Laserfiche WebLink
a. System Administration <br /> b. System Integrity <br /> c. Hit Confirmation <br /> d. Record Integrity <br /> e. Criminal History <br /> f. NICS <br /> g. N-DEx <br /> h. Written Procedures <br /> i. Validations <br /> 2. Data Quality Review:WSP Auditors conduct an on-site data quality review. <br /> Auditors compare WACIC/NCIC records against agency case files.Auditors check <br /> for accuracy, completeness, and verify entry and removal practices. The auditors <br /> document records with errors for the agency to update. <br /> 3. Auditor Recommendations for Best Practices:WSP Auditors provide a <br /> compliance report of information received during the interview and data quality <br /> review. They provide recommendations for best business practices. <br /> XI. Technical Security Audits <br /> The agency is responsible for compliance to technical standards set forth by ACCESS and <br /> the CJIS Security Policy. Technical Security Audits will follow the WACIC/NCIC triennial <br /> audit schedule. <br /> 1. Agency Compliance Review: The WSP performs security audits addressing the <br /> following compliance areas: <br /> a. Personnel security <br /> b. CJIS security incident reporting <br /> c. Configuration management <br /> d. Media protection (physical and electronic) <br /> e. Physical protection <br /> f. Session lock <br /> g. System and communications protection and information integrity <br /> h. Boundary protection <br /> i. Malicious code protection <br /> j. Event logging <br /> k. System use notification <br /> 1. Patch management <br /> m. Identification and authentication <br /> n. Wireless devices—mobile/bluetooth/cellular <br /> • <br /> o. Handheld mobile devices <br /> p. Cloud computing <br /> 2021 WSP ACCESS User Acknowledgment <br /> 7 <br />