THE GEORGIA CRIME INFORMATION CENTER POLICY MANUAL

Transcription

THE GEORGIA CRIME INFORMATION CENTER POLICY MANUAL
THE GEORGIA CRIME
INFORMATION CENTER
POLICY MANUAL
Rev. 2011
Table of Contents
Chapter 1
Section
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
Chapter 2
Section
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.7.1
2.7.2
2.7.3
2.7.4
2.8
2.9
Introduction
Authority
Purpose
Criminal Justice Information System (CJIS) Network
International Justice and Public Safety Network
(Nlets)
INTERPOL
FBI's Criminal Justice Information System Division
(CJIS)
Policy (Defined)
Policy Implementation
Procedure (Defined)
GCIC Council
Georgia Crime Information Center
Terminal Agency Responsibilities
Agency Chief Executives
Terminal Agency Coordinator (TAC)
Terminal Operator
Training
Use of Volunteers and Other Non - Paid Personnel
Georgia CJIS Network Documentation
Record Quality
Entry and Removal of Records In GCIC/NCIC
Files
Accuracy
Completeness
Valid Records
Record Documentation
Case Documentation
GCIC Policy Manual
Rev. 2011
Table of Contents
Section
2.10
2.10.1
2.10.2
2.10.3
2.10.4
2.10.5
2.10.6
2.10.7
2.11
2.12
2.13
2.14
2.15
2.16
2.17
2.18
Chapter 3
Section
3.1
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.2
3.3
Record Transactions
Inquiry
Locate
Entry
Modify
Clear
Cancel
Supplemental Record Entry
CJIS Validation
Device or Data Circuit Requests
CJIS Network Terminal Operations (Defined)
Non - CJIS Network Terminal Operations (Defined)
Restrictions on Non - CJIS Network Terminal
Operations
Equipment Maintenance
Terminal and Communications Failure
Severe Weather Action
Agreements
Agreements
User Agreements
Service Agreements
Holder of Record Agreement
Management Control Agreements
Vendor Service Agreement
Computer Centers
Governmental Dispatch Centers
GCIC Policy Manual
Rev. 2011
Table of Contents
Chapter 4
Section
4.1
4.2
4.3
4.4
4.5
4.5.1
4.5.2
4.5.3
4.5.4
4.6
4.7
4.8
4.9
4.10
4.11
4.12
4.13
4.14
Chapter 5
Section
5.1
5.1.1
5.2
Criminal History
Sources
Physical Security and Maintenance
Personnel Security Standards
Purpose Codes
Dissemination
Logging of Disseminations
Methods of Dissemination to Criminal Justice
Agencies
Methods of Dissemination to Non - Criminal
Justice Entities
Other Authorized Disseminations
Citizenship
Department of Family & Children Services
Adoptions
Criminal Record Check for Nursing Home
Employment
Criminal Record Check for Providers of Care to
Children, the Elderly and Persons with Disabilities
(Including Volunteers)
Public Access to Felony Conviction Records
Public Housing Authority
Protection Order File
Criminal Record Checks on Law Enforcement
Officers for Family Violence Background
CJIS Security Passwords & Standards
CJIS Network Secure Passwords
Local Criminal Justice Agencies
Personnel Security Screening Standards
GCIC Policy Manual
Rev. 2011
Table of Contents
Chapter 6
Section
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.7.1
6.7.2
6.7.3
6.7.4
6.7.5
6.8
6.9
6.10
6.11
6.12
6.13
6.14
6.15
6.16
6.17
6.18
6.18.1
6.18.2
6.19
6.20
6.21
6.22
6.23
6.24
CJIS Network Operations
Message Retention
Unauthorized Messages
Authorized Messages
Administrative Messages
Georgia and National Broadcasts
Hot File Entry Access
Hit Confirmation Policy
Hit Message Definition
Probable Cause
Hit Confirmation Request
Hit Confirmation Response
Failure to Respond to Hit Confirmation
Requests
Help File
Weather Information Defined
Agency Information
Originating Agency Identifier (ORI) Number Request
and Dissemination Procedures
Message Retrieval Defined
Hazardous Materials Information (HAZMAT) Defined
GCIC/NCIC Data Files
Extradition
Caution Indicators
Temporary Felony Records
Missing Persons
Runaway Juveniles (Less Than 17 Years of Age
and Non-emancipated)
Runaway Minors (17 Years of Age and Nonemancipated)
Persons Placed on Probation or Parole
Vehicles Associated with Person Records
U.S. Secret Service Records
Canadian Arrest Warrants
Arrest or Detention of Foreign Nationals
NCIC Foreign Fugitive File
GCIC Policy Manual
Rev. 2011
Table of Contents
6.25
6.25.1
6.25.2
6.26
6.27
6.28
6.29
6.30
6.30.1
6.30.2
Chapter 7
Section
7.1
7.2
7.3
Appendix A
Gun File
Recovered Guns
Weapon Serial Number Guidelines
Article File
Boat File
Securities File
Retention Limits
Identifying and Correcting Hot-File Errors
Serious Errors
Non-Serious Errors
File Searches, Audits and Sanctions
Off-Line Investigative Searches
GCIC Audit Procedures
Sanctions
Examples of Consent Forms
GCIC Policy Manual
Rev. 2011
CHAPTER 1
INTRODUCTION
1.1
AUTHORITY
The Georgia Crime Information Center (GCIC), a division of the Georgia Bureau
of Investigation manages the Georgia Criminal Justice Information System (CJIS)
network under the provisions of Georgia law (O.C.G.A. § 35-3-30 thru O.C.G.A.
§ 35-3-40) and the Rules of the Georgia Crime Information Center (GCIC)
Council. The Rules of the GCIC Council are promulgated under the Georgia
Administrative Procedures Act; therefore, the Rules have the force and effect of
law. Policies in this manual are derived from federal laws and regulations, the
International Justice and Public Safety Network - Nlets policies, the FBI Criminal
Justice Information System (FBI CJIS) policies, Georgia laws, and the GCIC
Council Rules.
1.2
PURPOSE
This manual establishes policies that regulate the use of the Georgia Criminal
Justice Information System (CJIS) network. Criminal justice agency
administrators, including Terminal Agency Coordinators (TAC), must use the
Rules of the GCIC Council, the GCIC CJIS Security Policy, this Policy
Manual, the GCIC Operating Manual, and the NCIC Operating Manual as
references when developing and implementing agency policies and procedures
dealing with CJIS network operations.
1.3
CRIMINAL JUSTICE INFORMATION SYSTEM (CJIS)
NETWORK
The CJIS network has four major components:
1.
Devices and associated equipment operated by Georgia criminal
justice agencies.
2.
Records and files accessed through those devices.
3.
Computers and associated equipment used by GCIC and local or
regional computer centers that are connected to the Georgia CJIS
network.
GCIC Policy Manual
Rev. 2011
4.
1.4
Federal, state, local criminal justice and other authorized agency
employees who operate, support, use and benefit from the CJIS
network.
INTERNATIONAL JUSTICE AND PUBLIC SAFETY
NETWORK (Nlets)
The International Justice and Public Safety Network powered by the National
Law Enforcement Telecommunications System provides access to Nlets files and
criminal justice agency terminals and files in other states. The Deputy Director for
GCIC appoints Georgia's Nlets representative.
1.5
INTERPOL
INTERPOL is an information exchange agency between domestic and
international law enforcement agencies. INTERPOL forwards your message to an
international agency and relays a response back to your agency. To contact
INTERPOL, send an administrative message to DCINTER00 or call 202-6169000.
1.6
FBI’S CRIMINAL JUSTICE INFORMATION SYSTEM
DIVISION (CJIS)
The Criminal Justice Information System (CJIS), a division of the Federal Bureau
of Investigation (FBI) maintains files and records that are available nationwide.
The Georgia Bureau of Investigation (GBI) is the CJIS Systems Agency (CSA)
for Georgia and the Deputy Director for GCIC is the CJIS Systems Officer
(CSO). The Deputy Director for GCIC also serves as Georgia’s representative on
the CJIS Southern Region Working Group. To propose changes in GCIC/CJIS
policies or procedures, please submit in writing to the Deputy Director of GCIC
at:
Post Office Box 370748,
Decatur, Georgia 30037-0748.
1.7
POLICY (DEFINED)
A policy is an operational directive or rule based on provisions of law or other
authority.
Policies describe:
•
What must be done
GCIC Policy Manual
Rev. 2011
•
•
•
•
1.8
What may be done
What must not be done
To whom the policy applies
Sanctions for policy violations
POLICY IMPLEMENTATION
Criminal justice and other authorized agencies use written procedures to
implement policy. Enforcing written procedures and/or regulations is an agency
head's most effective means to accomplish policy objectives. Agency heads and
Terminal Agency Coordinators shall be responsible, within their agencies, for the
development of policies and procedures relating to CJIS network operations and
the administration of the terminal operator training program developed by GCIC.
1.9
PROCEDURE (DEFINED)
A procedure is a written step-by-step course of action that identifies:
•
•
•
•
•
•
Who must perform the action
What the action is
When to perform the action
Where the action is performed
How to perform the action
Why the action is performed
1.10 GCIC COUNCIL
Georgia law requires the Georgia Crime Information Center Council (the Georgia
Board of Public Safety) to establish (O.C.G.A. § 35-3-32):
•
Policies for network management by GCIC
•
Responsibilities of criminal justice, other authorized agencies and
GCIC
Sanctions for violations of Georgia law, CJIS network policies
and GCIC Council Rules
•
GCIC Policy Manual
Rev. 2011
1.11
GEORGIA CRIME INFORMATION CENTER
Georgia Law (O.C.G.A. § 35-3-33) and the Rules of the GCIC Council require
GCIC to:
•
Operate the network on a continuous basis.
•
Provide procedures, standards, and training necessary for the
uniform operation of the network.
•
Establish complete control over the network and restrict its use to
criminal justice and other authorized agencies (e.g., regional
dispatch centers).
•
Restrict the use of criminal justice information obtained through
the network for purposes authorized by law.
GCIC Policy Manual
Rev. 2011
CHAPTER 2
TERMINAL AGENCY RESPONSIBILITIES
2.1
AGENCY CHIEF EXECUTIVES
Chief executives (Sheriffs, Chiefs of Police, etc.) are responsible for their
agencies' compliance with laws, policies, and operational procedures regulating
the access to the CJIS network. The agency chief executive must ensure that:
•
A Terminal Agency Coordinator (TAC) is appointed and certified
within 90 days of appointment (GCIC Council Rule 140-2-.16).
Replacement TACs must be appointed immediately and certified
within 90 days. Notify the Deputy Director of GCIC, in writing, of
all primary TAC appointments and contact your GCIC Customer
Support Representative.
•
Agreements required by GCIC are current and signed by agency
heads (Refer to Chapter 3 for agreement descriptions) (GCIC
Council Rule 140-2-.04).
•
All agency employees (civilian and sworn) must sign current
Awareness Statements (GCIC Council Rule 140-2-.09).
•
All agency employees adhere to all GCIC/NCIC policies.
•
Written policies and procedures based on the current Rules of the
GCIC Council are established in order to comply with CJIS
network operation policies.
•
All agency employees who utilize any of the four major
components of the Georgia CJIS network are appropriately trained
and that appropriate training documentation is maintained by the
agency (GCIC Council Rule 140-2-.16).
•
A Local Agency Security Officer (LASO) is appointed to serve as
the agency’s Point of Contact (POC) for computer security
responsibilities. Refer to the GCIC CJIS Security Policy and/or
GCIC Council Rule 140-1-.02.
GCIC Policy Manual
Rev. 2011
2.2
TERMINAL AGENCY COORDINATOR (TAC)
A Terminal Agency Coordinator (TAC) is the person designated by an agency
head to serve as a liaison between the agency head and the Georgia Crime
Information Center for CJIS network related matters (GCIC Council Rule 140-1.02). Each TAC must successfully complete the Terminal Agency Coordinator
Certification course, administered by the Georgia Crime Information Center,
within 90 days of their appointment. The TAC will assist the agency head in
managing CJIS network related operations to ensure compliance with relevant
laws, regulations and policies.
The Terminal Agency Coordinator is required to (GCIC Council Rule140-2-.16):
•
At a minimum, successfully complete the Inquiry level of the
GCIC Computerized Based Training (CBT) Terminal Operator
Training Program before they are accepted into the TAC
Certification course.
•
Administer the GCIC Terminal Operator Training Program within
the agency, and provide appropriate GCIC/NCIC related training
for all other agency employees. Maintain documentation verifying
all CJIS related training for the agency.
•
Assist the agency chief executive in developing policies and
procedures for all CJIS network operations.
•
Ensure those terminal operators responsible for HIT confirmations
have immediate access to documentation supporting the agency's
active hot-file records.
•
Notify the GCIC Assistant Deputy Director for Security
Operations when a new agency head is appointed or elected and
arrange for the signing of new Agreements.
•
Serve as the point of contact for validations and all other
GCIC/NCIC network related matters.
•
Maintain access to CJIS network related documents such as:

GCIC Council Rules, GCIC CJIS Security Policy, GCIC
Policy Manual, GCIC Operating Manual, NCIC Operating
Manual, NCIC Code Manual, Operations Bulletins, updates
and revisions, and broadcast messages related to the operation
of the CJIS network.

