AND
COMMUNICATIONS SYSTEM
IDACS NCIC AUDIT PROCEDURES MANUAL
TABLE OF CONTENTS
Introduction
Objectives
General Scope of the Audit
Methodology
IDACS Sanctions
Administrative Compliance Requirements
System Security Compliance Requirements
Missing Person File Compliance Requirements
Vehicle File Compliance Requirements
Vehicle File Risk Analysis
Wanted Person File Compliance Requirements
Wanted Person File Risk Analysis
Non-Terminal Agency Administrative Compliance Requirements
Audit Forms
Introduction
The NCIC Advisory Policy Board (APB) at their October, 1984 meeting, mandated that each state implement certain initiatives to enhance record quality in IDACS/NCIC. That by December 31, 1986 each CTA shall establish a system to biennially audit every terminal agency to ensure compliance with state and NCIC policy and regulations.
Subsequently, IDACS has implemented the same basic inspection and audit procedures that are followed by NCIC during their biennial audit.
Objectives
- To review and document compliance with applicable laws, regulations, policies, and procedures.
- To be alert for situations or transactions that could be indicative of fraud, abuse, illegality, or cause unnecessary risk to civil liabilities.
- To recommend areas for improvement of IDACS operations both at the control terminal and local level.
- To obtain pertinent views of responsible officials from audited agencies.
- To obtain a description of noteworthy accomplishments particularly when local management accomplishments may be beneficial to other agencies.
General Scope of the Audit
- Terminal Agency Coordinator Responsibilities.
- Quality, accuracy, and timeliness of Wanted File entries.
- Validations Procedures.
- Record availability.
- Hit Confirmation Procedures.
- Audit Trail Requirements.
- Use of appropriate ORI's.
- User Agreements.
- Security of terminal, access, personnel, and data.
- Criminal History Audit Trails, dissemination, and use.
- Management Control Requirements for Computer and Dispatch Centers.
- Missing Person File Compliance Requirements.
- Vehicle File Compliance Requirements and Risk Analysis.
- Wanted Person File Compliance Requirements and Risk Analysis.
- Non-Terminal Agency Compliance Requirements.
- Data Quality Review
Methodology
Audits will be conducted at each IDACS terminal agency about once every two years. Non-terminal agencies will be audited if determined that problems exist for which the responsible terminal agency cannot correct.
- IDACS Security Officers whenever possible will pre-schedule audit dates that are mutually acceptable with the terminal agency coordinator.
- The on-site phase of the audit will consist of a review of each of the listed areas to ensure that there is compliance.
- The auditor will then check specific wanted file records, criminal history requests, and other system transactions, to determine the extent of compliance with data quality, validation, audit trails, and other appropriate requirements.
- Upon completion, the auditor will review the results of the inspection with an agency official.
- The auditor will report to the IDACS Chairman any serious violations, for possible review by the whole Committee and/or recommend sanctions. See IDACS Sanctions later in this manual.
- As necessary, follow-up visits will be done to determine the progress on any recommended improvements.
IDACS Sanctions
240 IAC 5-2-12 User agency sanctions Authority: IC 10-1-1-3; IC 10-1-2.5-7 Affected: IC 5-2-5-5; IC 10-1-2.5-2 Sec. 12. (a) The IDACS committee shall review violations of IDACS rules and make recommendations to the state police superintendent to impose sanctions on user agencies. (b) The objectives of the sanction procedure shall be as follows: (1) To ensure the integrity of the SYSTEM (2) Create an awareness among user agencies of the importance of following rules, regulations, and procedures in order to minimize the risk to liabilities that may be incurred by misuse of the SYSTEM and its data. (c) Sanctions shall be based upon the class of violation, any previous violations, and any exposure to criminal and civil liabilities that the violation might place on the SYSTEM, its officials, and the offending agency. (d) Violations shall be classed as either Administrative (minor) or Security (serious) Violations. Security Violations being defined as one which has or could result in access of SYSTEM data by unauthorized individuals. All other Violations are classed as Administrative. (e) In determining the severity of the Violation, the violation type, either Administrative or Security, and previous sanctions issued, if any, shall be considered. The IDACS Committee may impose as sanctions one of the following: (1) Verbal Warning (2) Written Warning (3) Written Notice of Violation (4) Written Notice of Probation (5) Written Notice of Temporary Suspension (6) Written Notice of Permanent Suspension (f) Temporary or permanent suspension of service will not begin, unless an emergency exists, until fifteen (15) days after the Agency Head has received written notice by certified mail or personal service. (g) An Agency may after one (1) year apply to be reinstated if placed on permanent suspension. (State Police Department; filed Aug 6, 1990, 4:40 PM)
