police Districts 54 Sworn Officers $7.75 Million Police Budget Preparing for Growth 102 Square Miles in Cleburne s ETJ May 2014: CTP - Cleburne & Fort

More information

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME CITYWIDE Part I Crime 25-214 14 vs 5 14 vs 13 Total Part I Crime 14952 135985 129263 127374 11831 111188 16375 1625 12368 1779 16 14 12 1 8 6 4 2 14 vs 5 14 vs 13 Total Violent Crimes 14 vs 5 Total Property

More information

Oracle Financial Services Regulatory Reporting User Guide MY STR. Release 2.4 October 2013

Oracle Financial Services Regulatory Reporting User Guide MY STR. Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide MY STR Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide MY STR Release 2.4 October 2013 Document Control Number:

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION

More information

HOW TO COMPLETE YOUR ONLINE BACKGROUND CHECK SUBMISSION

HOW TO COMPLETE YOUR ONLINE BACKGROUND CHECK SUBMISSION HOW TO COMPLETE YOUR ONLINE BACKGROUND CHECK SUBMISSION COMPLETING A BACKGROUND CHECK FOR UNC-CHAPEL HILL Please follow the guide below. If you are still in need of assistance, please contact the UNC-Chapel

More information

JMS User. Version

JMS User. Version JMS User Version 11.4.0.600 Table of Contents Booking Menu... 5 Inmate Booking: Person... 5 Projected Release Date... 6 Gangs... 6 Pre-Book... 6 Biometric... 6 ID # Search... 7 Detail Search... 7 Clear...

More information

State of Michigan Sex Offender Procedures for OffenderWatch : Importing and setting up an initial Verification Cycle for newly released offenders

State of Michigan Sex Offender Procedures for OffenderWatch : Importing and setting up an initial Verification Cycle for newly released offenders State of Michigan Sex Offender Procedures for OffenderWatch : Importing and setting up an initial Verification Cycle for newly released offenders After logging in to OffenderWatch, clicking Offender Search

More information

Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities

Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Issue Date: March 13, 2019 1 Table of Contents Overview of the Child Care Criminal Background Check

More information

FREQUENTLY ASKED COPLINK QUESTIONS

FREQUENTLY ASKED COPLINK QUESTIONS FREQUENTLY ASKED COPLINK QUESTIONS What is the Basic Search process in COPLINK? If you are new to COPLINK, the idea of doing a database search may be confusing. Part of the problem is that there are many

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities

Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Issue Date: March 5, 2018 Table of Contents Overview of Changes 3 New Child Care Criminal Background

More information

GUARDIAN PROFESSIONAL SECURITY

GUARDIAN PROFESSIONAL SECURITY EMPLOYMENT APPLICATION LEGAL NAME: LAST, SUFFIX FIRST MIDDLE RESIDENCE ADDRESS CITY COUNTY STATE ZIP CODE RESIDENCE TELEPHONE (INCLUDE AREA CODE) CELL PHONE SOCIAL SECURITY NUMBER DRIVERS LICENSE #, STATE,

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

FY ICMA Benchmarking Results

FY ICMA Benchmarking Results FY 2010-11 ICMA Benchmarking Results DALLAS FIRE - RESCUE DEPARTMENT DALLAS POLICE DEPARTMENT Public Safety Committee Briefing ICMA Center for Performance Measurement History Center for Performance Measurement

More information

PENN MANOR SCHOOL DISTRICT

PENN MANOR SCHOOL DISTRICT No. 815.2 SECTION: OPERATIONS PENN MANOR SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: August 19, 2013 REVISED: April 20, 2015 815.2. DISTRICT-ISSUED

More information

IBR_Plus CAD Frequently Asked Questions

IBR_Plus CAD Frequently Asked Questions IBR_Plus CAD Frequently Asked Questions 1. What does the satellite that pulls up Channels mean? What is its purpose? The channel button on a call will allow you to reference the radio channels you used