Copies of current agreements (as required). Refer to Chapter 3.
GCIC Policy Manual
Rev. 2011
2.3
•
Maintain the User ID and passwords for agency personnel who
access the CJIS network.
•
And other responsibilities as designated by the GCIC Council
Rules and GCIC CJIS Security Policy.
TERMINAL OPERATOR
An agency employee whose primary job function includes accessing the CJIS
Network. (GCIC Council Rule 140-1.02).
2.4
TRAINING
GCIC has transitioned from the handwritten terminal operator workbook to a
Computerized Based Training (CBT) Program. Agencies will use the CBT
Terminal Operator Program to certify and re-certify all terminal operators. New
operators will be required to certify within 90 days of assignment as a terminal
operator.
The Terminal Operator Training Program will consist of information obtained
from the following reference/training materials:
•
•
•
•
•
•
2010 GCIC Policy Manual
2010 GCIC Operating Manual
GCIC Council Rules
GCIC Operations Bulletins
NCIC Operating Manual
NCIC Code Manual
GCIC is responsible for providing agencies with the updated, replacement
reference and training materials in electronic format.
There will be three levels of training:
1. Inquiry Level: If an operator has the ability to make inquires on any files
in the CJIS Network they must be trained as an Inquiry Level Operator.
2. Entry Level: If an operator has the ability to inquire as well as enter
and/or update information in the CJIS Network they must be trained as an
Entry Level Operator.
3. MDT Level: A Mobile Data Terminal (MDT) is a computerized device
used in law enforcement vehicles used to communicate with the CJIS
GCIC Policy Manual
Rev. 2011
Network. ONLY law enforcement officers accessing the CJIS Network
via MDT may be trained as MDT Level Operators.
Please refer to GCIC Operations Bulletin 2010-43 (Transition to New Terminal
Operator Training Program) for further information and access requirements.
Agency heads are responsible for the training of all agency employees who handle
CJIS data, affect CJIS data, use a CJIS network terminal or benefit from any data
received over a CJIS network terminal (GCIC Council Rule 140-2.16). Training
requirements for agency employees are as follows:
TITLE
TAC
Terminal
Operator
(All Levels)
2.5
TRAINING
Successfully complete the Terminal Agency
Coordinator Certification Course
administered by GCIC within 90 days of
appointment.
RECERTIFICATION
Attend a GCIC TAC
Refresher Course every
five (5) years.
At a minimum, successfully complete the
Inquiry level of the GCIC CBT Terminal
Operator Training Program.
Every two years
thereafter for the
duration of their
employment as a
terminal operator.
Every two years
thereafter for the
duration of their
employment as terminal
operator.
Must be certified within 90 days of
employment or assignment to Terminal
Operator duties.
USE OF VOLUNTEERS AND OTHER NON-PAID
PERSONNEL
Local criminal justice and other authorized agencies utilizing non-paid persons
from various sources such as volunteer groups, student interns, special assistance
programs arranged through various state agencies and others, must meet the
following requirements:
•
For persons used solely in areas housing public information, no special
requirements are necessary.
•
Access to criminal justice information (i.e. criminal history, or any
information via a CJIS network terminal), must be restricted to
authorized persons who are trained to properly handle, safeguard, and
destroy such information.
GCIC Policy Manual
Rev. 2011
•
Agency heads permitting non-paid persons to work in restricted areas
must process each person as a criminal justice employee by:
 Completing two applicant fingerprint cards marked “Criminal
Justice Employment” and submitting them to GCIC or submitting
applicant prints via livescan prior to giving non-paid personnel
access to restricted areas.
 Having all non-paid personnel sign a current Awareness Statement.
Having all non-paid personnel review the Georgia Computer
Systems Protection Act (O.C.G. A. § 16-9-90 thru O.C.G.A. § 169-94, O.C.G.A. § 35-3-38).
 Providing In-service training to non-paid personnel on the Security
and Integrity of Criminal Justice information.
 Reviewing the GCIC Council Rules with non-paid personnel.
 Providing continual supervision and monitoring of non-paid
personnel.
2.6
GEORGIA CJIS NETWORK DOCUMENTATION
CJIS Network documentation includes:
•
•
•
•
•
•
•
•
•
Georgia Crime Information Center Council Rules
GCIC CJIS Security Policy
GCIC Policy Manual
GCIC Operating Manual
GCIC Operations Bulletins
NCIC Operating Manual
NCIC Code Manual
Georgia CJIS Network Terminal Operator Training Material
Records supporting the training, testing, certification and recertification of Terminal Operators
GCIC authorizes the use of CJIS network documentation for legitimate criminal
justice and other authorized agencies only. All documentation must be
maintained in a secure and controlled area. Documentation must be updated as
revisions are made available by GCIC. When documentation is invalid or no
longer current and cannot be updated, it must be destroyed in a secure manner.
Completed training media is the property of GCIC. As the original training
records, the completed training media shall be retained by the agency for the
duration of employment of the employee. Should an employee leave an agency,
GCIC Policy Manual
Rev. 2011
the training documentation shall be transferred to the TAC of the employing
agency upon their written request.
When an employee leaves an agency and the training documentation has not been
requested by another agency, the agency holding the training documentation has
the option of retaining the training documentation or destroying it 30 days after
the certification period has expired.
Access to such documentation by unauthorized agencies or personnel must be
approved by GCIC.
2.7
RECORD QUALITY
Each agency is responsible for maintaining the quality of records entered into the
GCIC/NCIC computerized files. Quality refers to the timeliness, accuracy,
completeness and validity of records.
2.7.1 ENTRY AND REMOVAL OF RECORDS IN GCIC/NCIC FILES
Record entries must be made within 12 hours (O.C.G.A. § 35-3-36, GCIC Council
Rule 140-2-.13) after determination by law enforcement agencies that a wanted
person should be arrested, that identifiable property is reported as stolen, or an
adult is reported missing by a parent, guardian, or next of kin. *Note: Per
Federal Law and NCIC Policy, when agencies receive reports of missing
juveniles, including runaways or any person less than 21 years of age, the
records must be entered within two hours after enough information is obtained to
complete an entry (42 USCS § 5780).
All agencies operating a Georgia CJIS network device shall remove entries when
arrest warrants have been served or recalled, stolen identifiable property has been
recovered, or missing persons have been located.
All agencies operating Georgia CJIS network devices are responsible for the
timely removal of record entries made via the CJIS device when they are no
longer valid.
Terminal agencies must develop and implement policies and procedures that will
ensure compliance with GCIC/NCIC HIT confirmation requirements.
GCIC Policy Manual
Rev. 2011
2.7.2 ACCURACY
An accurate record contains:
•
•
•
•
Correctly spelled names
Correctly entered identifying numbers
Data identical to the information in supporting documents
Extradition limits for wanted persons
Agency Heads must develop policies and procedures to ensure that terminal
operators receive all the information needed for record entries.
2.7.3 COMPLETENESS
A complete record must include:
•
•
All information available at the time of the record entry
The addition of new information when it becomes available during
investigations and validations
Agency Heads must develop policies and procedures to ensure that terminal
operators receive all the information needed for record entries.
2.7.4 VALID RECORDS
A GCIC/NCIC record is valid when:
•
•
•
•
2.8
Supporting documentation exists and is current and accurately
identifies the object of the record entry
Wanted person entries are supported by valid active warrants
Missing persons have not been found
Stolen property has not been recovered
RECORD DOCUMENTATION
Records entered into GCIC/NCIC files must be supported by documentation
(GCIC Council Rule 140-2-.13). Original arrest warrants, copies of protection
orders, missing person reports, pick-up orders, theft reports, and/or affidavits must
be retained on site in the originating agency's case files until record entries are
removed from GCIC/NCIC files.
GCIC Policy Manual
Rev. 2011
Agencies with devices on the Georgia CJIS network, who have agreements to
make entries for other agencies, shall require copies of such supporting
documents from that agency prior to making record entries.
The originating agency must establish procedures that permit the terminal agency
to confirm all HITS within the time limits established by GCIC and NCIC.
2.9
CASE DOCUMENTATION
GCIC CJIS worksheets may be used when entering a record into the GCIC/NCIC
computerized files. You may also fill in your entry terminal screen and print
before transmitting to utilize as additional case documentation.
Some required information items must be coded prior to entering records into the
GCIC/NCIC files. The GCIC Operating Manual, the NCIC Operating Manual,
the NCIC Code Manual and the NCIC On-Line Code Manual contain coding
instructions.
Terminal operators must update case file documentation after modifying, clearing
or canceling record entries. Successful entry, modification, supplemental entry,
clearance and cancellation notifications must be retained.
Terminal operators must include all CJIS network documentation pertaining to a
particular case with the corresponding case file. If record entries, modifications,
supplemental record entries, clearances, or cancellations are performed for
another agency, the entering agency is responsible for providing copies of ALL
printouts pertaining to the particular case along with copies of any case
documentation to that agency.
2.10
RECORD TRANSACTIONS
Terminal operators can perform eight types of GCIC/NCIC record transactions:
Inquiry
Locate
Entry
Modify
Clear
Cancel
Supplemental Record Entry
File Transfer (see NCIC Operating Manual)
GCIC Policy Manual
Rev. 2011
2.10.1 INQUIRY
Inquiry messages can be sent to specific GCIC/NCIC files.
Inquiries should be made on the following:
Persons:
• Subjects who are arrested or detained
• Arrested persons or inmates, prior to release from custody
• Subjects under investigation
• Wanted/missing persons prior to record entries
• Suspects or key witnesses in pending cases
• Unidentified dead bodies
• Drivers records prior to record entries
• Criminal history records prior to record entries
Vehicles:
• Recovered vehicles, vehicle parts, trailers and license plates when
found or prior to disposal
• Stolen vehicles, vehicle parts, trailers and license plates
• Abandoned vehicles, vehicle parts, trailers and license plates prior to
record entry
• Vehicles involved in felony crimes to determine if they are associated
with warrants
• Vehicles associated with wanted persons
• Vehicle registration prior to record entries
Property: (Guns, Articles, Boats, and Securities) when property is:
• Found
• Seized
• Recovered guns
• Pawned
• Stolen, prior to entering the record
2.10.2 LOCATE
Locate messages must be sent by recovering or apprehending agencies after
receiving a positive Hit Confirmation. Locate messages are used to notify
originating agencies that the sending agency has control of the person or property
described in their record (O.C.G.A. § 35-3- 36(m). A proper locate is the basis
for the ability to complete a detainer warrant entry. A locate message must be
sent within one hour of receipt of the positive hit confirmation.
GCIC Policy Manual
Rev. 2011
If your agency sends a positive hit confirmation and does not receive a locate
message within one hour, send a terminal message to the Integrated CJIS Data
Center, terminal code GCCC.
2.10.3 ENTRY
Entries establish records in the GCIC/NCIC files (O.C.G.A. § 35-3-36(l), GCIC
Council Rule 140-2-.13). When entering a record, include all available
information, which will increase the possibility of a Hit.
2.10.4 MODIFY
Modifications add, change, or remove information in records already in
GCIC/NCIC Files (GCIC Council Rule 140-2-.13). Only the originating agency
can authorize modification of a record entry.
Records must be modified:
• to correct inaccurate information.
• to add additional information as soon as it becomes available
• to delete information no longer applicable
2.10.5 CLEAR
Clearing a record removes it from the GCIC/NCIC files when recoveries or
apprehensions occur (O.C.G.A. § 35-3-36(m), GCIC Council Rule 140-2-.13).
Only the originating agency can authorize the clearance of a record.
Clear records when:
•
•
•
Wanted persons have been apprehended.
Missing persons have been found.
Stolen property has been recovered.
2.10.6 CANCEL
Canceling a record removes it from GCIC/NCIC files when it is no longer valid
or cannot be supported by documentation, (O.C.G.A. § 35-3-36(m), GCIC
Council Rule 140-2-.13). Only the originating agency can authorize the
cancellation of a record.
GCIC Policy Manual
Rev. 2011
Cancel records when:
•
Warrants are no longer valid, stolen property reports are unfounded,
etc.
•
Documentation (warrants, missing person’s reports, theft reports, etc.)
no longer exists to support the record.
2.10.7 SUPPLEMENTAL RECORD ENTRY
A supplemental record is used to add additional identifiers to an existing record.
Only the agency that entered the original record may add additional identifiers to
a record.
2.11 CJIS VALIDATION
All law enforcement and criminal justice agencies with wanted/missing persons,
protection orders, gang file entries, and/or stolen property record entries in
GCIC/NCIC computerized files are required to participate in the record validation
program established and administered by GCIC and NCIC (GCIC Council Rule
140-2-.14).
Records from the monthly validation listing that are not validated by the suspense
date will result in automatic removal.
Validation procedures, records and supporting documentation are subject to GCIC
and NCIC audits.
2.12 DEVICE OR DATA CIRCUIT REQUESTS
To order, relocate, add, or replace CJIS network devices or lines, the agency
head must send a written request to the Georgia Crime Information Center at least
60 days prior to the date of the proposed action.
Any changes or additions of terminals or lines are subject to approval from
GCIC and the Georgia Technology Authority (GTA). Changes or relocation of
CJIS network terminal or lines, without prior authorization from GCIC, may
result in loss of service.
2.13 CJIS NETWORK TERMINAL OPERATIONS (DEFINED)
Services provided through the CJIS network are CJIS network terminal
operations. These operations are described in the GCIC Operating Manual and
GCIC Policy Manual
Rev. 2011
NCIC Operating Manual. Operations can be performed only using devices and
other associated equipment connected to the CJIS network.
2.14 NON-CJIS NETWORK TERMINAL OPERATIONS
(DEFINED)
Non-CJIS network terminal operations are applications or local computer system
programs that are not provided through the CJIS network. This includes word
processing, database management, spreadsheet analyses and various software
applications.
2.15 RESTRICTIONS ON NON-CJIS NETWORK TERMINAL
OPERATIONS
Terminal agencies may use terminals that access the CJIS network to perform
non-CJIS network terminal operations concurrently with CJIS network terminal
operations in compliance with GCIC CJIS Security Policy. However, such
operations cannot:
•
interrupt or interfere with continuous CJIS network access to the
terminal
•
interrupt or interfere with continuous CJIS network access to other
CJIS network terminals, within the same agency or on the same data
line
•
prevent or delay immediate receipt of incoming CJIS network
messages
•
prevent, delay or adversely affect a terminal operator's ability to
perform CJIS network terminal operations, including HIT
confirmation procedures
2.16 EQUIPMENT MAINTENANCE
CJIS network terminal agencies are responsible for the maintenance of terminals,
printers, and other equipment which connect to the CJIS network. This includes
maintenance or service contracts with appropriate vendors or in-house
maintenance by qualified agency technicians.
GCIC Policy Manual
Rev. 2011
If agency equipment connected to the CJIS network does not operate
properly or adversely affects the CJIS network, CJIS network access will
be suspended by GCIC until the equipment is repaired or replaced.
2.17 TERMINAL AND COMMUNICATIONS FAILURE
Procedures must be established by the agency for reporting problems with a
terminal connected to the CJIS Network. The TAC must make the procedures
available to all operators.
2.18 SEVERE WEATHER ACTION
CJIS network terminal agencies must establish written procedures that ensure the
prompt deactivation of terminals, modems, and diagnostic units during severe
weather conditions. Refer to the Introduction section of the GCIC Operating
Manual.
CJIS network devices must have current maintenance contracts with appropriate
vendors for the data communications equipment that connect to the CJIS network.
Maintenance contracts ensure that equipment will be repaired as required and
that malfunctions will not adversely affect the CJIS network service to your
agency or to other CJIS agencies.
GCIC Policy Manual
Rev. 2011
CHAPTER 3
AGREEMENTS
3.1
AGREEMENTS
State and federal laws, GCIC Council Rules, GCIC CJIS Security Policy, NCIC
and Nlets policies require that signed agreements between GCIC and law
enforcement agencies, a law enforcement agency and another law enforcement
agency, a law enforcement agency and a non-criminal justice agency, etc. must be
maintained (GCIC Council Rule 140-2-.04).
3.1.1 USER AGREEMENT
Heads of all criminal justice and other authorized agencies, including managers of
computer interface agencies, must sign a User Agreement with the Georgia Crime
Information Center (GCIC Council Rule 140-2-.04). Such agreements identify
the duties and responsibilities of criminal justice agencies and GCIC concerning
use of the CJIS network, training, and compliance with state and federal laws and
rules.
3.1.2 SERVICE AGREEMENT
A Service Agreement must be initiated between a terminal agency that enters
GCIC/NCIC records and/or handles HIT confirmation procedures and the agency
for which the service is provided (GCIC Council Rule 140-2-.13). Service
Agreements outline the responsibilities of the agencies. Except in emergencies,
terminal agencies must not enter records into GCIC/NCIC computerized files for
non-terminal agencies unless Service Agreements are in force. A non-terminal
agency must have a signed User Agreement with GCIC before requesting service
from a terminal agency. The Service Agreement should contain responsibilities
and procedures for each agency regarding:
•
•
•
•
•
Record entry, modification, clearance or cancellation
Record documentation
Types of inquiries performed against the GCIC/NCIC files
Validation of records
HIT notification and response procedures
GCIC Policy Manual
Rev. 2011
3.1.3 HOLDER OF RECORD AGREEMENT
Any law enforcement terminal agency, governmental dispatch center, or
governmental regional dispatch center may act as holder of record on behalf of
another agency and may place its own ORI in a record entry only when a written
agreement exists between the entering agency and the agency on whose behalf the
record is entered (GCIC Council Rule 140-2-.13). The agreement must state each
agency’s legal responsibilities for records entered in GCIC/NCIC files.
3.1.4 MANAGEMENT CONTROL AGREEMENT
A Management Control Agreement, signed by the head of each agency involved,
sets forth the responsibilities of a criminal justice agency that oversees the
operations of a non-criminal justice agency, e.g. E911 or local ‘interface’
computer center providing CJIS network access (GCIC Council Rule 140-2-.04).
The agreement requires a criminal justice agency to:
•
Conduct background checks, to include a fingerprint identification
check, of all job applicants or employees who will have access to
criminal justice information
•
Disqualify unsuitable job applicants or remove current employees for
just cause
•
Ensure that on-site security and access controls are established and
maintained by the manager of the non-criminal justice agency
The criminal justice agency head has the authority to remove personnel
from use of or access to the CJIS network.
3.1.5 VENDOR SERVICE AGREEMENT
Heads of criminal justice agencies who wish to use a private vendor for their
computer system must sign a Vendor Agreement and provide a copy to GCIC.
3.2
COMPUTER CENTERS
Each computer center operated by employees of a non-criminal justice agency
which provides CJIS network service to a criminal justice agency must sign a
User Agreement with GCIC and a Management Control Agreement with the
principal criminal justice agency served by the computer center.
GCIC Policy Manual
Rev. 2011
3.3
GOVERNMENTAL DISPATCH CENTERS
Each dispatch center operated by a non-criminal justice agency providing CJIS
network service to criminal justice agencies must sign a User Agreement with
GCIC and a Management Control Agreement with the principal criminal
justice agency served by the dispatch center.
GCIC Policy Manual
Rev. 2011
CHAPTER 4
CRIMINAL HISTORY
4.1
SOURCES
Criminal History Record Information (CHRI) is available through the CJIS
network from:
•
•
•
GCIC computerized files
FBI computerized files
Computerized files in other states
CHRI may also be available through access to local and city systems.
The FBI Interstate Identification Index (III or Triple I) provides access to criminal
record information contributed by participating states and the FBI. The FBI
furnishes criminal records on federal offenders and records originating in the
states that do not contribute their records to III or are not a National Fingerprint
File (NFF) state. The FBI Criminal Justice Information Services (CJIS) Division
operates the Interstate Identification Index (III).
The National Fingerprint File (NFF) places primary responsibility for
maintenance and dissemination of criminal history record information on each
state repository, instead of the FBI. The current NFF states are: Colorado,
Florida, Georgia, Hawaii, Idaho, Kansas, Montana, New Jersey, North Carolina,
Oklahoma, Oregon, Tennessee and Wyoming.
4.2
PHYSICAL SECURITY AND MAINTENANCE
Recipients of CHRI must provide a secure area, out of the view of the public and
unauthorized personnel, for the handling and retention of CHRI. Criminal justice
and other authorized agencies shall institute reasonable procedures to protect any
central repository of criminal history record information from any unauthorized
access, theft, sabotage, fire, wind, flood, power failure or other natural or manmade disasters. A written policy must be created, maintained and updated as
necessary by each agency (GCIC Council Rule 140-2-.08). In addition, the
agency must meet all standards provided by the GCIC CJIS Security Policy.
4.3
PERSONNEL SECURITY STANDARDS
All personnel directly associated with the accessing, maintaining, processing,
dissemination or destruction of Criminal Justice or Criminal History Record
Information shall be specially trained. The training shall provide employees with
GCIC Policy Manual
Rev. 2011
a working knowledge of federal and state regulations and laws governing the
security and processing of criminal history information. Employers are
responsible for ensuring that their personnel receive such training within 60 days
of employment or job assignment and every two years; to include Security and
Integrity training for criminal justice and all other authorized employees.
4.4
PURPOSE CODES
Purpose codes are used to indicate the intended use of requested Criminal History
Record Information. Valid purpose codes are as follows:
C
The Administration of Criminal Justice (CJ) is the
performance of any of the following activities: Detection,
apprehension, detention, pretrial release, post-trial release,
prosecution, adjudication, correctional supervision, or
rehabilitation of accused persons or criminal offenders. Used
for criminal investigations of domestic violence or stalking
cases by law enforcement agencies.




