Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Chapter 3 Criminal History

Chapter 3 Criminal History

Ratings: (0)|Views: 55|Likes:
WSP Special Operations - Procedures Manual
WSP Special Operations - Procedures Manual

More info:

Published by: Andrew Charles Hendricks on Jul 28, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/28/2013

pdf

text

original

 
 
Chapter 3 Criminal History
 ACCESS Manual 
Chapter #3-1
 Revised 08/2011
S
C
3
S
O
7
R
P
R
P
R
P
P
S
7
I
,
R
,
C
9
M
K
M
F
R
F
E
I
M
F
I
R
I
S
M
C
E
I
N
R
E
I
P
R
E
I
M
M
R
R
I
R
C
R
R
E
R
M
F
C
R
R
R
R
I
O
N
-
R
R
 
 
Chapter 3 Criminal History
 ACCESS Manual 
Chapter #3-3
 Revised 08/2011
CHAPTER 03: ACCESS Manual Criminal HistorySECTION 01: Security and ConfidentialityProcedure #:
03.01.000
Special Order:Supersedes:
 ACCESS Manual 2003 Edition
Applies to:
 ACCESS Users
 Effective Date:
March 30, 2006
See Also:CALEA:I. DEFINITIONSA.
Security and Confidentiality
1. Authorization to obtain records via the National Crime Information Center (NCIC) Interstate Identification Index (III) is governed by federal laws andstate statutes approved by the U. S. Attorney General that are applicable tothe U.S. Department of Justice, Federal Bureau of Investigation, and NCIC2000. All state and local agencies participating in the NCIC 2000 System IIIFile are required to adhere to the security guidelines as set forth in thepublication, NCIC Computerized Criminal History Program Background,Concept and Policy and in Subparts A and C of the United States Departmentof Justice Regulations governing the dissemination of criminal records andcriminal history information (Regulations) published in the Federal Register onMay 20, 1975, and August 7, 1976 (Title 28, code of Federal Regulations,Part 20). Local agencies must also adhere to regulations contained in theRevised Code of Washington (RCW) 10.97 and 10.98 and the Washington Administrative Code (WAC) 43.43.730.2. Operators must use the terminal only for those purposes that are authorized.3. Copies of criminal history data obtained through the Washington StateIdentification System (WASIS) and III from terminal devices must be affordedsecurity to prevent any unauthorized access to or use of the data. It isrecommended that data be shredded or burned.4. Criminal history records must be maintained in a secure records environment.Such storage of records may be for extended periods only when the criminalhistory records are key elements for the integrity/utility of the casefiles/criminal record files in which they are retained.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->