Laserfiche WebLink
FDLE Criminal JuMice Usier Agreement <br />User --shall *review FALCON <br />N subscriptions to determine whethor.tho User is."011 <br />a-uthorized,to receive:The User <br />criminal lilsfo�y record p..n:an- indlyidudl;.. <br />shall indicate `the: continued -authori'Z'­ihg:r6Iati6fth1tp With that individual, i.6., the <br />Invest4ation,ar under supervision d by the User: CH RI received. as -a result ofa <br />�b <br />FALCON.sUbstriptioh mAy be disseminated ed for criminal justice pu rp' os-es, and is <br />subject. to the same legal and pol. jpy -resfftfions"gssPi0te d. with --CHRI. <br />.Q <br />SECTION III -SECURITY REOUIREMENT8- <br />.Va�'M the rul . ps, regulations; policies and' <br />The .User shall comply with :the Q <br />procedures esta.b[.11.0; dfo CJ. eti FCIC/N.Cl. II N-LETS, Which i..h.-clude but <br />.,Tbde established N ...C.,,J an <br />are' not lim"itEid to. System 84cu rity.., Personnel Security, Physical. Security, User <br />Authorization, Techb*ibal Security, Q-15sern . in . atipm of Information Obtained from the.. <br />Syste"his, and Destro'cti6n of Reco'rds. By accepting access as set forth above, the <br />U.s.-er"agreas. to adhere: to the-10:11oWingt6cUtity policies in. :order to ensure. <br />continuation - ,Qf that access:. <br />2. PERSONNEL BACKGROUND &C'REENING'. At:a rhihimium, -the Utdrsh'all <br />conduct A'_$tafe a.nd'hdonal firigerp6ftt-40sed records 066k an 1) all personnel <br />whazre-autftorized to access s.tate:andlor national CJI data or..sys-tems,211T <br />persohnelvho maintain/s4ppo.diffiforma(tidn tech:hblbgy corniponerits Used to <br />process., transmit or store anencrypted CJI, and other personnel, indluding but <br />not limited d to support personnel, contract(ors -and c - u9todia-1 st6ff, With unescorted <br />e <br />phy6lcW or 10gicial %access to phyt.1cally-,.see.uee'lbbeitions.-, as -deftnod'in the QS.P <br />'n ,onen process,: smit..or store <br />and/or IT comp ts.0sp-d to proce , fran unencrypteo C.jl ; The <br />.Ug& is -strongly encouraged to screen the applicant <br />plidabt by -other. available Med-ris, e.g., <br />10.,caj. pouft..r000 n 0 0 1 record dheck. <br />I" addition the fing rpfint-�.ase.d <br />1-1 The User shall r finge <br />..PrijAs of -pp.Tsons described in Section <br />I P, paragraph 2, for ' positive comparison agains1the statie.0nd national <br />criminal history and for searching of the Hot Files, <br />2 2 The results of the fingerprint-baged recordi .check -.shall b6 reviewed ' priar,to <br />g.ran1:419 access to,Cjl,qr components used to process/.store CJI, -including- <br />qcce support. ellmIn . online cfirhilhal <br />_§s for sup. -L The Qs;er.rnay-qondud(:a..pr.. ary ;1. <br />justice. employment b I heck using PurVosbtWe 'Tfor this. purpose. <br />2.2.1 If a record of. -any kind exists;, the 'User shall consult the FOLE <br />Guidelines for CJIS Access and notify the CSO fof review, Upon <br />.notification from the User-. the (C30 shall review tho.:maftler to <br />:determine. if access is approprJdAe and.,-officlally notify the. User in <br />il - <br />wr. ting. of the... GSOF8 decision regarding Access. <br />2.2.2 -Once the original background screening - has been .completed, if the <br />User learhs thatan employee with access to CJI, including any <br />personnel as iden'tifi . &d in Section Ill., paragraph 2, has a -criminal <br />40114,20 .14 page 10:of17 <br />Iq <br />