Displays complete Georgia criminal history except sealed
and destroyed juvenile records.
Disseminates III criminal history.
Authorized for criminal justice use only.
No consent required.
Security of a criminal justice facility:
 Vendors or contractors at the CJ agency, who are NOT
involved with the actual administration of criminal justice
at the CJ agency, e.g. carpet cleaner, individuals
responsible for maintaining vending machines, janitors,
cooks, etc.
 Volunteers at the CJ agency who are NOT involved with
the actual administration of criminal justice at the CJ
agency, e.g. participants in community ride along
programs, volunteers at a confinement facility who are
providing social or community services rather than
rehabilitative services, etc.
 Confinement facility visitors.
 Inmates of a confinement facility.
 Inmate’s mailing list where there is reason to believe that
criminal activity is occurring or has occurred.
D
Domestic Violence and Stalking - Authorized for uses by
civil or criminal courts in domestic violence or stalking cases
(must submit query with ORI ending in A, D, J)
GCIC Policy Manual
Rev. 2011



E
Authorized for non-criminal justice purposes where consent
is provided. Employment, military, firefighters, licensing,
international travel, inspection of one’s own criminal history
record, nursing home, prospective adoption/foster parents.


F
Displays complete Georgia criminal history except sealed
and juvenile records.
Disseminates III criminal history.
No consent required.
Displays complete Georgia criminal history except sealed
and juvenile records.
Requires consent of individual.
Concealed Carry Permits – Authorized for use by
Probate Courts for issuing concealed permits. As of July 1,
2006, any person prohibited from possessing firearms pursuant
to federal law may not be issued a pistol permit or temporary
renewal permit (O.C.G.A. § 16-11-129). The amended statute
requires a background check of the FBI’s National Instant
Criminal Background Check System (NICS) prior to issuance
of permits and renewals as well as a check of the U.S.
Immigration and Customs Enforcement (ICE) records for noncitizen applicants. (Please refer to GCIC Operations Bulletin
2009-08).





Displays complete Georgia criminal history to include
sealed records that contain completed first offender
sentences for drug offenses.
Does not display other sealed or juvenile records.
Disseminates III criminal history.
Probate Court ORI must be used to receive complete
records and NICS checks.
Requires consent of individual (permit application is
acceptable as consent).
Weapon release/transfer checks – Authorized for use by
Police Departments and Sheriff’s Offices to check persons
who pawned firearms and before returning weapons from
evidence.


Displays complete Georgia criminal history except sealed
and juvenile records.
No consent required.
GCIC Policy Manual
Rev. 2011
H
Public Housing Authority (PHA) use allowed for IQ only.
Public Housing Authority ORI ending in Q is required.





J
The IQ responses will provide a list of three subjects
whose name and personal descriptors match or are close to
those of the inquiry. The local law enforcement agency is
authorized to inform the PHA that the applicant may
have a criminal history within Georgia and the FBI’s
Interstate Identification Index.
If the PHA wants to obtain the full NCIC III criminal
history record, the applicant’s fingerprints must be
submitted through an approved channeling agency. The
FBI will provide applicant cards, bearing the PHA ORI
number, without cost.
If the FBI makes a positive identification, the matching
record from the III file will be provided to the PHA. If a
negative match is made, the FBI will advise the PHA that
the subject has no criminal history record on file.
Requires consent of individual.
The option of using Purpose Code E with a signed consent
form or fingerprint cards for a Georgia record has not
changed.
Criminal Justice (CJ) Employment – civilian employment
with a criminal justice agency or the screening of employees
of other agencies over which the criminal justice agency
maintains management control.



