Signature: Signed by GNT Date Signed: 5/29/15
|
|
- Samuel Chase
- 5 years ago
- Views:
Transcription
1 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Applicable To: All sworn employees Approval Authority: Chief George N. Turner Signature: Signed by GNT Date Signed: 5/29/15 Table of Content 1. PURPOSE 1 2. POLICY 1 3. RESPONSIBILITIES 1 4. ACTION Stops Checks Precautions Field Interview/Contact Procedure Using ICIS Completing (FCI) on ICIS via the Computer Acquiring & Printing (FCI) from the ICIS Server Completing the (FCI) on ICIS via the Lap Top 5 5. DEFINITIONS 8 6. CANCELLATIONS 8 7. REFERENCES 8 1. PURPOSE 2. POLICY To establish procedures and guidelines for an active approach to the reduction of suppressible crimes, such as pedestrian robbery, residential burglaries, and larceny, by encouraging officers to contact, identify, and document encounters with suspicious persons and vehicles. The field interview process is intended to increase patrol visibility, and remove the anonymity of potential criminals, thereby reducing suppressible crimes. 3. RESPONSIBILITIES 3.1 Section and unit commanders will monitor the field interview process. 3.2 Supervisors will ensure that officers comply with this directive. 3.3 Officers and investigators will use field interviews to identify and document encounters with suspicious persons and vehicles. 3.4 PRAU will contact the City of Atlanta Department of Law prior to making any revisions, amendments, or deletions in this Standard Operating Procedure. 4. ACTION 4.1 Stops Officers may detain an individual only when they have reasonable articulable suspicion that the individual is involved in criminal activity. If, following the stop, the officer reasonably believes that the person is both armed and presently dangerous, the officer may frisk for weapons. Form APD-700, revised 2/04
2 *This Subsection, 4.1.1, may not be deleted, revised, or amended pursuant to the May 19, 2015 Order in Calhoun, et al. v. Pennington, et al. 1:09-CV-3286-TCB. Consult the City of Atlanta Department of Law with any questions or concerns.* Before an officer stops a suspicious person, the officer will pull out of service with the dispatcher and give the following information: location, number of persons, sex, race, approximate age, and clothing description. Avoid making stops in a crowd When making stops at night, direct the vehicle lights, spotlights, or flashlight on the subject(s). 4.2 Checks After the person has been frisked, if necessary, the officer will obtain the person's name, date of birth, address, and identification, and inquire as to what the person was doing and why he or she was observed at a particular location. Officers will make wanted checks on suspicious persons that are stopped whenever possible. 4.3 Precautions Watch the suspect closely and make the suspect keep his or her hands in view at all times. If the officer believes that the person is armed, a frisk will be conducted before questioning Frisk the suspect from the rear with the suspect in a kneeling position, if possible. If the kneeling position is not feasible, then position the person utilizing a standing position. Instruct the person to spread his or her legs to a position that would require the use of a major muscle group for him or her to regain their balance, if the person decides to attack. When frisking, never pat or glide the hands over the suspect s body, but feel for weapons. The officer may wear latex gloves for protection against bodily fluids. Use the hands only, but avoid bodily contact as much as possible. Always stay alert for the possibility that the person will attack. Ask the suspect if he or she has anything on their person that can prick (needles) or cut (razors, knifes, etc.) prior to the pat-down Except in unusual situations, an officer will obtain assistance before making a stop of two or more persons After stopping a person and the officer finds that he or she has a legitimate reason for being at the location and the officer's suspicions have been satisfied, the officer will de-escalate the situation by courteously explaining what prompted the stop. Officers will tactfully alter the encounter into a less formal citizen contact and not detain the person any longer than necessary. 4.4 Field Interview/Contact Procedure Using ICIS If the stop and subsequent investigation do not result in the immediate arrest of the subject or in totally removing the officer's suspicions about the subject, the officer will document the contact on the Field Contact section of the Incident Crime Information System (ICIS). The officer will, by the end of his or her tour of duty, electronically submit all completed Field Contact information via ICIS, to the Server, or to the designated supervisor. The collected field contact information will be accessible for use by investigators and officers, in developing leads and establishing crime patterns. The Field Contact information is also useful as an official Department record of the field interview and the circumstances that prompted the officer to conduct it. Page 2 of 8
