What is the name of the department that maintains, and administers the 911 public Safety
telecommunications/emergency 911 (formerly 911 emergency Dispatcher) training program for
certification and recertification purposes under F.S. §401.465. The Department of Health
What department maintains the Concealed Weapon permit files. Inquiries are made using a
person's Social Security number or concealed weapon permit number.
Information available includes name, date of birth, sex, race, license number, and expiration
date. The Department of Agriculture and Consumer Services (DOaCS)
Using FCIC, law enforcement agencies may enter data about wanted and missing persons and
stolen property. FCIC Information Sources
Who are allowed to make entries into
the FCIC/NCIC systems? Only agencies that maintain a 24 hour a day, seven day a week
operation
THE FCIC/NCIC entered information includes ... stolen items, boats, guns, vehicles, securities,
and
missing persons records. e entering agency is responsible for the accuracy, timeliness, and
completeness of the records entered.
A Computerized Criminal history (CCh) is created by the... ..booking agency submitting
fingerprints and arrest
information for an arrested person.
Before the record is created, information must first be processed and verified by fingerprint
review at FDLE. additional charges, arrests, dispositions, and other information will be added by
, the State attorney's Office, Clerk of the Court, and Department of Corrections. CCh information
constantly changes; when officers finish using retrieved information, they should destroy it by
shredding or burning. When a CCh is disseminated to an authorized individual of another
agency, a secondary dissemination log must be maintained for four years. A Computerized
Criminal history (CCh) ....
A record's reliability from FCIC depends on the agency's.... ...accuracy when entering the
information. It is extremely important that the information included in arrest reports or on
fingerprint cards is correct, from the spelling of suspects' names to the laws they violated.
Due to the sensitive nature and sheer volume of information included in the FCIC/NCIC systems,
officers
must strictly follow policies when conducting a records check. System users must attend the
Criminal Justice Information Services (CJIS) certification class and pass the certification exam.
System users must also submit a state and national fingerprint-based background check within
30 days of employment or terminal assignment (IN013.3.B.). Information obtained through
FCIC/NCIC may be used only for criminal justice purposes, and the agency that enters the data is
responsible for maintaining and removing it. THE only exception is that registration and lien
information may be given to towing companies per §713.78(4)(b), F.S. Computers accessing CJIS
information must have adequate physical security to prevent unauthorized access. Using
FCIC/NCIC
Misuse of the FCIC/NCIC system can result in both disciplinary and legal action including
termination of the officers involved. In addition, the agency involved could lose its certification
as an FCIC terminal site (LE005.6.B.). all FCIC/NCIC transactions
are logged and can be electronically retrieved upon request. e logs can be used for criminal
investigations, suspected system misuse, system compliance, public records requests, and
administrative purposes.
If the FCIC/NCIC database contains data that is the same as or similar to the information
requested, a list of possible matches will be returned (IN013.1.). additional information may be
needed to determine an exact match. an exact match, called a _____. ...HIT