More information

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and

More information

Basic Configuration Training Guide Part 1

Basic Configuration Training Guide Part 1 Basic Configuration Training Guide Part 1 Welcome to the AmbuPro EMS Basic Configuration Training Program, Part 1. This course is intended for any users of the system who will be regularly adding and altering

More information

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3 Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

CONTROL ROOM SOFTWARE

CONTROL ROOM SOFTWARE CONTROL ROOM SOFTWARE Starting QTWatch... Main screen... Control Monitor Screen... Action page... Site Map page... Standard Operations page... Handling calls on Actions... How to log a manual/remote call...

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Removable Storage Media Security Standard This standard is applicable to all VCU School of Medicine personnel.

More information

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you

More information

WELLSBORO AREA SCHOOL DISTRICT

WELLSBORO AREA SCHOOL DISTRICT No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED

More information

How Do I Guide. How do I

How Do I Guide. How do I Flloriida Safe Famiilliies Network How Do I Guide How do I CREATE A MISSING CHILD REPORT...2 CHILD INFORMATION...2 ALERT TYPE...2 CALLER/LAW ENFORCEMENT...3 NARRATIVE...3 COMPANION/...4 ABDUCTOR INFORMATION

More information

Bellingham Police Volunteer Group Application

Bellingham Police Volunteer Group Application Bellingham Police Volunteer Group Application Deliver Application to: Scott Hendrickson Volunteer Coordinator Bellingham Police Department 505 Grand Avenue Bellingham, WA 98225 sbhendrickson@cob.org 360.778.8633

More information

Incident Reporting in Directline. For Internal Use Only Not to be distributed outside of Goodwill Industries of Arkansas.

Incident Reporting in Directline. For Internal Use Only Not to be distributed outside of Goodwill Industries of Arkansas. Incident Reporting in Directline For Internal Use Only Not to be distributed outside of Goodwill Industries of Arkansas. Who performs this task? Store Managers with Directline access. What does this document

More information

Outside Interests Disclosure Form for Staff. IRIS Mobile through the Web

Outside Interests Disclosure Form for Staff. IRIS Mobile through the Web Outside Interests Disclosure Form for Staff IRIS Mobile through the Web The Outside Interests Disclosure Form is for the University of Tennessee faculty and staff to disclose outside interests as required

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

How to Handle Special Circumstances That Corrections Test Administrators Face. Mellissa Hultstrand & Heath Stevenson July 2018

How to Handle Special Circumstances That Corrections Test Administrators Face. Mellissa Hultstrand & Heath Stevenson July 2018 How to Handle Special Circumstances That Corrections Test Administrators Face Mellissa Hultstrand & Heath Stevenson July 2018 Readiness to Test 2 When should we test? Completion of coursework may not be

More information

Application User Manual

Application User Manual Application User Manual E-Citatio Training Center for Advanced Public Safety Computer Science Department The University of Alabama http://caps.ua.edu Date revised: 3/5/2015 TABLE OF CONTENTS Table of Contents...

More information

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011

CITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011 CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

ivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016

ivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016 ivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016 Contents What is ivisions?... 2 Registering to ivisions Portal... 3 Logging into the

More information

Police Department About the Police Department

Police Department About the Police Department About the The Wheat Ridge is a full service suburban police department organized under two major divisions: Patrol Operations and Support Services. The key public safety services provided to citizens and

More information

Florida Safe Families Network Multi-Topic Basics How Do I Guide

Florida Safe Families Network Multi-Topic Basics How Do I Guide Florida Safe Families Network How Do I Guide May 12, 2017 The Florida Safe Families Network () How Do I Guide helps you understand the steps to complete your work in the system. It is a desk reference

More information

How to use the Rand McNally Driver Portal

How to use the Rand McNally Driver Portal How to use the Rand McNally Driver Portal 1 Updated 8/12/15 How to use the Rand McNally Driver Portal The Rand McNally Driver Portal may be used to create, edit, and certify hours of service logs (or time