3 1. The Field Contact information data does not take the place of an incident report in any instance that requires an incident report. Information for an investigative unit concerning a specific case will be documented on an incident report. 2. After completing Part One: Main Personal Information (the subject s personal information and description) on the ICIS Field Contact, section, the officer should determine whether the person is wanted. If he or she is not wanted, it is not necessary to detain the subject any longer, as the remaining information is based on the officer's observations Completing the Field Contact Information (FCI) Section on ICIS via the Desktop Computer 1. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. 2. After the ICIS Main Menu is displayed, left-click on the Field Contact module. 3. Upon accessing the Field Contact module, enter the case number in the report/contact # field. Tab over to the Record Type box. Select the appropriate record type from the drop down list (i.e., Truancy Violator, Curfew Violator, Suspicious Person, etc). a. The following Record Types will be entered and submitted via the laptop or desktop computer, onto the ICIS Field Contact module, when appropriate and necessary: (1) Auto Theft (2) Sex Crimes (3) SIS Intelligence (4) Homeland Security (5) Larceny (6) Banishment (7) Alarm- Residence (8) Alarm- Business (9) Burglary (10) Transport to Gateway Center (11) Criminal Trespassing (12) Concerned Citizen (13) Criminal Trespass Warning (14) Gang Member (15) Curfew Violator Page 3 of 8
4 (16) Truancy Violator (17) Narcotics Related (18) Urban Camper (19) Robbery 4. After the appropriate record type is selected, Tab to the Last Name Box. The last name box is located under (Personal Information.) Complete all boxes in this section. a. Also complete the Last Contacted section, as indicated below: (1) DATE: Date of the interview. (2) TIME: Time of the interview. (3) CASE#: Re-enter the same case number in this box. (4) OFFICER ID: Put in your four (4) digit ID number then press the tab key. (5) RD: Is the Reporting district/beat where the interview took place. (6) LOCATION: Address where the interview took place. (a) (b) Fill out the BLDG/APT box if appropriate. Fill in the City, State, CITY and Zip Code box. 5. Select ADD. This will add the record. (Add is located at the bottom of the page in the center). 6. After add is selected, a box will appear. a. When the hour glass disappears, record added will display at the top of the record. 7. Complete all sections in tab #2 (Personal), including the sub tabs. a. Address (Person you are interviewing home address). b. Vehicle (Person you are interviewing vehicle information). c. Employer information (Person you are interviewing). d. School information ( Person you are interviewing). e. Military Information (Person you are interviewing). f. Appearance (Scars/Marks/Tattoos/Clothing is part of the appearance section). Page 4 of 8
5 g. AKAs (Which also includes date of birth s (DOB s) and Social Security numbers (SSN s). 8. After all tabs in the Personal section are completed, go to tab #4 (History/Narrative) and complete the Additional Narrative section. Note: Tab #4 (History / Narrative) must be completed. (See sections 4.4.1). 9. Once tab #4 is complete, to print a copy of your completed field interview form, select File (file is located at the top left of the page), Select Print Field Contact Report, then click Print. After printing, click Exit. 10. Select tab #6 (Workflow). Enter your (4) digit unique I.D. number then press the tab key. 11. Select UPDATE. (Update is located at the bottom center of the page). 12. Enter your password then select OK. This will send the completed Field Contact Information (FCI) to the server and automatically take you back to the ICIS main menu page. a. Use the same case number to complete additional field interview information for groups of people who are together. b. Remember, this is a field interview, an effective field interview requires an officer to complete all sections in its entirety (i.e., AKAs, Scars, Marks, Tattoos, Employment Information, Phone Number, etc) Acquiring and Printing Completed Field Contact Information from the ICIS Server 1. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. 2. After the ICIS Main Menu is displayed, left-click on the Field Contact module. 3. Enter the case number in the Report/Contact # field, and then select Search. 4. When the hour glass disappears, the Field Interview Contact Information will be displayed. 5. To print a copy of your completed field interview form, select File (file is located at the top left of the page), select Print Field Contact Report, and then click Print. After printing, click Exit Completing the Field Contact Information (FCI) Section on ICIS via the Lap Top Computer 1. Accessing the Field Contact Information System. a. Log onto the System and make sure the system shows Connected/Registered at the bottom left corner of the screen. b. If the System shows Not Connected/Not Registered, this means you are not connected with the message switch. Click on the X, which is located at the Top right corner of the screen. Page 5 of 8
6 c. Select the Start icon, and then select the PSSI Response. d. After the PSSI Response is selected, the system should show Connected/Registered. e. Click the Logon icon to log onto the system. (The Logon icon is located at the top left of the screen). f. After the Logon icon is clicked, this will take you to the User Log-On Window. Enter your Unit ID number in the unit ID box then tab into the Officer ID box. g. Enter your four (4) digit unique ID number in the Officer ID box, then tab into the password box. h. Enter your password in the password box then select Transmit or Enter. i. Once you have logged on to the system, an administrative message will appear in the Info/Message window. This message will be the greeting of the day or states currently signed on and show your unit number (The Info/Message window is located at the bottom of the screen). 