SECTION A ADMINISTRATIVE COMPLIANCE REQUIREMENTS 1. NCIC and IDACS requires that each agency have a designated Terminal Agency Coordinator (TAC), with the below listed responsibilities. (1) Ensure that all agency personnel (including any nonterminal agencies serviced) utilizing system information are aware of the rules and policies of the IDACS/NCIC/NLETS system. (2) Disseminate the contents of the IDACS/NCIC newsletters to all terminal operators, and maintain copies for three (3) years. (3) Ensure that validation reports are properly processed. (4) Ensure that terminal operators receive proper IDACS training in accordance with the IDACS certification training program. (5) Maintain NCIC and IDACS Operating Manual and NCIC Code Manual revisions and disseminate information to operators. (6) Advise IDACS of any changes in the agency head, the coordinator, agency address, or terminal site. (7) Report all IDACS rule violations and other improper uses to IDACS. (240 IAC 5-2-8, IDACS Manual Part I, Section G.) 2. Accuracy is essential as is promptness in entering, modifying, locating, or clearing records in the system. Each record on file is identified with the agency originating that record and that agency alone is responsible for the accuracy, completeness, and correct status of that record at all times. IDACS cannot assume responsibility for the accuracy of any records entered by any agency. (Compliance will be determined in data quality review). (240 IAC 5-1-1, IDACS Manual Part I, Section D.) 3. The accuracy of IDACS/NCIC records must be double-checked by a second party. That verification should include assuring that the available cross-checks, e.g., VIN/License Numbers, were made, and that data in the NCIC record matches the data in the investigative report. Agency agrees to abide by accepted quality assurance methods. This includes compliance with validation procedures as specified in the Indiana Administrative Code, NCIC serious error procedures, and IDACS quality control procedures. Agency further agrees to establish local procedures whereby updates to the wanted files are reviewed for accuracy by comparing the update with supporting documentation. This comparison shall be made by a person other than the operator who accomplished the update and the investigating officer who ordered it. (240 IAC 5-2-9 IDACS User Agency Agreement) 4. All IDACS user agencies shall validate, on a periodic basis, as prescribed to the user agency by IDACS, all IDACS wanted records entered on their authority. Validation of records shall be in conformity and compliance with rules set forth by IDACS. a. Validation obligates the originating agency to confirm the record is COMPLETE, ACCURATE and is still OUTSTANDING or ACTIVE. Validation is accomplished by reviewing the original entry and current supporting documents and by recent consultation with any appropriate complainant, victim, prosecutor, court, motor vehicle registry files, or other appropriate source or individual. In the event the originating agency is unsuccessful in its attempts to contact the victim, complainant, etc., the entering authority shall make a determination based on the best information and knowledge available whether or not to retain the original entry on file. b. Validation procedures must be formalized and copies of these procedures must be on file for review during an IDACS or NCIC audit. (240 IAC 5-2-7, IDACS Manual Part I Section F.) 5. Terminal agency agrees to ensure that hit confirmation is available twenty-four (24) hours a day on records entered into the wanted files. This includes being able to provide a substantive response to an inquiry within ten minutes. (240 IAC 5-2-9 IDACS User Agency Agreement) 6. Originating agency has an obligation to supply a substantive response within (10) minutes to the inquiring agency This response shall include a confirmation or denial of the wanted notice, or the length of time it will take to respond. (240 IAC 5-1-1, IDACS Manual Part I Section D, Part II Section A.) 7. When an agency receives a positive response (wanted notice) from IDACS or NCIC, an immediate follow-up confirmation request with the agency that originated the record in the system is necessary before any enforcement action is taken. Confirming a hit means to contact the agency that entered the record to: Ensure that the person or property inquired upon is identical to the person or property identified in the record; Ensure that the warrant, missing person report, or theft report is still outstanding; and Obtain a decision regarding (1) the extradition of a wanted person, (2) information regarding the return of the missing person to the appropriate authorities, or (3) information regarding the return of stolen property to its rightful owner. (240 IAC 5-1-1, IDACS Manual Part I Section D.) 8. When an operational inquiry ("Q") on an individual or property yields a valid positive response (hit), the terminal-produced printout showing the inquiry message transmitted and the record(s) on file in IDACS/NCIC should be retained for use in documenting probable cause for the detention of the missing person, arrest of the wanted person, or seizure of the property. The printout may also prove valuable in a civil suit alleging a false arrest, a false imprisonment, a civil rights violation, or an illegal seizure of property. When an IDACS/NCIC inquiry yields a hit, the terminal employee making the inquiry should note on the terminal-produced printout precisely how, when, and to whom the information was given; initial and date this notation; and forward the printout to the inquiring officer or agency for retention in the case file. (240 IAC 5-1-2, IDACS Manual Part I Section D.) 9. Every agency upon taking a person into custody or acquiring property, after confirming the hit, must place a locate on the corresponding IDACS/NCIC record(s). (IDACS Manual Part II, Sections B-J) 10. An inquiry of any IDACS/NCIC File must contain a valid ORI in the ORI Field. Agencies making inquiries for another agency must use the ORI of the other agency. (NCIC