Displays complete Georgia criminal history except sealed
and juvenile records.
Disseminates III criminal history.
Requires consent of individual.
This code is also used for the following:
Security of a criminal justice facility
 Vendors or contractors at the CJ agency who ARE
involved with the actual administration of criminal justice
at the CJ agency, e.g. personnel involved with maintenance
of computer systems, upgrading record systems, data entry
clerk, etc.
 Volunteers at the CJ agency, who ARE involved with the
actual administration of criminal justice at the CJ agency,
e.g. volunteer dispatcher, volunteer data entry clerk,
volunteers at a confinement facility who are providing
rehabilitative services, etc.
GCIC Policy Manual
Rev. 2011
L
Lawyer
 Displays complete Georgia criminal history except
juvenile records.
 Local criminal justice agencies may process CHRI requests
from a Public Defender’s Office when that Office has a
State assigned ORI (ends in S). When processing these
CHRI requests, the local agency must use the Public
Defender’s ORI and purpose code L. Consent of the
individual (criminal defendant or witness) is not required.
M
Individual is applying for employment with a facility, as
defined in O.C.G.A. §37-3-1 or O.C.G.A. § 37-4-2, that
provides services to persons who are mentally ill, as defined in
O.C.G.A. §37-3-1, or mentally retarded, as defined in
O.C.G.A. § 37-4-2. Applicants seeking employment with
facilities per statute.


N
Individual is applying for employment with a nursing home,
personal care home or a person or entity that offers day care
for elderly persons. Applicants seeking employment with
facilities per statute.


O
Displays complete Georgia criminal history to include
completed first offender sentences for certain offenses
when the offender was discharged on or after July 1, 2004.
Requires consent of individual.
Displays complete Georgia criminal history to include
completed first offender sentences for certain offenses
when the offender was discharged on or after July 1, 2004.
Requires consent of individual.
Authorized for use by Georgia Insurance Commissioner
(GA0603900).

Displays complete Georgia history except for local
expungements and juveniles.
P
Public Records
 Displays Georgia felony convictions only.
 No consent required.
S
Security Clearance - Authorized for use by Federal SCIA
GCIC Policy Manual
Rev. 2011
agencies with an ORI that ends with an R


V
VISA Applicants Authorized for use when the III transaction
is made for the purpose of determining eligibility for visa
application. Limited to IQ inquiries by the Department of
State, Consolidated Immigrant Processing Visa Center.


W

Displays complete Georgia criminal history to include
completed first offender sentences for certain offenses
when the offender was discharged on or after July 1, 2004.
Requires consent of individual.
Exigent Purposes - Authorized for use by DHR Office of
Investigative Services (GA060019T) for emergency placement
of children under exigent circumstances.
There is a requirement to follow up with submission of
fingerprints within 15 days, unless there is no placement and
then that must be logged by DHR.



Z
Disseminates III criminal history.
Requires consent of individual.
Individual is applying for employment with a public school,
private school, child welfare agency or a person or entity that
provides day care for minor children or after school care for
minor children. Applicants seeking employment with facilities
per statute.

X
Displays complete Georgia record except sealed and
juvenile records.
Disseminates III criminal history.
Displays complete Georgia criminal history except sealed
and juvenile records.
Disseminates III criminal history.
No consent required.
Criminal Justice Employment - Authorized for criminal
justice employment checks on sworn personnel/personnel
certified by POST.



Displays complete Georgia criminal history to include
sealed records that contain completed first offender
sentences for any offense.
Disseminates III criminal history
Requires consent of individual.
GCIC Policy Manual
Rev. 2011
Other employees who are POST-certified and/or designated as
peace officers:







Employees of the Department of Transportation in the
Office of Permits and Enforcement
Employees of the Department of Juvenile Justice who are
designated by the commissioner to investigate and
apprehend unruly and delinquent children
Employees of the Department of Corrections or municipal
Correctional institutions that employ 300 or more
Correctional officers, county probation systems, and
county correctional institutions who are authorized to
exercise powers of arrest.
Employees of the State Board of Pardons and Parole
Administrative investigators who are agents, operatives,
investigators, or officers of this state whose duties include
the prevention, detection and investigations of violations
of law and the enforcement of administrative, regulatory,
licensing, or certification requirements of his or her
respective employing agency
POST-certified jail and juvenile corrections officers
POST-certified communications officers
Definitions:
1. Completed First Offender Act - O.C.G.A. § 42-8-62. Seals only the specific
charge(s) for which the offender received the First Offender Act discharge.
All other charges, containing other dispositions, will be released.
2. Local Expungement - O.C.G.A. § 35-3-37(d). Seals only the specific charge(s)
approved for such expungement. All other charges, containing other
dispositions, will be released.
3. Sealed Record – Completed First Offender Act disposition and local
expungement records. Seals only the specific charge(s) approved for such
sealing. Does not include exclusions noted in O.C.G.A. § 35-3-34.1 when the
offender was discharged under the First Offender Act on or after July 1, 2004.
Any other charges, with other dispositions, will be released.
4. Juvenile – An offender who was 16 years of age or younger at the time of arrest,
charged with a felony offense and not being treated as an adult. Active and sealed
juvenile records are available to law enforcement for administration of criminal
justice purposes. Court order required for release of destroyed juvenile records to
criminal justice agencies.
GCIC Policy Manual
Rev. 2011
The following chart indicates the files that are checked and which purpose
codes require consent:
Purpose
Codes
Consent Form
Required*
C
F
J
E
P
H
D
L
M
N
O
S
V
W
X
Z
X
X
X
X
X
X
X
X
X
X
Checks
Georgia
CCH
Checks FBI
III
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Disseminates
Georgia First
Offender
Information
X
X**
X
X
X
X**
X**
X
X
X
X**
X
X
X
*A set of applicant fingerprint cards may be used instead of a signed consent form.
**Only certain types of offenses will be disseminated.
Refer to Appendix A for examples of consent forms.
4.5
DISSEMINATION
State and Federal laws control the dissemination of CHRI. CHRI may be
requested via terminal and disseminated for:
•
•
•
•
•
•
Investigative and/or court use
Criminal justice employment
Public and private employment
Licensing
Individual inspection of records
National security checks
GCIC Policy Manual
Rev. 2011
•
Other reasons as provided by law
Applicable laws and each requestor’s authority and purpose determine the type
and amount of CHRI disseminated.
State Umbrella Statute:
Public Law (Pub L.) 92-544 statutes provide for national fingerprint based
criminal history record checks for licensing or employment purposes by
governmental entities. Such statutes must be specific in nature, identify the
category of applicants, require fingerprinting of the applicants and authorize
submission of the fingerprints to the FBI for a national criminal history record
check.
With the amendment of O.C.G.A 35-3-35(a)(1) an “umbrella” 92-544 statute was
enacted allowing local non-law enforcement governmental authorities to require,
by rule, regulation or ordinance, the fingerprinting of applicants or licensees in
specified occupations for receiving CHRI. An umbrella statute allows greater
latitude to local non-law enforcement governmental agencies that want to require
fingerprinting for specific employment and licensing purposes.
With the enactment of an umbrella 92-544 statute in Georgia, local authorities can
determine what occupations to criminally background, especially in light of
particularized or exigent circumstances, e.g. natural disasters.
Procedures are set forth in the GCIC Operating Manual.
CHRI provided through the CJIS network; is current and valid only, at the time
that it is received. The GCIC updates the computerized criminal history database
daily.
4.5.1 LOGGING OF DISSEMINATIONS
GCIC maintains computerized logs of all criminal history record requests
transmitted to GCIC via the CJIS network (GCIC Council Rule 140-2-.06). The
log consists of information obtained from the criminal history record inquiry.
The information in each inquiry includes:
•
•
•
•
Date, time and purpose of each inquiry or request;
Identification of the actual requester; and the name or initials of
the terminal operator
Identification of the person inquired upon in the record inquiry
message
Each record subject's GCIC assigned state identification number
(SID) and/or FBI number in record request messages
GCIC Policy Manual
Rev. 2011
•
Agency Reference Numbers (ARN) must be used with purpose
codes C, F, L, or X. The ARN for purpose code L must be a case
number or docket number. The ARN for purpose code C, F or X
can be incident report numbers, criminal case numbers, docket
numbers, citation numbers, warrant numbers, inmate numbers, or
other significant numbers, which link criminal history record
requests to criminal investigations, and create an audit trail.
4. 5.2 METHODS OF DISSEMINATION TO CRIMINAL JUSTICE
AGENCIES
Method
Face to Face
Condition
Upon presentation of identification
Telephone
Only between criminal justice personnel when the
disseminator is positive of the requestor's identity.
Facsimile
A facsimile device not connected to a CJIS system may be
used to transmit hardcopy criminal history records provided
both agencies involved have a NCIC ORI authorized to
receive criminal history information (FBI Security Policy).
Mail
Radio
Telephone notification prior to the transmission of
information should be initiated to verify the authenticity of
the receiving agency.
Only after verification of requestor's address, purpose, and
authority.
Any electronic device that uses wireless or radio technology
to transmit voice data may be used for transmission of CHRI
when an officer determines there is an immediate need for
this information to further an investigation or there is a
situation affecting the safety of an officer or the general
public.
GCIC Policy Manual
Rev. 2011
4.5.3 METHODS OF DISSEMINATION TO NON-CRIMINAL
JUSTICE ENTITIES
Method
Face to Face
Condition
Upon presentation of identification
Mail
Only after verification of requestor's address, purpose, and
authority.
Facsimile
Telephone notification prior to the transmission of
information should be initiated to verify the authenticity of
the receiving agency.
Ex: 911 Center, etc…
4.5.4 OTHER AUTHORIZED DISSEMINATIONS
Georgia criminal justice agencies can request and disseminate CHRI for the
following reasons. (Check the current GCIC Council Rules for cases not covered
below).
•
ATTORNEY ACCESS
 PRIVATE ATTORNEY ACCESS
CHRI from local and GCIC files pertaining to a defendant or witness in a
criminal case may be disseminated to the defendant’s attorney upon
written request to GCIC for each person on which a record is requested.
The criminal defense attorney may obtain this information from GCIC
based on submission of a written request which must contain the type of
the (i.e. State vs. John Doe) and the name and identifying information
(sex, race, date of birth, and social security number) for each person on
which a record is requested.
Written requests should be mailed, faxed or emailed as indicated below:
Georgia Crime Information Center
Criminal History/Identification Services
ATTN: Attorney Request
P.O. Box 370748
Decatur, Georgia 30037-0748
FAX: 404-270-8386
Email: [email protected]
GCIC Policy Manual
Rev. 2011
Such disseminations may only be made by GCIC.
 PUBLIC DEFENDERS
Assignment of an ORI number:
enables the Public Defender’s Office to make arrangements with any local
law enforcement agency or court to run criminal history records on their
behalf. Inquiries must contain the ORI of the Public Defenders Office and
are conducted with Purpose Code “L”. Consent of the individual (criminal
defendant or witness) is not required. Agencies should create a system for
audit purposes (i.e. a log) that contains, at a minimum, the criminal
defense attorney’s name, address, type of case (State vs. John Doe), and
the name and identifying information (sex, race, date of birth, and social
security number) for each person for whom a record is requested.
DO NOT disseminate CHRI obtained from GCIC files to defense attorneys on
individuals who are not a defendant or witness, including juveniles.
Access to criminal history record information by attorneys varies depending
upon whether the attorney is requesting information in a criminal or civil
case (refer to the GCIC Operating Manual for further instruction).
Refer to Appendix A for examples of consent forms.
•
MILITARY LAW ENFORCEMENT AND COURT MARTIAL
Military law enforcement personnel:
Criminal justice agencies may provide CHRI to military police, criminal
investigative, and intelligence personnel who present authentic
credentials and legitimate criminal justice reasons for the requested
records. Use purpose code C. An Agency Reference Number (ARN)
must be provided.
Pre-employment or security clearance checks are not legitimate reasons
to use purpose code C. (Use purpose code E with a signed consent
form)
Military courts:
Terminal agencies may request CHRI from GCIC for use in military
special court martial and general court martial upon certification by a
military judge that the CHRI requested is required for the administration
of military justice. Use purpose code C. An ARN must be provided.
GCIC Policy Manual
Rev. 2011
•
FEDERAL AGENCIES
Federal law requires all state and local criminal justice agencies to provide the
U.S. Department of State, Office of Personnel Management (OPM), Defense
Investigative Service (DIS), Federal Bureau of Investigation (FBI), and
Central Intelligence Agency (CIA) with CHRI, regarding individuals being
investigated for eligibility to access classified information or for assignment to
sensitive national security duties (GCIC Council Rule 140-2-.04). Use
purpose code E. (A signed consent form is not required)
Agencies must adhere to the following guidelines:
•
•
•
4.6
Verify each requestor's identity by visual inspection of credentials.
The same fee may be charged to these agencies as charged to
non-criminal justice requestors (i.e. private employers).
Applicant fingerprint cards or consent forms are not required.
CITIZENSHIP
Local law enforcement agencies may be asked to fingerprint applicants for U.S.
citizenship. DO NOT request or disseminate CHRI. When the fingerprinting
process is completed, instruct the applicants to return their fingerprint cards to
federal authorities; the FBI will conduct the record checks.
4.7 DEPARTMENT OF FAMILY & CHILDREN SERVICES
•
CRIMINAL
When receiving requests for criminal record checks by DFACS employees
investigating child abuse cases, apply the following guidelines:
•
Use Purpose code C.
•
FBI III replies CANNOT be provided to DFACS. Provide FBI III
replies to law enforcement investigators or the prosecutors’ office
investigating the case in question.
•
Only Georgia records shall be provided to the DFACS requestor.
•
DFACS employees must provide a unique case number for the
Agency Reference Number field (ARN) of CHRI transactions.
GCIC Policy Manual
Rev. 2011
•
•
The Attention (ATN) field of CHRI transactions must include the
Name of the DFACS requestor, the acronym DFACS, and the name or
initials of the terminal operator.
CIVIL
When receiving requests for foster care or adoption checks from DFACS
employees, use the following guidelines:
4.8
•
Use purpose code E (a signed consent form or fingerprint card is
required)
•
Provide the Georgia record to the DFACS employee
•
The Attention (ATN) field of CHRI transactions must include the
name of the DFACS requestor, the acronym DFACS, and the name or
initials of the terminal operator
•
DFACS can be referred to their command center for emergency
placement of children to provide a background check using purpose
code X.
ADOPTIONS
Legislation was passed which amended O.C.G.A. § 19-8-16, relating to
investigation by a child-placing agency or other agency to require a petitioner to
submit to a fingerprint based state and national criminal history records check.
Specifically O.C.G.A § 19-8-16(d) was revised to state that the court shall require
the petitioner to submit to the records check.
Fingerprints may be submitted to the GCIC on fingerprint cards or via approved
electronic submissions. The GCIC will forward the fingerprints to the FBI for the
national search.
4.9
CRIMINAL RECORD CHECK FOR NURSING HOME
EMPLOYMENT
Local agencies may provide record checks on prospective nursing home
employees (O.C.G.A. § 31-7-351). This does not include persons employed by
nursing homes prior to the effective date of April 12, 1995. Use the following
guidelines:
GCIC Policy Manual
Rev. 2011
•
Use Purpose Code N (a signed consent form or fingerprint card is
required)
•
Requests shall be processed within a reasonable time not to exceed
three days
•
Fees may be charged which shall be no greater than the cost to process
record checks
•
If an adverse employment decision is made, the employer must notify
the applicant that a criminal background check was made via GCIC,
the contents of the record received from GCIC and the effect the
record had on the employment decision.
4.10 CRIMINAL RECORD CHECK FOR PROVIDERS OF CARE
TO CHILDREN, THE ELDERLY AND PERSONS WITH
DISABILITIES (INCLUDING VOLUNTEERS)
Code Section § 35-3-34.2 authorizes the exchange of national criminal history
record checks on providers of care to children, the elderly, and persons with
disabilities, including but not limited to, volunteers with youth sports
organizations and other youth activities.
The purpose of this code section is to authorize and facilitate, but not require, the
exchange of national criminal history record checks with authorized agencies on
behalf of qualified entities as authorized under federal law.
Requests for national criminal history record checks must be fingerprint based
and submitted directly to GCIC.
Please refer to the GCIC Operating Manual for further information.
4.11 PUBLIC ACCESS TO FELONY CONVICTION RECORDS
Purpose Code P must be used by local agencies when processing requests for
Georgia felony conviction record checks from the public (O.C.G.A. § 35-3-35).
Fingerprint comparison, prior contact with GCIC or consent of the person whose
record is being checked is not required. Georgia CJIS CCH printouts may be
disseminated directly to requestors. A fee may be charged not to exceed $20.00
per request.
GCIC Policy Manual
Rev. 2011
4.12 PUBLIC HOUSING AUTHORITY
Local law enforcement agencies may use Purpose Code H when conducting a
background check for the Public Housing Authority.
•
The Public Housing Authority must have an FBI assigned ORI ending
with the letter Q. The law enforcement agency will use that ORI to
request the criminal history.
•
Only IQ inquiries for criminal history name search from Georgia and
the FBI III files are allowed for this type of request.
•
The local law enforcement agency is authorized to inform the Public
Housing Authority that the applicant may have a criminal history
record indexed in the FBI III file.
•
If the Housing Authority wants to obtain the full NCIC criminal
history record, two applicant fingerprint cards must be submitted
directly to the FBI. The FBI will provide applicant cards, bearing the
housing authority’s ORI number, without cost.
•
If the FBI makes a positive identification, the matching record from
the National Fingerprint File (NFF) will be provided to the Public
Housing Authority. If a negative match is made, the FBI will advise
the Public Housing Authority that the subject has no criminal history
record on file.
The option of using Purpose Code E with a signed consent form or fingerprint
cards for a Georgia record has not changed as a result of this federal law.
Refer to Appendix A for examples of consent forms.
4.13 PROTECTION ORDER FILE
Judges issue Protection Orders to prevent acts of domestic violence, prevent a
person from stalking another person, prevent a person from intimidating another
person and prevent a person from harassing another person. Judges in Civil
Courts and Criminal Courts issue the Protection Orders.
•
Use Purpose Code D* for Stalking and Domestic Violence for
Civil/Criminal Court Cases only.
•
Use Purpose Code C for Stalking and Domestic Violence for
Criminal Investigations only.
GCIC Policy Manual
Rev. 2011
*Using Purpose Code D will not include First Offender information in records
that have been sealed by the state. Purpose Code D is valid with court ORIs only.
4.14 CRIMINAL RECORD CHECKS ON LAW ENFORCEMENT
OFFICERS FOR FAMILY VIOLENCE BACKGROUND
It is unlawful for any person convicted of a “misdemeanor crime of domestic
violence” to ship, transport, possess or receive firearms or ammunition, including
law enforcement personnel (Federal Code 18-USC, Section 922(g)).
•
To determine continuing eligibility of law enforcement officers to
serve, up to date criminal record checks should be initiated.
•
A consent form is required each time a record check is made unless the
individual has signed a consent form permitting the agency to request
a check at any time during their employment.
•
Use Purpose Code Z (for certified personnel only).
Refer to Appendix A for an example of the consent form for law enforcement
officers.
GCIC Policy Manual
Rev. 2011
CHAPTER 5
CJIS SECURITY PASSWORDS & STANDARDS
5.1
CJIS NETWORK SECURE PASSWORDS
As the CJIS Systems Agency (CSA) for Georgia, GCIC is required to ensure
passwords used for authentication (mechanisms or processes that verify users
once they are uniquely identified) follow the secure password attributes when
communicating with the GCIC CJIS network and comply with the FBI CJIS
Security Policy.
GCIC requires secure password attributes, which means that users must now
follow the strong password construction guidelines when replacing passwords that
have expired.
A document detailing the secure password attributes can be found on the GCIC
website: http://gcicweb.gbi.state.ga.us/cjis/ori/
5.1.1 LOCAL CRIMINAL JUSTICE AGENCIES
Local criminal justice agencies are similarly required to authenticate users,
specifically from remote devices such as mobile units in vehicles. Authentication
of each user’s identity can be a user ID and unique password combination
implemented at the local agency (CJIS Security Policy, June 2007, Version 4.4,
7.0 Technical Security, 7.4 System Logon, 7.4.2 Authentication/Password, and
7.4.2.1 Introduction). The same secure password attributes apply to wireless
(mobile) devices. Additionally, these passwords must change at least once every
ninety (90) days.
GCIC requires each agency to adhere to the following guidelines in the FBI CJIS
Security Policy:
•
•
•
•
•
•
Passwords shall be a minimum of eight characters on systems produced
after September 30, 2005, and on all systems by September 30, 2010
Passwords shall not be a dictionary word or proper name
Passwords and the user ID shall not be the same
Passwords shall be changed at least every 90 days
All systems procured after September 30, 2005 shall prevent password
reuse of the last ten passwords
Passwords shall not be transmitted in the clear outside the secure domain
(CJIS Security Policy, June 2007, Version 4.4, 7.0 Technical Security, 7.4
System Logon, 7.4.2 Authentication/Password, 7.4.2.3 Passwords).
GCIC Policy Manual
Rev. 2011
The authentication strategy implemented by local criminal justice agencies
shall be part of the GCIC audit for policy compliance. GCIC auditors will
emphasize this area on audits to ensure agencies are in compliance.
5.2
PERSONNEL SECURITY SCREENING STANDARDS
GCIC is required to establish policy for screening criminal history records of:
• Local criminal justice agency personnel who have authorized access to
FBI CJIS systems and
• Those who have direct responsibility to configure and maintain computer
systems and networks with direct access to FBI CJIS systems.
The CSA/GCIC is required to establish procedures to review an individual’s
criminal history record prior to granting systems access to that individual. The
CJIS Security Policy states:
a.
To verify identification and state of residency, a national
fingerprint-based record check shall be conducted within thirty
(30) days upon initial employment or assignment for all personnel
who have authorized access to FBI CJIS systems and those who
have direct responsibility to configure and maintain computer
systems and networks with direct access to FBI CJIS systems.
Federal entities bypassing state repositories in compliance with
federal law may not be required to conduct a state fingerprintbased record check. All requests for systems access shall be made
as specified by the CSO (CJIS Systems Officer/GCIC Director).
The CSO, or their official designee, is authorized to approve CJIS
systems access. All official designees to the CSO shall be from an
authorized criminal justice agency.
b.
If a felony conviction of any kind exists, the hiring authority in the
Interface Agency may ask for a review by the CSO in extenuating
circumstances where the severity of the offense and the time that
has passed would support a possible variance.
c.
If a record of any other kind exists, systems access shall not be
granted until the CSO or his/her official designee reviews the
matter to determine if systems access is appropriate. (CJIS
Security Policy, June 2007, Version 4.4, 4.0 Security
Enforcement, 4.5 Personnel Security, 4.5.1 Personnel
Background Screening for Systems Access and Computer
Terminal/Records Storage Areas Access).
GCIC Policy Manual
Rev. 2011