2. Entering Field Contact Information onto the ICIS via the Laptop Computer. a. To initiate Field Contact Information, you must be dispatched to or pulled out with dispatch on a self initiated call. b. Click on the flashing CAD icon. This will take you to the RESPONSE CAD Data Center. c. Once the RESPONSE CAD Data center is displayed select the incident number or the street address that corresponds to the appropriate location to complete the Field Contact Information. d. After the incident number or the street address is selected, this will take you to the INCIDENT DISPATCH SCREEN. Select Draft report. (Draft report is located at the bottom center of the screen). e. After Draft report is selected, this will take you to the In-Field Report Selection screen. On the In-Field Report Selection screen, under Main Reports, select Field Contact. f. After Field Contact is selected, The ICIS icon will be flashing green. (The ICIS icon is located at the top left corner on the screen). g. Select the green flashing icon. h. After the green flashing icon is selected, your incident number (FCO) will now appear on the left side of the screen under the LOCAL File Folder. i. Select the incident number. After selecting the incident number, your Field Contact screen will display with the case number in the case# box. j. Tab over to the Record Type box. Select the appropriate record type from the drop down list (i.e., Truancy Violator, Curfew Violator, Suspicious Person, etc). Page 6 of 8
7 k. After the appropriate record type is selected, Use the tab key and tab to the Last Name Box Tab#1 (Person). Enter name and ID information for the field contact. l. After Tab#1 (Person) is completed, Select Tab#2 (Vehicle). Enter field contact s vehicle information if appropriate. m. After Tab#2 (Vehicle) is completed, Select Tab# 3 (Contact Info). Enter the date, location and any remarks pertaining to the contact. RD: the Reporting district where the interview took place. Populated by CADS. n. After tab#3 (Contact Info) is completed, Select tab 4 (Address).Enter address and employment/school information for the field contact. o. After tab# 4 (Address) is completed, Select tab# 5 (AKA). Enter Alias/Gang/Monikers. Remember to strike the insert button to enter the information into the grid. p. After tab# 5 (AKA) is completed, Select Tab# 6 (Appearance). Enter appearance and Scars/Marks/Tattoos/Clothing Description. Remember to strike the insert key to enter the data into grid. (1) Once all information is entered for each tab, check and save as a Draft. This is achieved by clicking the Transmit Draft icon. 2. Sending Field Contact Information to the ICIS Server via the Laptop Computer a. Retrieve the Draft Report from the In/Out Box by clicking on the (FCO) report number. This will drop a copy of the Draft FCO into the Reports folder. b. After the Draft FCO drops in the Reports folder, click on the FCO icon. Click on the sign (11) icon and enter your PASSWORD in the Auth Word block. c. After your password is entered, select OK. This will send the completed Field Contact Information to the server. 3. Printing Completed Field Contact Information from the ICIS Server a. Sign onto the ICIS program using your user ID number and password, press the ENTER KEY. b. After the ICIS Main Menu is displayed, left-click on the Field Contact module. c. Enter the case number in the report/contact # field, and then select Search. d. When the hour glass disappears, the Field Contact Information will be displayed. e. To print a copy of your completed field interview form, select File. (File is located at the top left of the page). f. Select Print Field Contact Report, and then click Print. After printing, click Exit. Page 7 of 8
8 5. DEFINITIONS 5.1 Desktop: A personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. 5.2 Laptop: A full featured portable computer. 5.3 PSSI (Public Safety Systems Incorporated): The vendor that produced the ICIS software used on the laptop and desktop computers, for dispatch, incident reports and accident reports. 5.4 Server: A computer server application, operating system, computer, or appliance. 6. CANCELLATIONS, issued April 15, REFERENCES May 19, 2015 Order in Calhoun, et al. v. Pennington, et al. 1:09-CV-3286-TCB Commission on Accreditation for Law Enforcement Agencies (CALEA), 5th Edition Standards and Page 8 of 8
Signature: Signed by ES Date Signed: 01/18/2019
Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date January 18, 2019 Applicable To: All sworn employees Approval Authority: Chief Erika Shields Signature: Signed by ES Date
More informationSignature: Signed by GNT Date Signed: 5/26/2015
Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner
More informationPasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:
CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function
More informationAudio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES
Page 1 of4 [Administration] [Personnel] [General Operations] [Field Operations] [Criminal Investigations] [ Support Operations] [Special Orders] [Command Memo] [Library] [Search] [Home] Atlanta Police
More informationRed Flag Policy and Identity Theft Prevention Program
Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible
More informationPersonal. Name Last: First: Middle: City: State: Zip: Contact numbers Home ( ) - Work ( ) - Other ( ) - Cell ( ) -
Black Hawk Police Department Background Questionnaire Personal Name Last: First: Middle: Other names you have been known by: Address where you reside Street: Apt/unit/PO Box: City: State: Zip: Mailing