Manual 13-7, Para 1.5, IDACS Manual Part I, Section I.) 11. All IDACS user agencies shall complete a "user agreement" before utilizing the system. Agencies with terminals and statutory police agencies shall complete such agreements with the Indiana state police and the IDACS committee. Non-terminal agencies shall complete an agreement with the terminal agency that services them. (240 IAC 5-2-9, IDACS Manual Part I, Section C.) 12. Any criminal justice agency or regional dispatch center may act as holder of the record for a criminal justice agency and such criminal justice agency or regional dispatch center may place its own ORI in the ORI Field only when there is a written assignment between the two (2) agencies delegating the legal responsibilities for the record. Responsibilities for the record include entering and updating the record, confirming a hit on the record, and removing the record from file. Any agency that does not have a written agreement must store in the ORI Field of the record the valid NCIC assigned ORI of the agency requesting transmission of the entry. (There may not be any of these kind of arrangements in Indiana). (NCIC Manual 13-7, Para 1.5)
SECTION B SYSTEM SECURITY COMPLIANCE REQUIREMENTS 1. All agencies and computer centers having terminals on the SYSTEM and/or having access to SYSTEM data shall physically place these terminals in a secure location previously approved by the IDACS Committee within the authorized agency. Subsequent physical location changes of terminals shall have prior approval of the IDACS Committee. (240 IAC 5-2-10 J (3), IDACS Manual Part I, Section C.) 2. It is incumbent upon an agency operating an IDACS terminal to implement the necessary procedures to make that terminal secure from any unauthorized use. Access, meaning the ability to obtain information from the System, shall be permitted only to criminal justice agencies in the discharge of their official mandated responsibilities, and those agencies as required by state and/or federal enabling authority. Release of Indiana bureau of motor vehicles data to noncriminal justice agencies may occur when it is determined to be in the best interest of law enforcement/criminal justice to do so. Agencies that shall be permitted access to SYSTEM data include the following: (1) Police forces and departments at all governmental levels (including private college and railroad police departments as authorized by Indiana Code) that are responsible for enforcement of general criminal laws. (2) Prosecutive agencies and departments at all governmental levels. (3) Courts at all governmental levels with a criminal or equivalent jurisdiction. (4) Correction departments at all governmental levels, including corrective institutions and probation departments. (5) Parole commissions and agencies at all governmental levels. (6) Agencies at all governmental levels which have as a principal function the collection and provision of fingerprint identification information. (7) Regional or local governmental organizations established pursuant to statute which collect and process criminal justice information and whose policy and governing boards have, as a minimum, a majority composition of members representing criminal justice agencies. (240 IAC 5-2-10 b, IDACS Manual Part I, Section C.) 3. The agencies having terminals with access to SYSTEM data shall have terminal operators screened and restrict access to the terminal to a minimum number of authorized employees. ...they shall be screened thoroughly under the authority and supervision of the IDACS committee or their designated representative. This screening shall also apply to noncriminal justice maintenance or technical personnel. The screening process shall consist of a character investigation, including fingerprints, for the purpose of establishing suitability for the position. Investigations shall consist of the gathering of information as the applicant's honesty, integrity and general reputation. Personal characteristics or habits, such as lack of judgment, lack of physical or mental vigor, inability to cooperate with others, intemperance, or other characteristics which would tend to cause the applicant to be unsuitable for this type of position, shall be considered sufficient grounds for rejection. Also, convincing information in an applicant's past history involving moral turpitude, disrespect for law, or unethical dealings shall be considered sufficient grounds for rejection. If any of the above facts are presented to the IDACS committee, a recommendation shall be made and presented to the state police superintendent for a final approval or disapproval decision. (240 IAC 5-2-10 j (3)(B), IDACS Manual Part I, Section C.) 4. Copies of SYSTEM data obtained from terminal devices shall be afforded security to prevent any unauthorized access to or use of that data. Copies of SYSTEM data which are no longer relevant shall be destroyed. (240 IAC 5-2-10 j (1)(C), IDACS Manual Part I, Section C.) 5. Established IDACS committee policy requires all user agencies to an audit trail for six (6) months for certain types of IDACS transactions as itemized but not limited to the following: (1) Switched Messages (both transmitted and received). (2) Bureau of motor vehicles and department of natural resources information file data. (3) IDACS/NCIC stolen file data. (4) Out-of-State (NLETS) Bureau of motor vehicles or department of natural resources data. These audit records shall include, but are not limited to, the names of all persons or agencies to whom the information is disseminated and the date and time upon which such information is disseminated. Audit trails shall be