Laserfiche WebLink
Each interface agency is responsible for enforcing system security standards for their <br /> agency, in addition to all of the other agencies and entities to which the interface agency <br /> provides CJIS and Washington State Department of Licensing (DOL) records information. <br /> Authorized users shall access CJIS and DOL systems and disseminate the data only for the <br /> purpose for which they are authorized. Each criminal justice and non-criminal justice <br /> agency authorized to access FBI CJIS systems and DOL shall have a written policy for the <br /> discipline of policy violators. <br /> Physical Security <br /> A physically secure location is a facility or an area, a room, or a group of rooms within a <br /> facility with both the physical and personnel security controls sufficient to protect CJI and <br /> associated information systems. The physically secure location is subject to criminal justice <br /> agency management control. <br /> The perimeter of a physically secure location shall be prominently posted and separated <br /> from non-secure locations by physical controls. <br /> All personnel with access to computer centers, terminal areas, and/or areas where CJIS <br /> information is housed shall either be escorted by authorized personnel at all times or receive <br /> a fingerprint-based background check and view security awareness training. <br /> Personnel Security <br /> To verify identification, a state of residency and national fingerprint-based record checks <br /> shall be conducted within 30 days of initial employment or assignment for all personnel who <br /> have authorized access to FBI CJIS systems and those who have direct responsibility to <br /> configure and maintain computer systems and networks with access to FBI CJIS systems. <br /> All requests for system access shall be made as specified by the CSO. The CSO or their <br /> official designee is authorized to approve CJIS systems access. All official designees to the <br /> CSO shall be from an authorized criminal justice agency. <br /> Support personnel, contractors, and custodial workers who access computer terminal areas <br /> shall be subject to a state of residency and national fingerprint-based record check and view <br /> the security awareness training, unless these individuals are escorted by authorized <br /> personnel at all times. Authorized personnel are those persons who have passed a state <br /> and national fingerprint-based record check and have been granted access. <br /> Private Contractors/Vendors <br /> Private contractors shall be permitted access to CJIS record information systems pursuant <br /> to an agreement which specifically identifies the contractor's purpose and scope of providing <br /> services for the administration of criminal justice. The agreement between the criminal <br /> justice government agency and the private contractor shall incorporate the CJIS Security <br /> Addendum approved by the Director of the FBI. Private contractors who perform the <br /> administration of criminal justice shall meet the same training and certification criteria <br /> required by governmental agencies performing a similar function, and shall be subject to the <br /> same extent of audit review as are local user agencies. <br /> Hit Confirmation <br /> Any agency that enters a record into NCIC/WACIC has the duty to promptly <br /> respond with the necessary confirmation of the hit and other details. They must furnish a <br /> response within a specific time period. Valid hit confirmation is based on two levels of <br /> priority: urgent or routine. <br /> 2014 ACCESS User Acknowledgement 7-23-2015 <br /> 5 <br />