More information( Utility Name ) Identity Theft Prevention Program
***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.
More informationSpotlight on Public/Private Initiatives The Atlanta Downtown Improvement District
Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District Member: Dave Wardell, VP Operations & Public Safety, Central Atlanta Progress Inc. 1. Security Executive Council Public/Private
More informationThe City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.
Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV
More informationFederal Reserve Bank of Dallas
ll K Federal Reserve Bank of Dallas July 12, 2000 DALLAS, TEXAS 75265-5906 Notice 2000-42 TO: The Chief Executive Officer of each financial institution and others concerned in the Eleventh Federal Reserve
More informationThe Southern Baptist Theological Seminary IDENTITY THEFT RED FLAGS AND RESPONSE INSTRUCTIONS IDENTITY THEFT AND PREVENTION PROGRAM As of June 2010
IDENTITY THEFT S AND As of June 2010 Suspicious Documents 1. An identification document or card that appears to be forged, altered or inauthentic 2. An identification document or card on which a person's
More informationCRIME ALERTS 2015 BALTIMORE COUNTY POLICE DEPARTMENT WANTED. Identity Sought
CRIME ALERTS 2015 BALTIMORE COUNTY POLICE DEPARTMENT WANTED Identity Sought On 11/20/2015 at 2330 hours, the above suspect entered into 2 separate (unlocked) Towson University Students apartments, located
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationOn-Officer Body Camera Program
1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October
More informationTo Access Oracle: Access Oracle at: http://oraprod.district.aps:8051/oa_html/appslocallogin.jsp Enter your Username o Your Username is normally your First Initial, Middle, Full Last Name (For Example:
More informationSTEP BY STEP HOW TO COMPLETE THE ELECTRONIC BGC FORM
Human Resources Background Check Program backgroundchecks.hr.ncsu.edu 2711 Sullivan Drive, Admin Services II Raleigh, NC 27695 background-checks@ncsu.edu STEP BY STEP HOW TO COMPLETE THE ELECTRONIC BGC
More informationIDENTITY THEFT PREVENTION Policy Statement
Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy
More informationCM26: Missing Child Report May 12, 2017
CM26: Missing Child Report May 12, 2017 Topic Paper Page 1 of 56 Change History Release # or CR# or Change Description Author(s) Section Modified Date Incident # 10/23/2015 Updates resulting from Supported
More informationPREVENTION WEB CIVIL CITATION PROGRAM REGISTRATION WIZARD. A JJIS User Guide
PREVENTION WEB CIVIL CITATION PROGRAM REGISTRATION WIZARD A JJIS User Guide Table of Contents Overview... 2 Logging in to Prevention Web... 2 Program Registration Wizard Youth Search... 3 Program Registration
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationeschoolplus+ Behavior (Discipline) Training Guide
eschoolplus+ Version 4.0 July 2018 Arkansas Public School Computer Network This page intentionally left blank Page 2 of 77 Table of Contents Discipline Overview... 5 Behavior (Discipline) Widget... 6 Behavior
More informationPOLICE APPLICANT BACKGROUND PACKAGE
POLICE APPLICANT BACKGROUND PACKAGE Dear Police Applicant: Enclosed please find three documents that must be completed, signed, and submitted to the Internal Affairs Unit by in order to facilitate a prompt
More informationPREPARATION GUIDELINES FOR SUSPICIOUS ACTIVITY REPORT FORM (SAR) August 2001
Banking Commission P.O. Box D Majuro, Marshall Islands 96960 Phone: (692) 625-6310 Fax: (692) 625-6309 e-mail: bankcom@ntamar.com PREPARATION GUIDELINES FOR SUSPICIOUS ACTIVITY REPORT FORM (SAR) August
More informationADVANCE User Manual. Center for Advanced Public Safety