maintained manually or by automation, and shall be made available to the IDACS committee for inspection upon request. It should be noted that these are minimum requirements and it may be necessary to keep important or case related traffic for longer periods of time in order to properly confirm or validate IDACS/NCIC wanted entries. (240 IAC 5-1-2, IDACS Manual Part I, Section D.) 6. Title 28 United States Code states that audits shall be kept pertaining to the dissemination of criminal history records. This includes responses from NCIC's Interstate Identification Index (NCIC III) and responses from state central repositories and other agency criminal history files (both in-state and out-of-state). Such audit records shall include, but are not limited to, the names of all persons or agencies to whom the information is disseminated and the date and time upon which such information is disseminated. These shall be kept for at least one (1) year. (240 IAC 5-1-3, IDACS Manual Part I, Section D.) 7. Audio response terminals, radio devices, and mobile data terminals, whether digital (teleprinters) or voice, shall not be used for the transmission of criminal history data beyond that information necessary to effect an immediate identification or to ensure adequate safety for officers and the general public. Transmission shall be made to police officers upon his or her request. (240 IAC 5-2-10 (3)(D), IDACS Manual Part I, Section C.) 8. Criminal history and Violent Gang/Terrorist data on an individual from the national computerized file shall be made available outside the federal government to criminal justice agencies for criminal justice purposes. This precludes the dissemination of such data for use in connection with licensing (except when a federal, state, or local law/ordinance exists making the criminal justice agency responsible for the processing or issuing of the licenses/permits) applications, or local or state employment, other than with a criminal justice agency, or for other uses unless such dissemination is pursuant to state and federal statutes or state and federal executive order. There are no exceptions. (240 IAC 5-2-10 (h)(1), IDACS Manual Part I, Section C.) 9. Inquiries and record requests transmitted to the III (and to state repositories must include the purpose for which the information is to be used. A. Criminal Justice (Purpose Code "C") Ä must be used when the transaction is for official duties in connection with the administration of criminal justice. B. Criminal Justice Employment (Purpose Code "J") Ä must be used when the transaction involves employment with the previously described authorized agencies. C. Firearms (Purpose Code "F") - must be used when processing an application for purchase of a firearm, and/or an application for a license to carry a handgun. (IDACS Manual Part VII, Section B,C.) REGIONAL COMPUTER INTERFACES & CENTRALIZED DISPATCHES 10. All computers, electronic switches, and manual terminals (including mobile data terminals/printers) interfaced with the SYSTEM computer for the exchange of SYSTEM data shall be under the management control of criminal justice agencies. Appropriate up-to-date agreements shall be maintained and available during the audit. Similarly, satellite computers and manual terminals accessing the SYSTEM shall be under the management control of a criminal justice agency. (240 IAC 5-2-10 (d), IDACS Manual Part I, Section C.) 11. In those instances where criminal justice agencies are utilizing equipment and personnel of a noncriminal justice agency for SYSTEM purposes, they shall have complete management control of the hardware and the people who use and operate the system. "Management control" means the authority to set and enforce: (1) priorities; (2) standards for the selection, supervision, and termination of personnel; and (3) policy governing the operations of computers, circuits and terminals used to process SYSTEM information insofar as the equipment is used to process, store, or transmit SYSTEM information. Management control includes, but is not limited to, the supervision of equipment, systems design, programming, and operating procedures necessary for the development and implementation of the computerized SYSTEM. Management control shall remain fully independent of noncriminal justice data systems and criminal justice systems shall receive priority service and be primarily dedicated to the service of the criminal justice community. (240 IAC 5-2-10 (d),(e),(f), IDACS Manual Part I, Section C.) 12. The criminal justice agency shall exercise management control with regard to the operation of the equipment by: (1) having a written agreement with the noncriminal justice agency operating the data center providing the criminal justice agency authority to select and supervise personnel; (2) having the authority to set and enforce policy concerning computer operations; and (3) having budgetary control with regard to personnel and equipment, in the criminal justice agency. (240 IAC 5-2-10 (g), IDACS Manual Part I, Section C.) 13. All computer sites accessing SYSTEM data shall have the security to protect against any unauthorized access to any of the stored data and/or the computer equipment including the following: (a) All doors having access to the Central Processing Unit (CPU) room shall be locked at all times. (b) A visitor's log shall be maintained of all persons entering the CPU area except those assigned to the area on a permanent basis. The visitor's name, date, time in, time out, agency represented and reason for visit. (240 IAC 5-2-10 (j)(1)(A), IDACS Manual Part I, Section C.) 14. Since personnel at these computer