Answers Verified 100% Correct
What department maintains the Concealed Weapon permit files. Inquiries are made
using a person's Social Security number or concealed weapon permit number.
Information available includes name, date of birth, sex, race, license number, and
expiration date. - ANSWER The Department of Agriculture and Consumer Services
(DOaCS)
Using FCIC, law enforcement agencies may enter data about wanted and missing
persons and stolen property. - ANSWER FCIC Information Sources
Who are allowed to make entries into
the FCIC/NCIC systems? - ANSWER Only agencies that maintain a 24 hour a day,
seven day a week operation
THE FCIC/NCIC entered information includes ... - ANSWER stolen items, boats, guns,
vehicles, securities, and
missing persons records. e entering agency is responsible for the accuracy, timeliness,
and completeness of the records entered.
A Computerized Criminal history (CCh) is created by the... - ANSWER ..booking agency
submitting fingerprints and arrest information for an arrested person.
Before the record is created, information must first be processed and verified by
fingerprint review at FDLE. additional charges, arrests, dispositions, and other
information will be added by the State attorney's Office, Clerk of the Court, and
Department of Corrections. CCh information constantly changes; when officers finish
using retrieved information, they should destroy it by shredding or burning. When a CCh
is disseminated to an authorized individual of another agency, a secondary
dissemination log must be maintained for four years. - ANSWER A Computerized
Criminal history (CCh) ....
A record's reliability from FCIC depends on the agency's.... - ANSWER ...accuracy
when entering the information. It is extremely important that the information included in
arrest reports or on fingerprint cards is correct, from the spelling of suspects' names to
the laws they violated.
Due to the sensitive nature and sheer volume of information included in the FCIC/NCIC
systems, officers
, must strictly follow policies when conducting a records check. System users must
attend the Criminal Justice Information Services (CJIS) certification class and pass the
certification exam. System users must also submit a state and national fingerprint-
based background check within 30 days of employment or terminal assignment
(IN013.3.B.). Information obtained through FCIC/NCIC may be used only for criminal
justice purposes, and the agency that enters the data is responsible for maintaining and
removing it. THE only exception is that registration and lien information may be given to
towing companies per §713.78(4)(b), F.S. Computers accessing CJIS information must
have adequate physical security to prevent unauthorized access. - ANSWER Using
FCIC/NCIC
Misuse of the FCIC/NCIC system can result in - ANSWER both disciplinary and legal
action including termination of the officers involved. In addition, the agency involved
could lose its certification as an FCIC terminal site (LE005.6.B.). all FCIC/NCIC
transactions are logged and can be electronically retrieved upon request. e logs can
be used for criminal investigations, suspected system misuse, system compliance,
public records requests, and administrative purposes.
If the FCIC/NCIC database contains data that is the same as or similar to the
information requested, a list of possible matches will be returned (IN013.1.). additional
information may be needed to determine an exact match. an exact match, called a
_____. - ANSWER ...HIT
A ________must be confirmed before an officer arrests a wanted person or recovers a
missing person
or stolen property.THE _____ confirmation process ensures that system information
remains valid and is identical to the person or property of interest to the officer. The
process prevents arrests based on outdated or invalid warrants. It also provides more
details about the action the entering agency wants taken upon location of the person
or property. For example, the entering agency can confirm if a wanted person will be
extradited or what should be done if only part of an entered record has been recovered
(e.g., a stolen vehicle entry where only the transmission was recovered). - ANSWER
...HIT
When data must be entered into FCIC/NCIC, the officer must provide the original... -
ANSWER report and supplemental documentation to the person at the agency
responsible for making such data entries (IN013.4.). Some examples include cases
involving missing or wanted persons, stolen property, or abandoned vehicles or vessels.
Officers should follow agency policies for adding information to the systems or when
conducting a database inquiry.
is the laptop computer installed in a patrol vehicle.
The terminal is used by the officer to access information regarding criminal records,
driving history, and agency records as well as to write and submit electronic reports to