ADVANCE User Manual Sponsored by: Alabama Department of Public Safety Alabama Administrative Office of the Courts Alabama Department of Economic and Community Affairs Federal Motor Carrier Safety Administration
More informationInnovative Policing in the 21 st Century Orlando Police Department February 2010
Innovative Policing in the 21 st Century Orlando Police Department February 2010 OPD Technology Committee Committee was created drawing members from all areas of the Police Department and members of Technology
More informationServicePoint June, 2011
ServicePoint 5.4.1 June, 2011 Table of Contents Workflow for ServicePoint... 3 Introduction... 4 Logon to ServicePoint... 4 Key Features of the Home Screen... 5 Searching for an Existing Client... 7 Adding
More informationColorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List
Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of
More informationIdentity Theft Policies and Procedures
Identity Theft Policies and Procedures Davis & Wehrle, LLC 1104 S. Mays, Suite 105 Round Rock, TX 78664-6700 United States (512) 346-1131 Davis & Wehrle Identity Theft Policies & Procedures September 2017
More informationFirefighter Observation Report
DeKalb County Fire Department Exhibit 47 Firefighter Observation Report (Supplemental Report Required for Investigations) Date of Incident: Location of the fire scene: GPS coordinates of the scene: N:
More informationRUSSELL BOHSE.
RUSSELL BOHSE Peekinv@aol.com Peekinv@aol.com Professional Summary Fire Investigator offering over 30 years of both public and private investigation experience specializing in origin and cause and case
More informationSTOCKTON UNIVERSITY PROCEDURE DEFINITIONS
STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More information[Utility Name] Identity Theft Prevention Program
[Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed
More information3 rd Party Certification of Compliance with MA: 201 CMR 17.00
3 rd Party Certification of Compliance with MA: 201 CMR 17.00 The purpose of this document is to certify the compliance of Strategic Information Resources with 201 CMR 17.00. This law protects the sensitive
More informationOuachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary. MEAD Number:
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 102948 Resolution: Yes No TITLE Metro Transit Police Department Third Quarter Security Report
More informationCleburne, Texas Johnson County Seat 35 Square Miles 4 Police Districts 54 Sworn Officers $7.75 Million Police Budget
Cleburne, Texas Johnson County Seat 35 Square Miles 4 Police Districts 54 Sworn Officers $7.75 Million Police Budget Preparing for Growth 102 Square Miles in Cleburne s ETJ May 2014: CTP - Cleburne & Fort
More informationCITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME
CITYWIDE Part I Crime 25-214 14 vs 5 14 vs 13 Total Part I Crime 14952 135985 129263 127374 11831 111188 16375 1625 12368 1779 16 14 12 1 8 6 4 2 14 vs 5 14 vs 13 Total Violent Crimes 14 vs 5 Total Property
More informationOracle Financial Services Regulatory Reporting User Guide MY STR. Release 2.4 October 2013
Oracle Financial Services Regulatory Reporting User Guide MY STR Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide MY STR Release 2.4 October 2013 Document Control Number:
More informationGENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION
More informationHOW TO COMPLETE YOUR ONLINE BACKGROUND CHECK SUBMISSION
HOW TO COMPLETE YOUR ONLINE BACKGROUND CHECK SUBMISSION COMPLETING A BACKGROUND CHECK FOR UNC-CHAPEL HILL Please follow the guide below. If you are still in need of assistance, please contact the UNC-Chapel
More informationJMS User. Version
JMS User Version 11.4.0.600 Table of Contents Booking Menu... 5 Inmate Booking: Person... 5 Projected Release Date... 6 Gangs... 6 Pre-Book... 6 Biometric... 6 ID # Search... 7 Detail Search... 7 Clear...