Each criminal justice agency must designate an individual to make a
decision concerning FBI CJIS systems access. This person will serve as
an official designee to the CSO and have the authority and responsibility
to review an individual’s complete criminal history record and decide
whether to allow FBI CJIS systems access based on the information
contained in the criminal history record.

When a felony conviction exists, the CSO requires an agency to initially
deny FBI CJIS systems access. In extenuating circumstances, and where
the offense type and/or sufficient time have passed to support a possible
variance, the agency hiring authority can ask for a review by the CSO.

Guidance regarding non-felony convictions may be found in GCIC
Council Rule 140-2-.09 (2) Personnel Security Standards, which states
“Criminal justice agencies, governmental dispatch centers and other
governmental agencies handling criminal justice information shall
disqualify applicants who have convictions of sufficient misdemeanors to
establish a pattern of disregard for the law. If the applicant appears to be a
fugitive or have an arrest history without conviction for a felony or serious
misdemeanor, the Director or criminal justice agency head, or his/her
official designee, will review the matter and decide if access/employment
is appropriate”.

Local criminal justice agency heads must designate an individual who is
responsible for reviewing criminal history information and approving FBI
CJIS systems access.
GCIC auditors will emphasize this area on audits to ensure agencies are in
compliance.
GCIC Policy Manual
Rev. 2011
CHAPTER 6
CJIS NETWORK OPERATIONS
6.1
MESSAGE RETENTION
GCIC logs and retains all transmissions sent or received by or through Georgia
CJIS network devices for four years.
Agencies must destroy all printouts generated by CJIS terminals when no longer
needed. Agencies must use a secure destruction method, such as shredding or
burning. Destruction must be handled or supervised by criminal justice agency
employees. As long as a case is active and an entry still exists in GCIC/NCIC
files, terminal printouts associated with that case must remain with the case file
until the record is removed. Other than providing supporting documentation for
active case files, GCIC does not prescribe local agency retention limits for any
CJIS network terminal printouts.
6.2
UNAUTHORIZED MESSAGES
CJIS network terminals are for official criminal justice and public safety message
business only. The GCIC Deputy Director reports violations to agency heads.
6.3
AUTHORIZED MESSAGES
Record Transaction Messages:
These messages access files maintained by GCIC, NCIC, Nlets, other state
repositories, and/or other agencies whose computerized records are
available to criminal justice and public safety agencies. These messages
have prescribed formats and message keys which are described in the
GCIC Operating Manual. A copy of the manual should be available for
use at each terminal directly connected to the CJIS network. Interface
agencies must provide manuals, which conform to GCIC requirements.
Administrative Messages:
Administrative messages can be sent to other criminal justice agencies in
Georgia or elsewhere in the U.S., Canada, or other foreign countries
through INTERPOL. Instructions are described in the Data
Communications section of the GCIC Operating Manual.
GCIC Policy Manual
Rev. 2011
6.4
ADMINISTRATIVE MESSAGES
Administrative messages are for official criminal justice and public safety
purposes only. Administrative messages may be sent:
•
•
•
•
•
to one terminal only
to groups of terminals
as area broadcasts
as statewide broadcasts
as nationwide broadcasts
DO NOT use administrative messages for the following purposes:











