Laserfiche WebLink
10,:,comrurt <br /> 4, WASHINGTON STATE PATROL (WSP) <br /> < ��675 A Central Computerized Enforcement Service System (ACCESS) <br /> USER ACKNOWLEDGMENT <br /> Meivrs�R'� <br /> I. Introduction <br /> Since its inception, the National Crime Information Center(NCIC) has operated under a <br /> shared management concept between the Federal Bureau of Investigation (FBI) Criminal <br /> Justice Information Services (CJIS) Division and state users. The NCIC Advisory Policy <br /> Board established a single state agency in each state to assume responsibility as the NCIC <br /> CJIS Systems Agency (CSA)for all agencies within the state. The CSA is responsible for <br /> the planning of necessary hardware, software, funding, security, auditing, and training of all <br /> authorized agencies within the state for complete access to FBI CJIS systems. The CJIS <br /> Systems include, but are not limited to: the Interstate Identification Index (III); NCIC; Uniform <br /> Crime Reporting (UCR); summary or incident-based reporting to the National Incident- <br /> Based Reporting System (NIBRS); Fingerprint Identification Record System; National Data <br /> Exchange (N-DEx); Law Enforcement Enterprise Portal (LEEP); and the National Instant <br /> Criminal Background Check System (NICS).The WSP Criminal Records Division (CRD) <br /> Administrator is designated as the NCIC CJIS Systems Officer(CSO). The FBI CJIS <br /> Division requires the CSO to manage the following: <br /> 1. Operational, technical, and investigative assistance. <br /> 2. Telecommunications lines to state, federal and regulatory interfaces. <br /> 3. Legal and legislative review of matters pertaining to all CJIS systems. <br /> 4. Timely information regarding all aspects of CJIS systems and other related programs <br /> by means of the ACCESS Operations Manual, NCIC Operating Manual, NCIC Code <br /> Manual, CJIS Security Policy, Technical and Operational Updates (TOU), and <br /> related documents. <br /> 5. Training and training materials to all participating agencies. <br /> 6. System security to include physical security, personnel, and all technical aspects of <br /> security as required in the CJIS Security Policy. <br /> The following documents are incorporated by reference and made part of this user <br /> acknowledgment: <br /> 1. ACCESS Operations Manual: http://www.wsp.wa.qov/ secured/access/manuals.htm <br /> 2. CJIS Security Policy: https://www.fbi.gov/services/cjis/cjis-security-policy-resource- <br /> center/view <br /> 3. U.S. Code of Federal Regulations, Title 28, Part 20 <br /> 4. Applicable federal and state laws and regulations; ACCESS/WACIC rules, <br /> regulations, and policies as recommended by the ACCESS Section <br /> II. Primary Connection and Originating Agency Identifier(ORI) Issuance <br /> All agencies that inquire on or enter data into ACCESS must have a primary connection to <br /> ACCESS and a signed WSP ACCESS User Acknowledgment on file prior to adding <br /> secondary connections such as regional management systems. Agencies must ensure that <br /> all system use, through both the primary or secondary connections, remain in compliance <br /> with ACCESS and FBI CJIS rules. <br /> 2021 WSP ACCESS User Acknowledgment <br /> 1 <br />