More informationState of Michigan Sex Offender Procedures for OffenderWatch : Importing and setting up an initial Verification Cycle for newly released offenders
State of Michigan Sex Offender Procedures for OffenderWatch : Importing and setting up an initial Verification Cycle for newly released offenders After logging in to OffenderWatch, clicking Offender Search
More informationChild Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Issue Date: March 13, 2019 1 Table of Contents Overview of the Child Care Criminal Background Check
More informationFREQUENTLY ASKED COPLINK QUESTIONS
FREQUENTLY ASKED COPLINK QUESTIONS What is the Basic Search process in COPLINK? If you are new to COPLINK, the idea of doing a database search may be confusing. Part of the problem is that there are many
More informationStandard for Security of Information Technology Resources
MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information
More informationChild Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Issue Date: March 5, 2018 Table of Contents Overview of Changes 3 New Child Care Criminal Background
More informationGUARDIAN PROFESSIONAL SECURITY
EMPLOYMENT APPLICATION LEGAL NAME: LAST, SUFFIX FIRST MIDDLE RESIDENCE ADDRESS CITY COUNTY STATE ZIP CODE RESIDENCE TELEPHONE (INCLUDE AREA CODE) CELL PHONE SOCIAL SECURITY NUMBER DRIVERS LICENSE #, STATE,
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationFY ICMA Benchmarking Results
FY 2010-11 ICMA Benchmarking Results DALLAS FIRE - RESCUE DEPARTMENT DALLAS POLICE DEPARTMENT Public Safety Committee Briefing ICMA Center for Performance Measurement History Center for Performance Measurement
More informationPENN MANOR SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS PENN MANOR SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: August 19, 2013 REVISED: April 20, 2015 815.2. DISTRICT-ISSUED
More informationIBR_Plus CAD Frequently Asked Questions
IBR_Plus CAD Frequently Asked Questions 1. What does the satellite that pulls up Channels mean? What is its purpose? The channel button on a call will allow you to reference the radio channels you used
More informationCity of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program
City of New Haven Identity Theft Prevention Program, October 2008, page City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program Adopted by Resolution of the Mayor and
More informationBasic Configuration Training Guide Part 1
Basic Configuration Training Guide Part 1 Welcome to the AmbuPro EMS Basic Configuration Training Program, Part 1. This course is intended for any users of the system who will be regularly adding and altering
More informationMissouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3
Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationCONTROL ROOM SOFTWARE
CONTROL ROOM SOFTWARE Starting QTWatch... Main screen... Control Monitor Screen... Action page... Site Map page... Standard Operations page... Handling calls on Actions... How to log a manual/remote call...
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Removable Storage Media Security Standard This standard is applicable to all VCU School of Medicine personnel.
More informationPrivacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES
Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you
More informationWELLSBORO AREA SCHOOL DISTRICT
No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED
More informationHow Do I Guide. How do I
Flloriida Safe Famiilliies Network How Do I Guide How do I CREATE A MISSING CHILD REPORT...2 CHILD INFORMATION...2 ALERT TYPE...2 CALLER/LAW ENFORCEMENT...3 NARRATIVE...3 COMPANION/...4 ABDUCTOR INFORMATION
More informationBellingham Police Volunteer Group Application
Bellingham Police Volunteer Group Application Deliver Application to: Scott Hendrickson Volunteer Coordinator Bellingham Police Department 505 Grand Avenue Bellingham, WA 98225 sbhendrickson@cob.org 360.778.8633
More informationIncident Reporting in Directline. For Internal Use Only Not to be distributed outside of Goodwill Industries of Arkansas.
Incident Reporting in Directline For Internal Use Only Not to be distributed outside of Goodwill Industries of Arkansas. Who performs this task? Store Managers with Directline access. What does this document
More informationOutside Interests Disclosure Form for Staff. IRIS Mobile through the Web
Outside Interests Disclosure Form for Staff IRIS Mobile through the Web The Outside Interests Disclosure Form is for the University of Tennessee faculty and staff to disclose outside interests as required
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationHow to Handle Special Circumstances That Corrections Test Administrators Face. Mellissa Hultstrand & Heath Stevenson July 2018
How to Handle Special Circumstances That Corrections Test Administrators Face Mellissa Hultstrand & Heath Stevenson July 2018 Readiness to Test 2 When should we test? Completion of coursework may not be
More informationApplication User Manual
Application User Manual E-Citatio Training Center for Advanced Public Safety Computer Science Department The University of Alabama http://caps.ua.edu Date revised: 3/5/2015 TABLE OF CONTENTS Table of Contents...
More informationCITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011
CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004
More informationMay 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file
More informationivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016
ivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016 Contents What is ivisions?... 2 Registering to ivisions Portal... 3 Logging into the
More informationPolice Department About the Police Department
About the The Wheat Ridge is a full service suburban police department organized under two major divisions: Patrol Operations and Support Services. The key public safety services provided to citizens and
More informationFlorida Safe Families Network Multi-Topic Basics How Do I Guide
Florida Safe Families Network How Do I Guide May 12, 2017 The Florida Safe Families Network () How Do I Guide helps you understand the steps to complete your work in the system. It is a desk reference
More informationHow to use the Rand McNally Driver Portal
How to use the Rand McNally Driver Portal 1 Updated 8/12/15 How to use the Rand McNally Driver Portal The Rand McNally Driver Portal may be used to create, edit, and certify hours of service logs (or time
More informationSOLUTION BRIEF. Video Changes the Future of Policing
SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to
More informationEPAF User Guide. Your guide for navigating the EPAF System
EPAF User Guide Your guide for navigating the EPAF System This booklet outlines the use of Electronic Personnel Action Forms in the Banner Web for Employees. Office of Human Resources 02/08/2013 Frequently
More informationClient Track Agency Administration
Last updated 12/14/2012 Client Track Agency Administration Instructions and help for Agency Administrators Using Client Track In this document: Basic Role of Agency Admin User and Password Management Information
More informationHIPAA and HIPAA Compliance with PHI/PII in Research
HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB
More informationOracle Financial Services Regulatory Reporting User Guide SG STR. Release 2.4 October 2013
Oracle Financial Services Regulatory Reporting User Guide SG STR Release 2.4 October 2013 Oracle Financial Services Regulatory Reporting User Guide SG STR Release 2.4 October 2013 Document Control Number:
More informationPURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor needed to purchase goods and services.
Training Manual 1 REQUISITION: Item necessary to initiate the procurement of all goods and services PURCHASE ORDER: The result of an approved requisition, the official document/contract with the vendor
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationPREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT
PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationAn introduction. UK National Intelligence Model. Intelligence-led crime reduction
Hot Times, Hot Places and Crime: Understanding More About Crime Hotspots Jerry Ratcliffe www.jratcliffe.net jhr@temple.edu An introduction 11 years Metropolitan Police Patrol, intelligence, diplomatic
More informationFirePoint 8. Setup & Quick Tour
FirePoint 8 Setup & Quick Tour Records Management System Copyright (C), 2006 End2End, Inc. End2End, Inc. 6366 Commerce Blvd #330 Rohnert Park, CA 94928 PLEASE READ THIS LICENSE AND DISCLAIMER OF WARRANTY
More informationDepartment of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY
Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for
More informationElectronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon
Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April 2008 June E. Martin Raytheon 1 Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop Acknowledgement
More informationLegistar Administration Guide
Legistar Administration Guide Legistar Administration Use Legistar Administration to configure the settings in your Legistar database. We've organized the Administration topics as follows: Legistar Administration
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationSTAFF REPORT. Evaluate the Use of Body Cameras
F, STAFF REPORT Meeting Date: April 21, 2015 To: Honorable Mayor & City Council From: Michael Hill, Police Lieutenant \\.M Subject: Update on the Police Department s Pilot Program to Test and Attachments:
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationDEPARTMENT OF ELDER AFFAIRS PROGRAMS AND SERVICES HANDBOOK APPENDIX E. Background Screening Clearinghouse Instructions
APPENDIX E Background Screening Clearinghouse Instructions Introduction/Requirements Introduction All Applicants who meet the Direct Service Provider definition are required to complete a Level 2 screening
More informationRio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION
Rio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION Rio Salado College, a Maricopa County Community College in Tempe, Arizona, is proud
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More informationTechnology That Has Your Back
SOLUTION BRIEF Technology That Has Your Back Motorola s PremierOne Mobile application and MW810 Mobile Workstation are trusted law enforcement partners that provide real-time information access, accurate
More informationNew Student Form Registration Online Parent Guide. McMinnville School District
New Student Form Registration Online Parent Guide McMinnville School District 2016-17 Steps for Enrollment Online Process 1. Create an e-mail account if you do not have one. Create an e-mail account if
More information