•

Personal or private interests
Social Announcements
Recruitment of Personnel
Messages in which the victim is only interested in the recovery of
property
Attempts to locate a person WITHOUT a warrant
Messages of excessive length
Subpoenas
Curiosity
Political or Labor activities
Messages relating to requests for information concerning salary,
uniforms, or personnel
Hit Confirmation requests and responses (YQ/YR)
Messages relating to the advertisement or sale of equipment
Messages regarding wanted subjects or vehicles if they can be
entered into GCIC/NCIC
Note: Per NCIC guidelines it is not mandatory for other states to use the YQ/YR
format for the HIT Confirmation process. If an agency receives an AM
message within the designated time frame in lieu of the expected YR, a second
request is not necessary. The AM is recognized as a substantive response by
NCIC from other states.
Transmitting unauthorized terminal messages is strictly prohibited.
6.5
GEORGIA AND NATIONAL BROADCASTS
A Georgia and/or National Broadcast message can be received by multiple
agencies within a particular region. See the Data Communications section of the
GCIC Operating Manual for Region Broadcast Codes.
GCIC Policy Manual
Rev. 2011
DO NOT use broadcast messages for the following purposes:




Attempt-to-Locate Messages.
Messages regarding wanted/missing subjects or vehicles if they
can be entered into GCIC/NCIC.
Messages on runaways if they can be entered into GCIC/NCIC.
Messages relating to requests for information concerning salary,
uniforms, personnel, or related items that can be routinely obtained
by correspondence or means other than statewide or national
broadcasts.
Georgia and National broadcast restrictions may be waived when:



6.6
A record cannot be entered into GCIC/NCIC files.
Important additional information exists that cannot be entered into
the record in GCIC/NCIC files.
A serious threat exists to law enforcement officers or other persons
who may encounter the subject without warning.
HOT FILE ENTRY ACCESS
Terminal agencies must comply with the Hit confirmation procedures on a 24hour basis before GCIC will authorize record entries. If an agency’s terminal is
not monitored at all times, the agency must have a service agreement with another
agency to provide continuous coverage.
6.7
HIT CONFIRMATION POLICY
6.7.1 HIT MESSAGE DEFINITION
These messages indicate that information contained in an inquiry may match one
or more GCIC/NCIC hot file records.
6.7.2 PROBABLE CAUSE
A GCIC/NCIC Hit may not, by itself, be probable cause for arrest of an
individual, seizure of property or detaining a missing person. You must first
receive confirmation from the originating agency that the record is current and
valid, verifiable identification of the subject or property, and the age of the record
returned in response to your inquiry.
GCIC Policy Manual
Rev. 2011
6.7.3 HIT CONFIRMATION REQUEST
A hit confirmation request is a process that must be initiated by the inquiring
agency, after receiving a positive hit response. Whenever the information in a
response describes the person or property in question and the inquiring agency has
control of the person or property, you must contact the entering agency by using
message key YQ.
The purpose of the hit confirmation process is to determine if the record in the hit
response is current and valid and to alert the originating agency to the location of
the person or property described in the GCIC/NCIC record. Hit Confirmation
requests and responses must be included with the record entry documentation.
There are two levels of priority allowed when requesting a hit confirmation:
Urgent - Within 10 minutes.
When a hit is the only basis for detaining a suspect, or the nature of a
case requires urgent confirmation of a hit, the highest level of priority is
specified.
Routine - Within 1 hour.
Used when the person or property is being held on local charges or when
an urgent confirmation is not required.
Priorities are always established by the agency requesting confirmation and
are a required field for all hit confirmations.
When an extradition limitation is in the miscellaneous field and the agency
finding the wanted person is outside the area of geographic extradition
indicated, the record does not need to be confirmed and the record should not
be located.
6.7.4 HIT CONFIRMATION RESPONSE
A response time to a Hit Confirmation request is based on the PRI (Priority
Designation) used by the requesting agency.
You must respond in one of the following ways:
Confirm the Hit: Advise the requesting agency that the information included in
the record in question is accurate, current, and valid.
GCIC Policy Manual
Rev. 2011
Deny the Hit: Advise the requesting agency that the information included in the
hit message is no longer valid or that it does not match the information your
agency has on file. If it is no longer valid, it must be cancelled immediately.
More time is needed: If more time is needed to obtain or review the case file in
order to determine the validity of the record, respond to the requesting agency
specifying the amount of time needed. (Keep in mind, however, that if the request
is Urgent that the request may be the only basis for detaining a suspect).
Note: Per NCIC guidelines it is not mandatory for other states to use the YQ/YR
format for the HIT Confirmation process. If an agency receives an AM
message within the designated time frame in lieu of the expected YR, a second
request is not necessary. The AM is recognized as a substantive response by
NCIC from other states.
6.7.5 FAILURE TO RESPOND TO HIT CONFIRMATION
REQUESTS
When an agency fails to respond to a hit confirmation request the risk of injury to
law enforcement officers and liability for law enforcement agencies increases.
The following procedures are established to ensure compliance with GCIC’s
policies and procedures for responding to hit confirmation requests.
•
GCIC will monitor network activity and record all incidents of hit
confirmation failure.
•
When a significant pattern of hit confirmation failure is found within
an agency, written notification will be sent to the agency head from the
GCIC Deputy Director requesting a written response within 30 days on
what actions have been or will be taken to resolve the problem.
•
Continuing problems will result in formal notification to the GCIC
Council with recommendation for sanctions as prescribed in GCIC
Council Rules.
•
Possible sanctions include purging of GCIC/NCIC Wanted/Missing
Person, Protection Order, Gang, and Stolen Property records,
restricting access to specific GCIC/NCIC files, and the
suspension/revocation of access to the Georgia CJIS Network.
GCIC Policy Manual
Rev. 2011
6.8
•
Agency heads will receive written notification of all formal sanctions
to be taken.
•
All correspondence will become part of an agency audit file and will
have a direct bearing on their compliance with GCIC/NCIC audit
standards.
HELP FILE
Help files are to assist criminal justice and public safety agencies interpret
information received from in-state and out-of-state files. To determine which
states and federal agencies maintain Help files, inquire into the Nlets Help file.
For inquiry procedures refer to the GCIC Operating Manual, Data
Communications Section.
6.9
WEATHER INFORMATION DEFINED
Weather inquiries provide information regarding severe road conditions and travel
advisories in participating states. For inquiry procedures refer to the GCIC
Operating Manual, Data Communications section.
6.10 AGENCY INFORMATION
An agency's address and telephone number are available by inquiring into the
CJIS network. You can inquire by city, county or ORI of the agency. For inquiry
procedures refer to the GCIC Operating Manual, Data Communications section.
Only GCIC can make changes to agency name, address, telephone number, FAX
number and ORI for agencies in Georgia. Terminal Agency Coordinators must
notify GCIC if any changes need to be made to their agency’s listed contact
person, telephone number, FAX number, street address, and mailing address if
different from the street address.
Procedures are set forth in the GCIC Operating Manual.
6.11 ORIGINATING AGENCY IDENTIFIER (ORI) NUMBER
REQUEST AND DISSEMINATION PROCEDURES
The Originating Agency Identifier (ORI) is a nine-character identifier assigned by
the FBI Criminal Justice Information Services (CJIS) staff to a criminal justice
agency which has met the established qualifying criteria for ORI assignment. The
ORI is used to identify the agency in transactions on the NCIC system or in
GCIC Policy Manual
Rev. 2011
criminal history source document submissions. In addition, it is used to validate
criminal history record requests and route criminal history record responses.
ORI numbers are also assigned by FBI CJIS staff to non-criminal justice
governmental agencies authorized by state statute to submit fingerprints for FBI
criminal history record checks for employment or licensing purposes. Each
applicant fingerprint submission must contain the authorized agency’s FBI
assigned ORI.
FBI assigned ORIs are not confidential and may be released to any
employing/licensing entity for the purpose of conducting a fingerprint-based
criminal history record check. The agency making a fitness determination must
provide its ORI to an applicant when the applicant goes through the Georgia
Applicant Processing Service (GAPS) for a fingerprint-based state and national
criminal history record check.
ORI Request Process
Criminal justice agencies – The agency head must submit a written request, on
agency letterhead, to GCIC. Each request shall include: official agency name,
name and title of agency head, contact name (if different from agency head),
telephone number, facsimile number, mailing address, physical address/location
(if different from mailing address) and hours of operation. A newly created
agency must also provide copies of authoritative statutes, ordinances and duties.
Non-criminal justice agencies – The agency head or designee must submit a
written request, on agency letterhead, to GCIC with a brief description of services
provided. Additionally, the request must state whether the agency is requesting
an ORI to conduct FBI fingerprint-based record checks under the authority of 1) a
specific state law (O.C.G.A.) that is a FBI approved Public Law (Pub. L.) 92-544
statute or 2) federal authority [such as the Adam Walsh Child Protection and
Safety Act or the National Child Protection Act/Volunteers for Children Act
(NCPA/VCA)]. Further information may be necessary for ORI requests to
conduct FBI record checks under federal authority.
The Assistant Deputy Director (ADD) of Information Services or a designee will
review each request for agency qualification and required documentation.
Requests meeting the qualification and documentation criteria are forwarded to
the FBI CJIS Division for ORI assignment. If a request does not meet the criteria,
the ADD or a designee will contact the agency and explain what is needed to gain
approval or why the agency does not qualify for an ORI.
Written notification of ORI assignment will be sent to each agency. The agency
head of each new or re-activated criminal justice agency will receive an
information packet with a copy of all current GCIC Operations Bulletins, the
Rules of the GCIC Council and a GCIC Awareness Statement. Non-criminal
GCIC Policy Manual
Rev. 2011
justice agencies will receive a copy of the Rules of the GCIC Council and a GCIC
Awareness Statement.
Contact information for the ADD of Information Services is:
Neil Gerstenberger
Georgia Crime Information Center
P.O. Box 370808
Decatur, GA 30037-0808
6.12 MESSAGE RETRIEVAL DEFINED
The System Retrieval Program (SRP) retrieves a CJIS network message received
by your terminal within the past 48 hours (LEMS) and 14 days (LEMS/JX) with
the capability of sending the message to another Georgia CJIS network device.
The LEMS Retrieval Program (RET) retrieves a message received by your
terminal within the past 24 hours (LEMS) and 14 days (LEMS/JX). (Refer to the
GCIC Operating Manual, Data Communications).
The message retrieval program must not be used to transmit criminal history
records to other CJIS network terminals.
Procedures are set forth in the GCIC Operating Manual.
6.13 HAZARDOUS MATERIALS INFORMATION (HAZMAT)
DEFINED
Information on handling hazardous materials is available through CJIS network
terminals by performing an inquiry into the Hazardous Materials (HAZMAT) file.
To identify the materials being transported, use the four-digit identification code
found on the diamond-shaped sign attached to the vehicle or railroad car (refer to
the GCIC Operating Manual, Data Communications).
6.14 GCIC/NCIC DATA FILES
The following files can only be used for the administration of criminal justice or
as otherwise provided by law:
•
VEHICLE, BOAT AND AIRCRAFT REGISTRATION
The following information is found in these files:

Legal ownership
GCIC Policy Manual
Rev. 2011



Vehicle identification
Lien holder information
County where tag was issued or is currently registered
Registration inquiries automatically check GCIC/NCIC files to determine if
vehicles, boats or aircraft have been reported as stolen.
Questions regarding information in these files should be directed to the
appropriate state or federal agency.
•
DRIVER’S LICENSE
Driver’s License registration and history information on all persons licensed
to operate vehicles in Georgia and in other states is available through the CJIS
network. Driver’s license inquiries automatically check GCIC/NCIC files to
determine if subjects are wanted, missing, on probation or parole, a registered
sex offender, or if a protection order is in NCIC files.
Inquiries using name, sex, and date of birth have a greater chance of
producing a positive Hit response from the persons file than inquiries by the
Operator’s License Number (OLN).
Effective July 1, 2006, local fire departments or law enforcement agencies are
allowed to use the Georgia Crime Information Center (GCIC) Criminal Justice
Information System (CJIS) network to obtain an individual’s Georgia driver’s
history record as part of an application for employment or, for use relative to
the performance of an employee’s official duties (O.C.G.A. § 40-5-2).
Law enforcement agencies may continue accessing the Driver’s License
database for investigations or prosecutions of alleged violations of law as
authorized in O.C.G.A. § 40-5-2(c)(1)(D) (Please refer to GCIC Operations
Bulletin 2007-08).
The Georgia Department of Driver Services (DDS) provides on-line access to
its driver history file for legitimate criminal justice use only.
Refer Driver’s History requests for purposes other than criminal justice to the
Georgia DDS:
Georgia Department of Driver Services
P.O. Box 80447
Conyers, Georgia 30013
Telephone: (678) 413 - 8400
GCIC Policy Manual
Rev. 2011
•
GEORGIA PAWN SHOP INVESTIGATION FILE
Local pawn ticket information can be entered into a centralized Pawn Shop
System. This information is available to all Georgia law enforcement agencies that
have full authority (enter, modify, clear and cancel records) and are authorized to
access Criminal History Record Information.
Procedures are set forth in the GCIC Operating Manual.
•
SEXUALLY VIOLENT OFFENDER REGISTRY (SVO)
The Georgia Bureau of Investigation is responsible for maintaining the SVO
Registry (O.C.G.A. § 42-1-12). This responsibility gives GBI the right to
establish all policies and procedures that relate to the SVO Registry.
The Department of Corrections and the State Board of Pardons and Paroles
enters information pertaining to sex offenders who are released from prison or
placed on probation, parole, or supervised release. A terminal message is
generated to the Sheriff of the county where the offender resides and the
offender has 72 hours from the date of registration to report to the Sheriff’s
Department.
Procedures are set forth in the GCIC Operating Manual.
•
NCIC PROTECTION ORDER FILE (POF)
Protection Orders include injunctions or any other orders issued for the
purpose of preventing violent or threatening acts or harassment against, or
contact or communication with, or physical proximity to, another person.
Included are temporary and final orders issued by civil or criminal courts
(other than support or child custody orders), in response to a complaint,
petition, or motion filed by or on behalf of a person seeking protection.
Procedures are set forth in the NCIC Operating Manual.
•
U.S. CITIZENSHIP AND IMMIGRATION SERVICES (USCIS)
LAW ENFORCEMENT SUPPORT CENTER
The Immigration and Naturalization Service (INS) Law Enforcement
Support Center (LESC) provides timely information on aliens suspected of
criminal activity; and the status information of aliens under arrest.
Procedures are set forth in the GCIC Operating Manual.
GCIC Policy Manual
Rev. 2011
•
OUT-OF-STATE PAROLE, PROBATION AND CORRECTIONS
This file is used to request out-of-state parole, probation and corrections
information on a subject.
Procedures are set forth in the NCIC Operating Manual.
•
GANG FILE
The National Crime Information Center (NCIC) Gang File has been designed
to provide identifying information about violent criminal gangs and members
of those gangs to law enforcement personnel. This information serves to warn
law enforcement officers of the potential danger posed by violent individuals
and to promote the exchange of information about gangs and members to
facilitate criminal investigations.
Because the Gang File information is based, in part, on investigative
information not previously subject to independent judicial review, strict
adherence to policy on the security, use, and dissemination of Gang File
information is necessary.
Gang File information is exclusively for the use of criminal justice agencies
for criminal justice purposes. In no case should Gang File information be
disseminated to any noncriminal justice agency.
Procedures are set forth in the NCIC Operating Manual.
•
KNOWN OR APPROPRIATELY SUSPECTED TERRORIST (KST)
FILE
Based upon Homeland Security Presidential Directive-6 signed in September
2003, the Terrorist Screening Center (TSC) was established to consolidate the
Federal Government's approach to terrorism screening and to provide for the
appropriate and lawful use of terrorist information in the overall screening
process.
The TSC alone has the authority to enter and update a record for an individual
who has been nominated as a known or appropriately suspected terrorist
subject to the TSC.
Procedures are set forth in the NCIC Operating Manual.
GCIC Policy Manual
Rev. 2011
•
HOT FILES
GCIC and NCIC maintain files for use by criminal justice and other
authorized agencies. These files are created and updated by CJIS network
terminal agencies.
With the amendment to O.C.G.A. 35-3-36 (e): All persons in charge of law
enforcement agencies shall submit to the center detailed descriptions of arrest
warrants and related identifying data for all felonies and for the
misdemeanors and violations designated in subparagraph (a)(1)(A) of
Code Section 35-3-33 immediately upon determination of the fact that the
warrant cannot be served for the reasons stated. If any such warrant is
subsequently served or withdrawn, the law enforcement agency concerned
must immediately notify the center of the service or withdrawal. In addition,
the agency concerned must annually, no later than January 31 of each year,
and at other times if requested by the center confirm to the center all such
arrest warrants of this type which continue to be outstanding.
Refer to the NCIC manual for more information on NCIC Warrant Entries
Procedures are set forth in the GCIC and NCIC Operating Manuals.
6.15 EXTRADITION
Extradition limits indicate the distance the originating agency will travel to return
a wanted person arrested by another agency.
The entering agency should determine whether the Prosecutor will initiate
extradition proceedings if the subject is arrested in another state, prior to entering
a wanted person record in NCIC.
If a wanted person will be extradited from some, but not all states, the entering
agency must enter the geographic limitations of the extradition in the
Miscellaneous field along with the appropriate extradition code (EXL).
(example; will not extradite from west of the Mississippi).
In instances where an agency is absolutely certain that the wanted person will not
be extradited, the individual's record may be entered in NCIC with the appropriate
extradition code.
When a Georgia agency enters a record and another state refuses to permit the
extradition, modify the EXL field and miscellaneous field of your record to
indicate the state will not honor extradition.
A Detainer Warrant is an official notice from one Law Enforcement agency to
another requesting that an individual wanted by the first agency, but subject to the
GCIC Policy Manual
Rev. 2011
second agency’s jurisdiction, not be released or discharged without first notifying
the wanting (or first) agency and giving it an opportunity to respond.
Only Wanted Person File records in located status may receive detainer
information. When a wanted person is found within the extradition area and the
inquiring agency receives a positive inquiry response, confirms that the warrant is
outstanding, and authorizes extradition, that agency must perform a locate
transaction to place the record in located status. (Place a locate only when the
individual is found within the extradition area).
*If the locating agency intends to hold the individual on local charges, the locate
transaction should indicate detention by placing DETN (detention) in the
Extradition (EXT) Field.
*Located records containing NOEX cannot have detainers appended to them.
Procedures are set forth in the NCIC operating manual.
6.16 CAUTION INDICATORS
Caution Indicators assist agencies in quickly determining if wanted/missing
persons are:
00 = Armed and Dangerous
60 = Allergies
05 = Violent Tendencies
65 = Epilepsy
10 = Martial Arts Expert
70 = Suicidal
15 = Explosive Expertise
80 = Medication Required
20 = Known to abuse drugs
85 = Hemophiliac
25 = Escape Risk
90 = Diabetic
30 = Sexually Violent Predator – Contact ORI for Detailed Information
40 = International Flight Risk
50 = Heart Condition
55 = Alcoholic
01 = Other (Explain in MIS Field)
Use caution indicators to enter a wanted or missing person record when potential
danger to the apprehending officer exists.
Procedures are set forth in the GCIC Operating Manual.
6.17 TEMPORARY FELONY RECORDS
A Temporary Felony record entry in NCIC files permits prompt action on
suspected felons meeting the following criteria prior to the issuance of a warrant:
GCIC Policy Manual
Rev. 2011
•
•
•
Subjects who have committed a felony.
Subjects who an officer has reasonable grounds to believe have
committed a felony.
Subjects who may be seeking refuge by fleeing across jurisdictional
boundaries while circumstances prevent the immediate issuance of a
warrant.
A warrant for the arrest of the individual must be obtained as soon as possible and
the temporary felony wanted person record message key field must be modified to
a permanent wanted person record entry. Temporary felony records are
automatically removed after 48 hours.
6.18 MISSING PERSONS
When persons of any age are reported as involuntarily missing, missing and
endangered, missing and disabled or missing as disaster catastrophe victims,
follow these guidelines:
Before entry, obtain documentation that supports NCIC record entries, such as:
•
Official police report of a missing person
•
Written statements from a physician or other authoritative source
verifying the missing person's physical or mental disability.
•
Written statements from a parent, legal guardian, next of kin, or other
authoritative source advising that the persons are missing under
circumstances indicating that his/her physical safety may be in danger.
•
Written statements from a parent, legal guardian, next of kin, or other
authoritative source advising that the missing persons' disappearance
was not voluntary.
•
Anyone under the age of 21 should be entered within two hours after
enough information is obtained to complete an entry per Federal Law
and NCIC Policy.
AMBER ALERT (LEVI’S CALL)
NCIC has implemented the capability to flag a missing person record associated
with an AMBER ALERT (in Georgia, LEVI’s CALL). Once determination has
been made that an AMBER ALERT (LEVI’s CALL) will be issued, agencies may
enter the missing person using either message key EMI, EMIC, EME or EMEC
with the Missing Person (MNP) code AA. To place AA in the MNP field, the
missing person’s age should be less than 18 years. Use of the AA code will
generate a $.8. AMBER ALERT notification to the National Center for Missing
GCIC Policy Manual
Rev. 2011
and Exploited Children (NCMEC) and the FBI. In addition, hit responses will be
preceded by the following:
*****AMBER ALERT*****ISSUED FOR NIC/MICXXXXXXXXX*****AMBER ALERT

If the missing person is already entered in NCIC when the decision to use
an AMBER ALERT OR LEVI’S CALL is made, the record can be
modified by changing the MNP to AA. This capability already exists and
is operational for the majority of Georgia agencies (agencies with direct
access using GCIC LEMS formatted screens).

NCMEC has agreed to place the AA code in the NCIC records for those
agencies still needing to initiate internal programming and/or edit changes
to allow for the new code. Agencies unsure if they already have this
capability should contact their IT personnel and/or vendor.

For agencies without this capability, for the NCMEC to place the AMBER
ALERT (AA) code in an NCIC record, the agency must have already
entered the missing person record in NCIC using message keys EMI,
EMIC, EME or EMEC with MNP/CA. Contact the NCMEC at 1-800THE-LOST (1-800-843-5678), and provide the child’s name exactly as
entered in NCIC and the NIC number. The NCMEC will perform a
modify transaction to change the MNP/CA to AA. The NCMEC is staffed
twenty-four hours a day, seven days a week (24/7).
Procedures are set forth in the NCIC Operating Manual.
*To initiate an AMBER ALERT (LEVI’S CALL) contact the GBI 24 hour
communications center at 404-244-2600.
6.18.1 RUNAWAY JUVENILES (LESS THAN 21 YEARS OF AGE)
Note: Per Federal Law and NCIC Policy, when agencies receive reports of
missing juveniles, including runaways or any person less than 21 years of age,
the records must be entered within two hours after enough information is
obtained to complete an entry (42 USCS § 5780).
•
Juvenile courts have jurisdiction over these persons.
•
Georgia law enforcement agencies that locate these persons may
detain them without court orders for involuntary return to parents,
guardians, or legal custodians within Georgia (O.C.G.A. § 15-11-17).
GCIC Policy Manual
Rev. 2011
•
Georgia law enforcement agencies which locate such persons from
other states, reported as runaways in other states, may detain them
under provisions of the Interstate Compact on Juveniles (O.C.G.A. §
39-3-2). Upon being detained, any such person is to be brought
before the local juvenile court for processing (O.C.G.A. § 39-3-2).
•
Within sixty (60) days of entry of a missing juvenile, the agency must
attempt to update the record with any available additional
information—specifically medical and dental records for
identification purposes (42 USCS 5780).
Procedures are set forth in the NCIC Operating Manual
6.18.2 RUNAWAY MINORS (LESS THAN 21 YEARS OF AGE)
Note: Per Federal Law and NCIC Policy, when agencies receive reports of
missing juveniles, including runaways or any person less than 21 years of age,
the records must be entered within two hours after enough information is
obtained to complete an entry (42 USCS § 5780).
Because Georgia law does not provide for the forcible detention and return of 17
year old Georgia runaways, include in the miscellaneous field of the record entry
Locate Only - Do not Detain – Contact Agency via administrative terminal
message. This will enable your agency to inform the parents, guardians, or legal
custodians of the location of the person if they are found by other law
enforcement agencies.
•
The Georgia Missing Children Information Center nor GCIC have
been able to determine what Georgia courts, if any, have jurisdiction
over 17 year old Georgia runaways.
•
Georgia law enforcement agencies locating such persons from other
states, reported as runaways in other states, may detain them under
provisions of the Interstate Compact on Juveniles (O.C.G.A. § 39-3-2).
When confirming NCIC hits, determine if appropriate court documents
have been obtained for the detention and return of the person. If so,
those persons are to be brought before the local juvenile court
(O.C.G.A. § 39-3-2). Otherwise, they should not be detained.
Procedures are set forth in the NCIC Operating Manual.
GCIC Policy Manual
Rev. 2011
6.19 PERSONS PLACED ON PROBATION OR PAROLE
The Offender Status records enable an arresting agency to identify the probation
or parole officer who should be contacted regarding offenders' arrests or
violations of the conditions of their probation or parole. These records are NOT
Wanted or Missing person records. The name and telephone number of the
appropriate probation or parole officer should be located in the Miscellaneous
field. Georgia Offender Status Records disseminated via the CJIS network are
maintained by the Georgia Department of Corrections.
6.20 VEHICLES ASSOCIATED WITH PERSON RECORDS
A vehicle and/or license plate may be entered as part of a person record provided
the location of the vehicle and/or license plate is unknown and the entering
agency has reasonable grounds to believe that the person may be operating the
vehicle or a vehicle bearing the license plate. Mere knowledge or verification with
the appropriate department of motor vehicles that a vehicle and/or license plate is
registered to the person does not meet the criteria for entry of either or both as
part of the person record.
Procedures are set forth in the GCIC Operating Manual.
6.21 U.S. SECRET SERVICE RECORDS
The U.S. Secret Service (USSS) enters records into NCIC on individuals who
may pose a threat to the President and other authorized protectees. When an
agency makes an inquiry and receives a hit on a USSS entry, the agency is
advised that the USSS is interested in the whereabouts of the person in question
and no arrest should be made based on the information contained in the record.
The USSS will also be advised by NCIC of the inquiry on the person in question.
The USSS will initiate the process of any further investigation involving the
person in question.
6.22 CANADIAN ARREST WARRANTS
Canadian-issued warrants are entered and kept current by Canadian criminal
justice officials. Hits on these warrants contain a statement advising inquiring
agencies that no arrests can be made in the United States based on the Canadian
warrants. The inquiring agency must contact the Royal Canadian Mounted Police
to initiate the process for obtaining a U.S. extradition warrant. If the subject of the
record is not a U.S. citizen, the inquiring agency is also directed to contact the
nearest office of the U.S. Immigration and Customs Enforcement (ICE).
GCIC Policy Manual
Rev. 2011
6.23 ARREST OR DETENTION OF FOREIGN NATIONALS
Federal law requires that law enforcement and criminal justice personnel who
arrest and detain an individual, including a juvenile, who is identified as a foreign
national must:
•
Determine the foreign national’s country of origin. Normally this is the
country on whose passport, visa or other documents (i.e. foreign driver’s
license) the individual is traveling.
NOTE: The immigration status of the individual is immaterial.
•

In the absence of evidence (documents or a statement by the individual)
that an individual is a foreign national, it will be assumed that arrestees are
U.S. citizens. A person’s name, skin pigmentation, accent, or lack of
familiarity with the English language is NOT evidence of foreign
nationality.

