Version (2024/2025) Already Passed
What is the primary purpose of the Tennessee Information Enforcement System?
✔✔ To provide law enforcement agencies in Tennessee with access to criminal justice
information.
Who operates and maintains the system?
✔✔ The Tennessee Bureau of Investigation (TBI).
What types of data can be accessed through the system?
✔✔ Criminal history records, warrants, missing persons, stolen vehicles, and protective orders.
Who is authorized to use the system?
✔✔ Sworn law enforcement officers and authorized criminal justice personnel.
What security measures must be followed when using the system?
✔✔ User authentication, encrypted connections, and confidentiality of records.
1
,How often is the system available for use?
✔✔ 24 hours a day, 7 days a week.
What happens if someone misuses the system?
✔✔ They may face disciplinary action, termination, or criminal charges.
What must an officer do before accessing information in the system?
✔✔ Complete required training and have a legitimate law enforcement purpose.
How should responses from the system be verified?
✔✔ By confirming details with the originating agency.
What agency ensures compliance with system regulations?
✔✔ The Tennessee Bureau of Investigation.
What should be done if unauthorized access is suspected?
✔✔ Report it immediately and investigate the issue.
2
,What is the consequence of using the system for personal reasons?
✔✔ Loss of access, legal penalties, and possible termination.
What training is required for system users?
✔✔ TBI-approved system security and operations training.
How often must users complete recertification?
✔✔ Every two years or as required by TBI.
What is the purpose of the Wanted Persons File?
✔✔ To store and provide access to active arrest warrants.
How does the system help locate stolen vehicles?
✔✔ By providing real-time access to vehicle registration and theft reports.
What does the Missing Persons File contain?
✔✔ Reports of individuals reported missing.
3
, Who is responsible for entering data into the system?
✔✔ Authorized personnel from law enforcement agencies.
What should be done when a stolen vehicle is recovered?
✔✔ Notify the entering agency and update the record.
How does the system support public safety?
✔✔ By providing instant access to law enforcement data.
What does the Firearms File store?
✔✔ Records of lost, stolen, or recovered firearms.
What must agencies do to maintain access to the system?
✔✔ Follow security protocols and ensure proper training of personnel.
How does the system assist in tracking probationers and parolees?
✔✔ By storing and providing access to supervised release records.
4