Go to TN.
- Social Media.
- CJIS Compliance and Data Encryption — Here’s What You Need to Know.
- How to Submit a Request.
- CJIS security policy areas.
Print This Page. Go to Search. Influence the policy of a government by intimidation or coercion, or 3. Affect the conduct of a government by crimes or kidnapping. Described in " Categories of individuals covered by the system: F.
You are here
Members of Terrorist Organizations. Unidentified Persons. Order No. Routine uses of records maintained in the system, including categories of users and the purposes of such uses: Data in NCIC files is exchanged with and for the official use of authorized officials of the Federal Government, the States, cities, penal and other institutions, and certain foreign governments. Possessions and U.
California Justice Information Services
Additionally, data contained in the various "want files," i. Storage: Information maintained in the NCIC system is stored electronically for use in a computer environment. Vehicle identification number; 2. Owner applied number; 3. License plate number; 4. Stolen License Plate File: 1. License plate number; 2. NCIC number. Stolen Boat File: 1. Registration document number; 2.
Hull serial number; 3. Owner applied number; 4. Serial number of gun; 2. Stolen Article File: 1. Serial number of article; 2. Type, serial number, denomination of security, and issuer for other than U.
Treasury issues and currency; 2. Type of security and name of owner of security; 3.
Social Security number of owner of security it is noted the requirements of the Privacy Act with regard to the solicitation of Social Security numbers have been brought to the attention of the members of the NCIC system ; 4. Wanted Person File: 1. Name and one of the following numerical identifiers: a. Date of birth; b. FBI number number assigned by the Federal Bureau of Investigation to an arrest fingerprint record ; c.
13 things to know about CJIS compliance - SecureLink
Social Security number it is noted the requirements of the Privacy Act with regard to the solicitation of Social Security numbers have been brought to the attention of the members of the NCIC system ; d. Operator's license number driver's number ; e. Miscellaneous identifying number military number or number assigned by Federal, state, or local authorities to an individual's record ; f.
Originating agency case number; 2. Vehicle or license plate known to be in the possession of the wanted person; 3. Foreign Fugitive File: See G, above.
Interstate Identification Index File: 1. Name, sex, race, and date of birth; 2.
FBI number; 3. State identification number; 4. Social Security number; 5. Miscellaneous identifying number. Missing Person File: See G, above, plus the age, sex, race, height and weight, eye and hair color of the missing person. Terrorist File: See G, above. Unidentified Person File: the age, sex, race, height and weight, eye and hair color of the unidentified person. Safeguards: Data stored in the NCIC is documented criminal justice agency information and access to that data is restricted to duly authorized criminal justice agencies.
The following security measures are the minimum to be adopted by all criminal justice agencies having access to the NCIC. Retention and disposal: Unless otherwise removed, records will be retained in files as follows: A. Vehicle File: a. Go to Search. Statistical Analysis Center.
Social Media facebook twitter youtube instagram wordpress linkedin.