centers have access to data stored in the SYSTEM, they shall be screened thoroughly under the authority and supervision of the IDACS committee or their designated representative. This screening shall also apply to noncriminal justice maintenance or technical personnel. The screening process shall consist of a character investigation, including fingerprints, for the purpose of establishing suitability for the position. Investigations shall consist of the gathering of information as the applicant's honesty, integrity and general reputation. Personal characteristics or habits, such as lack of judgment, lack of physical or mental vigor, inability to cooperate with others, intemperance, or other characteristics which would tend to cause the applicant to be unsuitable for this type of position, shall be considered sufficient grounds for rejection. Also, convincing information in an applicant's past history involving moral turpitude, disrespect for law, or unethical dealings shall be considered sufficient grounds for rejection. If any of the above facts are presented to the IDACS committee, a recommendation shall be made and presented to the state police superintendent for a final approval or disapproval decision. (240 IAC 5-2-10 j (1)(B), IDACS Manual Part I, Section C.) 15. Computers having access to the SYSTEM shall have the proper computer instructions written and other built-in controls to prevent SYSTEM data from being accessible to any terminals other than authorized terminals. These instructions and controls shall be made available to the IDACS committee for inspection upon request. (240 IAC 5-2-10 j (1)(D), IDACS Manual Part I, Section C.) 16. Computers and/or terminals (including mobile data terminals) having access to SYSTEM data shall maintain an audit of all transactions. This audit trail shall be maintained either manually by each agency or automated by the computer center. This transaction audit shall be monitored and reviewed on a regular basis to detect any possible misuse of SYSTEM data. This audit shall be made available to IDACS for inspection upon request. (240 IAC 5-2-10 j (1)(E), IDACS Manual Part I, Section C.)
SECTION C MISSING PERSON FILE COMPLIANCE REQUIREMENTS 1. A missing person record shall be entered into IDACS and NCIC for the following reasons. a. Disability. A person of any age who is missing and under proven physical/mental disability or is senile, thereby subjecting himself/herself or others to personal and immediate danger. b. Endangered. A person of any age who is missing and in the company of another person under circumstances indicating that his/her physical safety is in danger. c. Involuntary. A person of any age who is missing under circumstances indicating that the disappearance was not voluntary, i.e.,abduction or kidnapping. d. Juvenile. A person who is missing and declared unemancipated as defined by the laws of his/her state of residence and does not meet any of the entry criteria set forth in a, b, c, or e. e. Catastrophe Victim. A person of any age who is missing after a catastrophe. f. Miscellaneous. A person above the age of emancipation who is missing and does not meet any of the criteria in a, b, c, or d can be entered into IDACS Files only. (IDACS Manual, Part II Section F.) 2. A timely entry for a missing person is necessary to ensure maximum system effectiveness. On a daily basis, all law enforcement agencies shall enter into the Indiana data and communication system (IDACS) computer the following: including information concerning extradition. ...(3) All information concerning runaways and missing persons, and missing children (as defined in IC 10-1-7-2), including information concerning the release of such persons to the custody of a parent or guardian. The average entry delay of record(s) checked in the agency was ______ day(s). (See Data Quality Review). (IC 5-2-5-12, IDACS Manual Part II, Section A.) 3. A record for a missing person may be entered in the Missing Person File provided the entering agency has documentation in its possession supporting the stated conditions under which the person is declared missing. This written documentation will aid in the protection of the individual's right to privacy. This documentation may be in the form of two separate documents, the officer's report and signed statement(s), or it may be only the officer's report if that report contains all of the following data: 1. The circumstances indicating reasons for considering the person as missing/runaway. 2. A statement indicating the relationship of the complainant to the missing person/runaway. 3. The signature of the complainant. (IDACS Manual, Part II Section F.) 4. The ORI must account for all fields in the Missing Person File Ä Record Format. Ensure that all available data called for in the record format is entered when the entry is made. Missing data obtained at a later time should be promptly added through the use of a "modify" message. (240 IAC 5-1-1 (b), IDACS Manual Part I Section D.) 5. The originating agency has the responsibility of immediately advising the locating agency concerning disposition of the individual when contacted about the location of the missing person. (240 IAC 5-1-1 (d), IDACS Manual Part I Section D.) 6. Cancellation of a record is restricted to the agency that entered the record. A cancellation message is utilized when the entering agency determines that the record is invalid: for example, the parent or legal guardian of the missing juvenile withdraws the missing person report. (240 IAC 5-1-1 (b), IDACS Manual Part I Section D.) SECTION D MISSING PERSON FILE RISK ANALYSIS Set aside for future development.