More information

SOLUTION BRIEF. Video Changes the Future of Policing

SOLUTION BRIEF. Video Changes the Future of Policing SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to

More information

EPAF User Guide. Your guide for navigating the EPAF System

EPAF User Guide. Your guide for navigating the EPAF System EPAF User Guide Your guide for navigating the EPAF System This booklet outlines the use of Electronic Personnel Action Forms in the Banner Web for Employees. Office of Human Resources 02/08/2013 Frequently

More information

Client Track Agency Administration

Client Track Agency Administration Last updated 12/14/2012 Client Track Agency Administration Instructions and help for Agency Administrators Using Client Track In this document: Basic Role of Agency Admin User and Password Management Information

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

Oracle Financial Services Regulatory Reporting User Guide SG STR. Release 2.4 October 2013

Oracle Financial Services Regulatory Reporting User Guide SG STR. Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide SG STR Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide SG STR Release 2.4 October 2013 Document Control Number:

More information

PURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor needed to purchase goods and services.

PURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor needed to purchase goods and services. Training Manual 1 REQUISITION: Item necessary to initiate the procurement of all goods and services PURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

An introduction. UK National Intelligence Model. Intelligence-led crime reduction

An introduction. UK National Intelligence Model. Intelligence-led crime reduction Hot Times, Hot Places and Crime: Understanding More About Crime Hotspots Jerry Ratcliffe www.jratcliffe.net jhr@temple.edu An introduction 11 years Metropolitan Police Patrol, intelligence, diplomatic

More information

FirePoint 8. Setup & Quick Tour

FirePoint 8. Setup & Quick Tour FirePoint 8 Setup & Quick Tour Records Management System Copyright (C), 2006 End2End, Inc. End2End, Inc. 6366 Commerce Blvd #330 Rohnert Park, CA 94928 PLEASE READ THIS LICENSE AND DISCLAIMER OF WARRANTY

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon

Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April 2008 June E. Martin Raytheon 1 Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop Acknowledgement

More information

Legistar Administration Guide

Legistar Administration Guide Legistar Administration Guide Legistar Administration Use Legistar Administration to configure the settings in your Legistar database. We've organized the Administration topics as follows: Legistar Administration

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

STAFF REPORT. Evaluate the Use of Body Cameras

STAFF REPORT. Evaluate the Use of Body Cameras F, STAFF REPORT Meeting Date: April 21, 2015 To: Honorable Mayor & City Council From: Michael Hill, Police Lieutenant \\.M Subject: Update on the Police Department s Pilot Program to Test and Attachments:

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

DEPARTMENT OF ELDER AFFAIRS PROGRAMS AND SERVICES HANDBOOK APPENDIX E. Background Screening Clearinghouse Instructions

DEPARTMENT OF ELDER AFFAIRS PROGRAMS AND SERVICES HANDBOOK APPENDIX E. Background Screening Clearinghouse Instructions APPENDIX E Background Screening Clearinghouse Instructions Introduction/Requirements Introduction All Applicants who meet the Direct Service Provider definition are required to complete a Level 2 screening

More information

Rio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION

Rio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION Rio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION Rio Salado College, a Maricopa County Community College in Tempe, Arizona, is proud

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Technology That Has Your Back

Technology That Has Your Back SOLUTION BRIEF Technology That Has Your Back Motorola s PremierOne Mobile application and MW810 Mobile Workstation are trusted law enforcement partners that provide real-time information access, accurate

More information

New Student Form Registration Online Parent Guide. McMinnville School District

New Student Form Registration Online Parent Guide. McMinnville School District New Student Form Registration Online Parent Guide McMinnville School District 2016-17 Steps for Enrollment Online Process 1. Create an e-mail account if you do not have one. Create an e-mail account if

More information