My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Washington State Patrol 1/16/2019
>
Contracts
>
Agreement
>
Interlocal Agreements
>
Washington State Patrol 1/16/2019
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/26/2024 7:10:20 AM
Creation date
1/24/2019 9:43:39 AM
Metadata
Fields
Template:
Contracts
Contractor's Name
Washington State Patrol
Approval Date
1/16/2019
Council Approval Date
1/9/2019
Department
Police
Department Project Manager
John DeRousse
Subject / Project Title
ACCESS User Acnowledgment 2019
Tracking Number
0001623
Total Compensation
$0.00
Contract Type
Agreement
Contract Subtype
Interlocal Agreements
Retention Period
6 Years Then Destroy
Imported from EPIC
No
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
14
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
WACIC/NCIC records must be entered promptly to ensure maximum system effectiveness. <br /> Records must be entered according to standards defined in the ACCESS Operations <br /> Manual. <br /> Accuracy Completeness <br /> Com leteness <br /> The accuracy of WACIC/NCIC data must be double checked and documented, including the <br /> initials and date by a second party. This must be done within 72 hours of the initial entry. <br /> The verification should include assuring the data in the WACIC/NCIC record matches the <br /> data in the investigative report and that other checks were made. Agencies lacking support <br /> staff for second party checks should require the case officer to check the record. <br /> Complete records of any kind include all information available on the person or property at <br /> the time of entry, otherwise known as "packing the record". Complete inquiries on persons <br /> include numbers that could be indexed in the record (i.e. Social Security Number (SSN), <br /> Vehicle Identification Number (VIN), Operator's License Number (OLN), etc.). Inquiries <br /> should be made on all names/aliases used by the suspect. Complete vehicle inquiries <br /> include VIN and license plate numbers. <br /> Record Validations <br /> WACIC/NCIC validation listings are prepared pursuant to a schedule, as published in the <br /> ACCESS Operations Manual. These listings are distributed to the originating agency via <br /> CJIS Validations. <br /> Validation requires the originating agency to confirm the record is complete, accurate, and <br /> active. Validation is accomplished by reviewing the original entry and current supporting <br /> documents and correspondence with any appropriate complainant, victim, prosecutor, court, <br /> motor vehicle registry files, or other appropriate source or individual. Validation efforts must <br /> be well documented. Validation efforts include what was done to complete the validation of <br /> the individual record. Documentation of phone calls, letters, dates and dispositions need to <br /> be included with each record that was validated. Many agencies document this information <br /> in the case file. In the event the agency is unsuccessful in its attempts to contact the victim, <br /> complainant, etc., the entering agency must make a determination based on the best <br /> information and knowledge available whether or not to retain the original entry in the file. <br /> The agency must review the validation list found within CJIS Validations. Once all of the <br /> records have been processed the system will advise ACCESS once they are complete. If <br /> the CSA is notified the records have not been valiated within the specified period of time, the <br /> CSA will purge all records which are the subject of that agency's validation listings from <br /> WACIC and NCIC. <br /> VIII. Security Responsibilities <br /> Technical Roles and Responsibilities <br /> All agencies participating in ACCESS must comply with and enforce system security. <br /> Each interface agency (city, county, or other agency) having access to a criminal justice <br /> network must have someone designated as the technical security POC. A criminal justice <br /> network is a telecommunications infrastructure dedicated to the use by criminal justice <br /> entities exchanging criminal justice information. The technical security POC's shall be <br /> responsible for the following: <br /> 1. Identifying the user of the hardware/software and ensuring that no unauthorized <br /> users have access to the same. <br /> 2. Identifying and documenting how the equipment is connected to the state system. <br /> 2019 WSP ACCESS User Acknowledgment <br /> Approved by the Attorney General 11/28/18 <br /> 4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.