SECTION E VEHICLE FILE COMPLIANCE REQUIREMENTS 1. A theft report must be on file for each entry in the Vehicle File. (240 IAC 5-1-2 (b), IDACS Manual Part I, Section D.) 2. A timely entry into the vehicle file is necessary to ensure maximum system effectiveness. On a daily basis, all law enforcement agencies shall enter into the Indiana data and communication system (IDACS) computer the following: (1) All information concerning any stolen or recovered property, including motor vehicles, firearms, securities, boats, license plates, and any other stolen or recovered property. The average entry delay of record(s) checked in the agency was ______ day(s). (See Data Quality Review). (IC 5-2-5-12, IDACS Manual Part II, Section A.) 3. The state of registry may enter a record for a vehicle stolen in another state when a test inquiry after a reasonable period of time discloses no record in NCIC. In this instance, the identity of the agency holding the theft report must be shown in the Miscellaneous (MIS) Field. (IDACS Manual Part II, Section H.) 4. A loaned, rented, or leased vehicle that has not been returned may not be entered in the file unless an official theft report is made or a filed complaint results in the issuance of a warrant charging embezzlement, theft, etc. (IDACS Manual Part II, Section H.) 5. If a felony vehicle is entered in the file, the whereabouts of the vehicle must be unknown. (IDACS Manual Part II, Section H.) 6. Partial license plate numbers must not be entered. (IDACS Manual Part II, Section H.) 7. If a license plate number exceeds eight characters, enter only the last eight digits in the LIC Field. The full plate number must then be shown in the MIS Field. (IDACS Manual Part II, Section H.) 8. When only one plate of a set is stolen or missing, a notation of this fact must be placed in the MIS Field of the entry. (IDACS Manual Part II, Section H.) 9. A Locate transaction is used by a recovering agency to indicate on another agency's record that the vehicle has been located or recovered. This is the only transaction that an agency can take against another agency's record. Every time a recovery is made on a vehicle entered into the Wanted Files, it is the recovering agency's OBLIGATION to place a locate against the record. Failure to do so may result in a false arrest, detaining an innocent citizen, a civil law suit, or worse, since the locate data is shown on a hit response and would indicate to another agency receiving a hit that the record is probably no longer active. (IDACS Manual Part II, Section H)
SECTION F VEHICLE FILE RISK ANALYSIS Risk in the Vehicle File results from procedures that expose the agency to serious error due to the lack of sufficient care in maintaining records. The risk identified is a record entered in IDACS/NCIC containing inaccurate and incomplete information, that is, information that will result in an erroneous hit or will prevent a proper hit from occurring. It is also defined as the risk of invalid information remaining in the System, that is, a record not being cleared when appropriate. Either risk is significant and may result in the arrest of an innocent citizen, the failure to arrest a sought-after criminal, or the death of an unsuspecting officer. Though this risk analysis has been written for the vehicle file, it can be easily used for other stolen property files as well. 1. Procedural Documentation for Entry A. Written procedure and checklist 1 B. Written procedure or checklist 2 C. Well-defined oral procedures 5 D. No well-defined procedures 10 2. Basis for Entry A. Officers report (written or oral), complainants written acknowledgment required 1 B. Officers report (written or oral) 2 C. Oral report by complainant, no follow up within twelve (12) hours 6 D. Oral report by complainant, no follow up 10 3. Quality Control Procedures A. BMV checked, entry checked by a second person, message filed with supporting documentation 1 B. BMV checked, entry checked by a second person 2 C. Entry checked by a second person, entry message filed with supporting documentation 4 D. BMV checked, entry message filed with supporting 5 documentation E. Entry checked by a second person 6 F. BMV checked 7 G. Entry message filed with supporting documentation 9 H. No quality assurance measures 10 4. Validation Procedures A. Agency has documentation to show that records are 1 validated by contacting the appropriate complainant B. Agency has a written policy requiring contact with 3 the appropriate complainant C. Agency has an oral policy that the complainant will 5 be contacted as part of the validation process. Documentation does not exist to support these contracts D. Agency does not comply with validation requirements 10 5. Hit Confirmation A. Case report used for hit confirmation 1 B. Log book or card file used for hit confirmation 8 C. No satisfactory procedure 10 6. Documentation of Procedures for Clearing Entries A. Written procedure and checklist 1 B. Written procedure or checklist 2 C. Well-defined oral procedures 5 D. No well-defined procedure 10 RISK LEVEL LOW RISK - Less than 13 points MODERATE RISK - 13 through 28 points HIGH RISK - More that 28 points Within each of the individual categories, risk is assessed as follows: 1-3 Low Risk 4-7 Moderate Risk, procedures should be reviewed and improved where possible 8-10 High Risk, procedures are insufficient and must be improved immediately
