The following policies are intended to provide a clearer understanding of terms and definitions common to wide-area radio communications systems and to facilitate a uniform application of the elements critical to the integrity and safe operation of the system. This information is made available to all users of the SAFE-T statewide radio system maintained and operated by the State of Indiana by the Integrated Public Safety Commission as established in IC 5-26.
These policies and recommended procedures are established as required by IC 5-26-2-2.
I. Policies of the Integrated Public Safety Commission
Background: The Integrated Public Safety Commission has established the following policies to assure that the SAFE-T statewide, 800 MHz, trunked radio system is operated in accordance with Federal Communications Commission (FCC) rules and regulations and to maintain the security and integrity of the statewide radio system for all users.
Policy: Policies of the Commission shall be effective upon passage and general notification to users, shall be applicable to all users of the statewide radio system and shall remain in effect until amended or rescinded by the Commission.
II. Eligible Users
Background: The SAFE-T statewide radio system utilizes frequencies intended for use by public safety agencies and regulated and assigned by the FCC under 47 CFR 90 et seq. This policy attempts to further define eligible users of the system as defined in 47 CFR 90 et seq. and IC 5-26-1-4.
Policy: The statewide radio system is established and maintained to assist public safety services in the protection of life, health or property. To that end, eligible users of the system shall be limited to agencies or individuals who provide direct or indirect services in support of the protection of life, health or property.
III. Voluntary Participation
Background: IC 5-26-3-4 defines the voluntary use of the system.
Policy: Except as provided in IC 5-26-6-2, eligible public safety agencies or individuals are not required to utilize the SAFE-T statewide radio system. Use of the System is voluntary.
IV. Commercial Use of the Radio System
Background: The SAFE-T system was established for use by public safety agencies. IC 5-26-1-4 defines a “public safety agency” as any federal, state, or local governmental entity eligible to hold an authorization in a public safety radio service as set forth in 47 CFR 90 et seq. It is the intent of the Commission to prohibit the use of public safety frequencies for the conduct of commercial ventures.
Policy: The SAFE-T statewide radio system shall not be utilized by any agency, individual or business to conduct commercial, private or for-profit business, except as authorized in support of the system.
V. Memorandum of Agreement
Background: The Commission’s intent is to make users of the system both comfortable with and knowledgeable of the business relationship entered into upon agreement to use the system.
Policy: Prior to use of the SAFE-T system, a Memorandum of Agreement outlining roles and responsibilities shall be executed between the Integrated Public Safety Commission and the user Agency. The form, frequency and applicability of the Agreement shall be established by the Commission.
VI. Hardware System Key Requirements
Background: A Hardware System Key enhances the security of the system by limiting the ability of unauthorized persons to program radios onto the system.
Policy: No radios will be allowed to be programmed on to the SAFE-T statewide, trunked radio system without the use of a Hardware System Key. The Commission recognizes that a Radio Hardware Key provides an extra layer of security to the integrity of the System.
VII. Radio De-programming
Background: The release of radios to the general public while those radios are still programmed to operate on the system presents a major security risk to the system and other users of the system.
Policy: It shall be the responsibility of each user Agency to assure that radios being sold, traded or scrapped are de-programmed prior to removal of the radio from the inventory of the Agency. This is to prevent the unauthorized use of the System by any future purchaser of the radio or its parts.
VIII. Programming Code-Plugs
Background: Agencies, individuals or vendors that password-protect individual radio code plugs endanger emergency response communication. This practice prohibits any other programmer from making changes to the programming of the radio, rendering the radios useless in situations where an emergency exists. In order for deployed personnel to communicate, the ability to make programming changes to a radio must be preserved.
Policy: Agencies, individual programmers and vendors shall not write-protect or password-protect radio code plugs. This will facilitate easier reprogramming of radios by appropriately designated radio programmers during emergency situations.
IX. Privately Owned Radios on the System
Background: From time to time, a private individual will purchase a radio with the intent of having that radio enabled on to the system.
Policy: A radio purchased by a private individual will not be enabled on the system without the prior written endorsement of a public safety agency.
X. Trunked System Talkgroup Security
Background: Talkgroups established on the trunked system and assigned to a specific agency are meant to provide that agency with a means of communicating solely with those personnel specifically authorized to have access to that talkgroup. Those agency talkgroups are not meant to be generally programmed into any radio for monitoring or use by any unauthorized user.
Policy: Talkgroups specifically assigned to an agency for their exclusive use shall not be programmed into other radios without the prior signed authorization of that agency. This policy does not apply to talkgroups created for mutual aid or special events. Such talkgroups may be programmed without authorization.
XI. Willful or Detrimental Interference
Background: Radios may be stolen, fall into the hands of an unauthorized user or may simply be causing interference to the system without the knowledge of the user.
Policy: The Integrated Public Safety Commission reserves the right to unilaterally inhibit any radio that is causing willful or detrimental interference to the system or any of its components.
XII. Violation of Policy or Agreement
Background: Policies and Agreements have been established to maintain the integrity of the system and the useful maintenance of the system for all users.
Policy: The Integrated Public Safety Commission reserves the right to limit or terminate any user agreement established with any agency, individual or vendor upon verification that Commission policies or agreements have been violated.
XIII. Integration of Emerging Technology
Background: Technology advancements have made it possible to connect Cellular networks (LTE) to Land Mobile Radio (LMR) systems. Third party software or hardware gateways that patch unlimited devices onto the LMR system could not only affect system capacity and performance, it could present a security risk.
Policy: The Integrated Public Safety Commission reserves the right to prohibit or inhibit third-party equipment or software that negatively impacts system integrity and/or security.