Ncic User Agreement

Routine use of records held in the system, including categories of users and the purposes for which these uses occur: Data contained in NCIC files is exchanged with and for official use by authorized officials of the federal, state, city, law enforcement and other institutions, as well as by certain foreign governments. Data is shared via NCIC lines with federal criminal justice agencies, criminal justice agencies in all 50 states, the District of Columbia, Puerto Rico, U.S. possessions, and U.S. territories. In addition, the data contained in the various “search files”, i.e. the stolen vehicle file, the stolen licence plate file, the stolen weapons file, the stolen objects file, the personal file sought, the securities file, the boat file and the missing person data can be recovered by the Royal Canadian Mounted Police. Criminal history data will be shared with non-criminal justice agencies for use as part of licensing local/state employment or for other purposes, but only if such dissemination is authorized by federal or state laws and authorized by the Attorney General of the United States. Challenge procedure: The Attorney General has excluded this system from the procedures for challenging the Data Protection Act. As part of this alternative procedure, described in the “Procedure for access to records” section above, the purpose of the requested protocol requires that the competent arrest authority, court or prison authority take the necessary steps to correct an inaccuracy specified in the file or to provide the information necessary to complete the protocol. Storage: Information managed in the NCIC system is stored electronically for use in a computer environment. Categories of persons covered by the system: A. Wanted persons, 5 and 6. I.

Interstate Identification Index File: A federal-state cooperative program for the intergovernmental exchange of criminal records information to facilitate the intergovernmental exchange of this information between criminal justice agencies. Described under “DATA SOURCES”: Data contained in the NCIC is provided by the FBI, federal, state, local, and foreign criminal justice agencies, and authorized courts. Categories of registration sources: The information contained in the NCIC system comes from local, state, federal and international criminal justice agencies. Systems exempted from certain provisions of the Privacy Act: The Attorney General exempted this system under paragraphs 52.C a(j)(2) and (k)(3) of paragraphs (c) (3) (3) (3) (3) (3) (1) (2) and (3), (E) (4) (G), (H), (e) (5), (e) (e) (e) (8) and (g) of the Privacy Act. The rules were published in accordance with the requirements of 5 U.S.C. 553(b), (c) and (e) and published on the Federal Register. PURPOSE: The purpose of maintaining the NCIC system is to provide a computerized database that allows a criminal justice authority to quickly access it and quickly disclose information in the system of other criminal justice authorities about crimes and criminals. This information assists authorized authorities in criminal justice and related law enforcement purposes, such as arresting refugees, searching for missing persons, searching for and returning stolen property, and protecting law enforcement officers who meet with people described in the system. Categories of persons covered by the scheme: B. 2. L. Missing Persons File: Described under “CATEGORIES OF PERSONS covered by the system: C.

Missing persons”. M. U.S. Secret Service Protective File: Described in “CATEGORIES OF PERSONS covered by the system: D.” N. Violent Criminal Gang File: A federal-state co-op program for intergovernmental information sharing on criminal gangs. For the purposes of this case, a “gang” is defined as a group of three or more individuals with a common interest, connection or activity characterized by criminal or delinquent behaviour. Described in “CATEGORIES OF PERSONS covered by the system: E. Members of violent criminal gangs”. O. Terrorist File: A federal-state cooperative program for the exchange of information on terrorist organizations and individuals.

For the purposes of this case, “terrorism” is defined as activities that involve acts that are violent or dangerous to human life that constitute a violation of the criminal laws of the United States or a state or that would constitute a criminal violation if committed within the jurisdiction of the United States or any state that appears to have the purpose of: 1. Intimidating or coercing a civilian population, 2. Influence a government`s policies through intimidation or coercion, or 3. Influence the behavior of a government through crime or kidnapping. Described in the section “Recoverability: Online access to NCIC data is obtained using the following search descriptors: System Maintenance Authority: The system is established and maintained in accordance with 28 U.S.C. 534; Department of Justice Appropriation Act, 1973, Pub. L. 92-544, 86 Stat. 1115, Securities Acts Amendment of 1975, Pub. L. 94-29, 89 Stat.

97; and 18 U.S.C Sec. 924e). Management Ordinance No. 10450, 3 CFR (1974). Categories of persons covered by the system: F. Members of terrorist organizations. P. Record for unidentified persons: Described under the heading “CATEGORIES OF PERSONS covered by the system: G. Unidentified persons.

USAGE CONSTRAINTS: Users of the NCIC system are limited to the permissions required to perform one or more authorized tasks. ACCESS RESTRICTIONS: All NCIC documents are protected from unauthorized access by appropriate administrative, physical and technical safeguards. These safeguards include restricting access to people who need to know to perform their official duties, as well as using locks, alarm devices, passwords, and/or encrypting data communications. AGENCY PROGRAM: The FBI may acquire, collect, classify, and retain identification, criminal, criminal, and other documents and share such information with authorized entities. Security precautions: Data stored in the NCIC is documented information of the Criminal Justice Authority, and access to this data is restricted to duly authorized criminal justice authorities. The following security measures are the minimum that must be taken by all criminal justice authorities who have access to the NCIC. Records Access Procedures: It should be noted that the Attorney General has excluded this system from the data protection act access and challenge procedures. However, the applicant has the following alternative procedures. The procedures by which computerized information about a person`s criminal records can be obtained from that person are: System Manager and Address: Director, Federal Bureau of Investigation, J. Edgar Hoover Building, 10th and Pennsylvania Avenue NW, Washington, DC 20535. The last iteration of the NCIC took place on September 11. In July 1999, he joined the FBI`s Division of Criminal Justice Information Services in Clarksburg, West Virginia.

A recent hardware upgrade of the NCIC system is responsible for this significant performance improvement. Categories of persons covered by the scheme: B. 1. J. Identification Records of Persons Enrolled in the United States Marshals Service Witness Security Program Accused of Serious and/or Material Crimes: Described under “CATEGORIES OF PERSONS Covered by the System: B”. K. Bureau of Alcohol, Tobacco, and Firearms (BATF) Violent Criminals Record: Described in “Retention and Disposal: Unless Otherwise Provided, Records are maintained as follows:. . .

.