SECTION G WANTED PERSON FILE COMPLIANCE REQUIREMENTS 1. A Wanted Person record shall be entered into IDACS and NCIC for the following reasons. a. An individual (including a juvenile who will be tried as an adult) for whom a Federal warrant is outstanding. b. An individual (including a juvenile who will be tried as an adult) for whom a felony or serious misdemeanor warrant is outstanding. c. Probation and parole violators meeting the criteria in number 1 or 2 above. The following criteria applies to juveniles. Juvenile status is determined by the laws of the state of residence of the parent, guardian, person or agency entitled to legal custody of such juvenile. a. A juvenile who has been adjudged delinquent and is subject to the jurisdiction of the court making such adjudication, or to the jurisdiction or supervision of an agency or institution pursuant to an order of such court; and a) who has escaped from an institution or agency vested with the legal custody or supervision of such juvenile; or b) who has absconded while on probation or parole. Juveniles who have been charged with the commission of a delinquent act that would be a crime if committed by an adult, and who have fled from the state where the act was committed. Entry of a record in this category is permitted only when a petition has been filed in a court of competent jurisdiction in the requesting state where the violation of criminal law is alleged to have been committed. (IDACS Manual Part II, Section I.) 2. A timely entry into the wanted person file is necessary to ensure maximum system effectiveness. On a daily basis, all law enforcement agencies shall enter into the Indiana data and communication system (IDACS) computer the following: (2) All information concerning fugitives charged with any crime, including information concerning extradition. The average entry delay of record(s) checked in the agency was ______ day(s). (See Data Quality Review). (IC 5-2-5-12, IDACS Manual Part II, Section A.) 3. Before entering a record of a wanted person in IDACS/NCIC, the entering agency must attempt to determine, to the maximum extent possible, that extradition will be authorized if the individual is located in another state. For IDACS/NCIC purposes, extradition is the surrender by one state to another of an individual charged with or convicted of an offense outside its own territory and within the territorial jurisdiction of the other. If at the time of entry there is a limitation concerning extradition of the wanted person, such information should be placed in the Miscellaneous Field of the record. 4. In many instances, however, no forecast of extradition can be made at the time the wanted person is entered in file because extradition is not a law enforcement decision. If at some future time the entering agency (ORI) learns that the individual definitely will not be extradited, the NCIC record must be cancelled, and re-entered into IDACS only. (IDACS Manual Part II, Section I.) 5. In instances where an agency is absolutely certain that the wanted person will not be extradited, the individual's record must not be entered in NCIC. Such records shall only be entered into the IDACS Files. (IDACS Manual Part II, Section I.) 6. Where there is an extradition limitation, it must be entered in the MIS field of the record. (IDACS Manual Part II, Section I.) 7. A temporary felony want record may be entered to establish a "want" entry when a law enforcement agency needs to take prompt action to apprehend a person (including a juvenile) who has committed, or the officer has reasonable grounds to believe has committed, a felony. This individual may seek refuge by fleeing across jurisdictional boundaries while circumstances prevent the immediate acquisition of a warrant. A temporary felony want record must be specifically identified as such. A warrant for the arrest of the individual must be obtained as soon as possible and thereafter, the temporary felony want record must be either cancelled and a permanent wanted person record must be entered or the MKE must be modified to the permanent wanted person record. A temporary felony want record will be automatically removed from file after 48 hours. (IDACS Manual Part II, Section I.) 8. Only the agency that holds the warrant may make an IDACS/NCIC entry. The only exception is that any criminal justice agency or regional dispatch center may act as holder of the record for another agency which has no telecommunications equipment. (IDACS Manual Part II, Section I.) 9. A caution indicator should be added to the message key when it is known that an individual is armed and dangerous, has suicidal tendencies, has previously escaped custody, is a drug addict, or whatever is appropriate to the particular circumstances of the individual. The reason for the caution must be entered in the MIS field. (IDACS Manual Part II, Section I.) 10. Any agency that apprehends or locates a person who is indexed in the NCIC Wanted Person File, except the agency that entered the record, must place a locate message on the wanted person record. When an agency receives a record or multiple records in response to an inquiry, the inquiring agency must contact the ORI of each record possibly identical with the person in question to confirm the hit. Following confirmation with the originating agency, a locate message must be transmitted for each record on file for the subject. A record should not be located if the locating agency is outside of the extradition limitations set forth in the record. (IDACS Manual Part II, Section I) 11. An agency may enter a record for an unknown murderer in the name of "John" or "Jane Doe" using the homicide victim's descriptive data provided this type of warrant has been obtained. In such entries the victim's name should be listed as an alias, and his description and personal identifiers, including date of birth, Social Security number, and driver's license number, should also be placed in the record as well as a statement in the Miscellaneous Field that the victim's personal identification may be in the possession of "John" or "Jane Doe." (IDACS Manual Part II, Section I)
SECTION H WANTED PERSON FILE RISK ANALYSIS Risk in the Wanted Person File results from procedures that expose the agency to civil suit due to the lack of sufficient care in maintaining records. The risk identified is a record entered in NCIC containing inaccurate and incomplete information, that is, information that will result in an erroneous hit or will prevent a proper hit from occurring. It is also defined as the risk of invalid information remaining in the System, that is, a record not being cleared when appropriate. Either risk is significant and may result in the arrest of an innocent citizen, the failure to arrest a sought-after criminal, or the death of an unsuspecting officer. 1. Procedural Documentation for Entry A. Written procedure and checklist 1 B. Written procedure or checklist 2 C. Well-defined oral procedures 5 D. No well-defined procedures 10 2. Type of Warrants Entered A. Felony only 1 B. Felony and serious misdemeanors 3 C. All warrants 10 3. Extradition Review A. Formal review of extradition by appropriate 1 authority, confirmed in writing B. Formal review, but not confirmed in writing 2 C. Informal review 4 D. No extradition review 10 4. Basis for Entry A. Written request accompanied by warrant 1 B. Original warrant maintained by agency 2 C. Written request, no warrant maintained 3 D. Oral request, confirmed in writing after entry 5 E. Oral request only 10 5. Quality Control Procedures A. Criminal history records checked, entry checked 1 by a second person, entry message filed with supporting documentation B. Criminal history records checked, entry checked 2 by a second person C. Entry checked by a second person, entry message 4 filed with supporting documentation D. Criminal history records checked, entry message 5 filed with supporting documentation E. Entry checked by a second person 6 F. Criminal history records checked 7 G. Entry message filed 9 H. No quality assurance measures 10 6. Validation Procedures A. Agency has documentation to show that records are 1 validated by contacting the appropriate court or prosecutor B. Agency has a written policy requiring contact 3 with the appropriate court or prosecutor C. Agency has an oral policy that the court or 5 prosecutor will be contacted as part of the validation process. Documentation does not exist to support these contacts D. Agency does not comply with the validation 10 requirements 7. Hit Confirmation A. Original Warrant verified, case report reviewed 1 B. Original Warrant verified 3 C. Case report reviewed 5 D. Card file or log book reviewed 7 E. No satisfactory procedures 10 8. Documentation of Procedures for Clearing Entries A. Written procedure and checklist 1 B. Written procedure or checklist 2 C. Well-defined oral procedures 5 D. No well-defined procedures 10 RISK LEVEL LOW RISK Less than 21 points MODERATE RISK 21 through 34 points HIGH RISK More than 34 points Within each of the individual categories, risk is assessed as follows: 1-3 Low Risk 4-7 Moderate Risk, procedures should be reviewed and improved where possible 8-19 High Risk, procedures are insufficient and must be improved immediately
SECTION I NON-TERMINAL AGENCY ADMINISTRATIVE COMPLIANCE REQUIREMENTS AGENCY RECEIVES SERVICE FROM ______________________________________ 1. Agencies that enter records in IDACS/NCIC are responsible for their accuracy, timeliness, and completeness. (240 IAC 5-1-1 (b), IDACS Manual Part I Section D.) 2. Agencies that enter records in IDACS/NCIC are responsible for their accuracy, timeliness, completeness, and prompt removal. The accuracy of IDACS/NCIC records must be double-checked by a second party. That verification should include assuring that the available cross-checks, e.g., VIN/License Numbers, were made, and that data in the record matches the data in the investigative report. (240 IAC 5-1-1, IDACS Manual Part I, Section D.) 3. All IDACS user agencies shall validate, on a periodic basis, as prescribed to the user agency by IDACS, all IDACS wanted records entered on their authority. Validation of records shall be in conformity and compliance with rules set forth by IDACS. (b) Validation obligates the originating agency to confirm the record is COMPLETE, ACCURATE and is still OUTSTANDING or ACTIVE. (c) Validation is accomplished by reviewing the original entry and current supporting documents and by recent consultation with any appropriate complainant, victim, prosecutor, court, motor vehicle registry files, or other appropriate source or individual. In the event the originating agency is unsuccessful in its attempts to contact the victim, complainant, etc., the entering authority shall make a determination based on the best information and knowledge available whether or not to retain the original entry on file. Validation procedures must be formalized and copies of these procedures must be on file for review during an IDACS or NCIC audit. (240 IAC 5-2-7, IDACS Manual Part I Section F.) 4. Terminal agency agrees to ensure that hit confirmation is available twenty-four (24) hours a day on records entered into the wanted files. This includes being able to provide a substantive response to an inquiry within ten minutes. (240 IAC 5-2-9, IDACS User Agency Agreement) 5. Likewise, the originating agency has an obligation to supply a substantive response within (10) minutes to the inquiring agency This response shall include a confirmation or denial of the wanted notice, or the length of time it will take to respond. (240 IAC 5-1-1, IDACS Manual Part I Section D, Part II Section A.)