Consular notification is not required for routine traffic or similar cases
where the foreign national is given a citation and released without being
booked at the jail.
If the foreign national’s country is NOT on the mandatory notification list
below:

Ask, without delay, the foreign national if he or she wants to have the
consulate or embassy of his or her country notified of his or her arrest.

If the foreign national asks for consulate or embassy notification, notify,
without delay, the nearest consulate for the individual’s country of the
arrest and detention. (This may be done by phone but FAX is better,
especially if the arrest occurs outside of normal business hours. A listing
of the phone and FAX numbers for foreign consulates in Georgia may be
obtained from the Prosecuting Attorneys’ Council of Georgia. The U.S.
Department of State maintains a listing for all foreign consulates in the
U.S. on their web site:
http://www.state.gov/www/travel/consular_offices/fco_index.html

•
If the foreign national does NOT want the consulate notified, document
that fact in writing in the case file. If the consulate IS contacted, keep a
written record of the date and time of the contact.
If the national is from the following countries, notification is mandatory
regardless of the wishes of the arrestee.
GCIC Policy Manual
Rev. 2011
Albania *
Antigua
Armenia
Azerbaijan
Bahamas
Barbados
Belarus
Belize
Brunei
Bulgaria
China (Peoples Republic) **
Costa Rica
Cyprus
Czech Republic
Dominican
Fiji
Gambia
Georgia
Ghana
Grenada
Guyana
Hungary
Jamaica
Kazakhstan
Kiribati
Kuwait
Kyrgyzstan
Malaysia
Malta
Mauritius
Moldova
Mongolia
Nigeria
Philippines
Poland
Romania
Russian Federation
St. Kitts/Nevis
St. Lucia
St. Vincent/Grenadines
Seychelles
Sierra Leone
Singapore
Slovak Republic
South Korea
Tajikistan
Tanzania
Tonga
Trinidad/Tobago
Turkmenistan
Tuvalu
Ukraine
United Kingdom****
U.S.S.R ***
Uzbekistan
Zambia
*
Arrangements with these countries provide that U. S. authorities shall
notify responsible representatives within 72 hours of the arrest or
detention of one of their nationals.
**
When Taiwanese nationals (who carry Republic of China passports) are
detained, notification should be made to the nearest office of the
Coordination Council for North American Affairs, the unofficial entity
representing Taiwan’s interests in the United States.
***
All U.S.S.R. successor states are covered by this agreement. They are:
Armenia, Azerbaijan, Belarus, Georgia, Tajikistan, Turkmenistan,
Ukraine, and Uzbekistan.
****
British dependencies are also covered by this agreement. They are:
Anquilla, British Virgin Islands, Bermuda, Montserrat, and the
Turks and Caicos Islands. Their residents carry British passports.
GCIC Policy Manual
Rev. 2011
•
Foreign consular officials have the right under U.S. law to communicate with
and visit their nationals who are held in jail, a YDC or other custody unless
the individual objects to such visits.
For additional information, call the U.S. Department of State at (202) 647-4415,
FAX (202) 736-7559. Telephone inquiries after normal business hours may be
directed to the Command Center of the Bureau of Diplomatic Security at (202)
663-0812.
You may also write to the Office of the Assistant Legal Adviser for Consular
Affairs, U.S. Department of State, Washington, D.C., 20520.
6.24 NCIC FOREIGN FUGITIVE FILE
If an inquiry produces a response from the NCIC Foreign Fugitive File, you must
contact INTERPOL to confirm that the foreign arrest warrant is valid. Do not
arrest a subject based on a hit from the NCIC Foreign Fugitive File until you have
confirmed the warrant information with INTERPOL.
Procedures are set forth in the NCIC Operating Manual.
6.25 GUN FILE
Serial-numbered weapons (and accessories) which use an explosive, compressed
air or carbon dioxide to propel projectiles and have been stolen or recovered shall
be entered in this NCIC file.
Procedures are set forth in the NCIC Operating Manual.
6.25.1 RECOVERED GUNS
Originating agencies must retain possession of recovered weapons until NCIC
records are removed from the file. If the originating agency loses custody of a
recovered gun, the record must be canceled.
Procedures are set forth in the NCIC Operating Manual.
6.25.2 WEAPON SERIAL NUMBER GUIDELINES
Stolen weapons without serial numbers may be entered into the NCIC files if the
following apply:
GCIC Policy Manual
Rev. 2011
•
The weapon has distinct point(s) of identification other than a true
serial number.
and
•
The weapon is connected with a major criminal investigation.
The identification information or reference to the major investigation must be
described in the Miscellaneous field.
6.26 ARTICLE FILE
Stolen articles that can be identified by manufacturers' serial numbers or by unique
owner-applied numbers, which do not meet the criteria of any other NCIC hot file,
shall be entered into the NCIC Article file.
Procedures are set forth in the NCIC Operating Manual and the NCIC Code
Manual.
6.27 BOAT FILE
Stolen boats may be entered into this NCIC file.
Procedures are set forth in the NCIC Operating Manual and the NCIC Code
Manual.
6.28 SECURITIES FILE
Securities identified by unique serial numbers that have been stolen, embezzled or
counterfeited shall be entered into this NCIC file.
Procedures are set forth in the NCIC Operating Manual.
6.29 RETENTION LIMITS
The following GCIC records are automatically purged after they have been on file
for the indicated periods of time.
GCIC Policy Manual
Rev. 2011
VEHICLE RECORDS
Record Type
Stolen vehicle entered
with VIN
Stolen vehicle entered
without VIN
Felony vehicle
Remains on File
Balance of current year plus 4 years
Vehicle part
Balance of current year plus 4 years
License plate
Balance of current year plus 4 years
Recovered/Abandoned
vehicle
90 days
90 days
If the license plate information is entered as
part of a NCIC stolen vehicle record that also
contains the VIN or OAN, the license plate
information will remain in the stolen vehicle
record for the year of entry plus 4 years.
When the License Plate expires, a caveat will
be included in positive responses which will
read:
“Warning – The following stolen vehicle
record contains expired License Plate data.
Use caution, contact entering agency to
confirm status.”
90 days
GUN RECORDS
Record Type
Stolen gun
Lost gun
Recovered gun
Remains on File
Until cleared or canceled
Until cleared or canceled
Balance of current year plus 2 years
ARTICLE RECORDS
Record Type
Stolen article
Remains on File
Balance of current year plus 1 year
GCIC Policy Manual
Rev. 2011
PERSON RECORDS
Record Type
Wanted person
Remains on File
Until cleared or canceled
Missing person
Until cleared or canceled
Unidentified person
(dead or alive)
Until cleared or canceled
Missing juvenile
Upon the missing juvenile’s 18th birthday,
the record is converted to a missing person
record. Or, until cleared or canceled.
Juvenile warrant
Upon the wanted juvenile’s 18th birthday, the
record is converted to a wanted person
record. Or, until cleared or canceled.
48 hours
Temporary felony
Offender status
Until date of expiration of parole or
probation
BOAT RECORDS
Record Type
Stolen boat
Expiring Registration
Number and/or Year
Non-expiring
Registration Number
and/or year
Remains on File
Balance of current year plus 4 years
1 year after expiration
Balance of current year plus 4 years
SECURITY RECORDS
Record Type
Stolen/embezzled
security
Travelers checks and
money orders
Remains on file
Balance of current year plus 4 years
Balance of current year plus 2 years
GCIC Policy Manual
Rev. 2011
PAWN SHOP RECORDS
Record Type
Pawn Shop
Remains on File
Balance of current year plus 1 year
NCIC PROTECTION ORDER RECORDS
Record Type
Active Protection
Order
Remains on File
Until canceled, cleared or Protection Order
expires. When an order is cleared or expired,
it is placed in an inactive (expired) status.
Remainder of year it becomes inactive plus 5
years or until canceled
Inactive Protection
Order
Non-expiring
(NONEXP)
Temporary or
Emergency Orders
Remains active until canceled or cleared
Duration of the order not to exceed 1 year
SEX OFFENDERS
Record Type
Sex Offender
Remains on File
Life
Multiple Offenses Sex
Offender
Aggravated Offense
Sex Offender
Predators
Life
Life
Life
6.30 IDENTIFYING AND CORRECTING HOT-FILE ERRORS
NCIC uses various computer editing procedures and quality control checks to
identify inaccurate records in the system. Errors are classified as serious or
non-serious. This classification determines the type of action taken by GCIC and
NCIC.
GCIC Policy Manual
Rev. 2011
6.30.1 SERIOUS ERRORS
Serious errors cause NCIC to cancel records and send advisory messages to the
entering agencies and to GCIC advising of the cancellations. Refer to the NCIC
Operating Manual for more information on Serious Errors.
6.30.2 NON-SERIOUS ERRORS
When non-serious errors are discovered, NCIC will notify GCIC. GCIC Quality
Control personnel will forward the notification to the originating agency. Refer to
the NCIC Operating Manual for more information on Non-Serious Errors.
GCIC Policy Manual
Rev. 2011
CHAPTER 7
FILE SEARCHES, AUDITS AND SANCTIONS
7.1
OFF-LINE INVESTIGATIVE SEARCHES
Investigating officers often work with fragments of information when attempting
to identify possible felony suspects, missing persons, unidentified bodies,
particular vehicles used in the commission of serious crimes, or stolen/recovered
property. When only partial data is available or data is not available to make
terminal inquiries, an off-line search is possible. When the investigating officer
faces these problems, the ability to develop a list of possible suspects or other
investigative leads can be greatly enhanced by requesting an off-line search
through GCIC.
Both GCIC and NCIC can search their files, and other files available to them,
with only bits and pieces of information assembled by the investigating officer.
Investigating officers are encouraged to call GCIC or NCIC analysts whenever
they believe that an off-line search can produce investigative leads in complex or
high-priority cases.
GCIC needs from thirty minutes to several weeks to provide useful information,
depending on the nature of the request. When the investigating officer has a highpriority case at night or on weekends and cannot wait for normal business hours
for GCIC to begin work on a case, call the GCIC Communications Center, 404244-2770, for on-call information.
For GCIC off-line computerized file searches call 404-270-8421 or 8422. For an
NCIC off-line search call 304-625-3000. Or if you prefer, GCIC will contact
NCIC and arrange an off-line search for you.
7.2
GCIC AUDIT PROCEDURES
GCIC auditors will conduct compliance audits of criminal justice agencies, public
safety agencies, authorities and certain non-governmental CJIS network terminal
agencies to ensure agencies are in compliance with the GCIC Council Rules,
relevant Georgia Code Sections, and pertinent federal statutes and regulations.
CJIS network terminal agencies and interface agencies will be audited at least
once every three years. A representative sample of non criminal justice agencies
will be audited by GCIC as well. A representative sample of non-terminal
agencies will be audited by the GCIC Information Security Office (ISO).
GCIC Policy Manual
Rev. 2011
Heads of agencies to be audited shall receive at least 15 days advance notice of
on-site audits by GCIC’s compliance auditors. Written notifications will identify
all areas of audit program interest and the performance standards to be applied.
Upon completion of each compliance audit visit, GCIC auditors shall discuss their
findings with heads of agencies, Terminal Agency Coordinators, or their
designees. GCIC will recommend strategies for remedial action by audited
agencies to resolve any area of non-compliance. Auditors will provide heads of
audited agencies with written reports which identify areas of compliance, areas of
non-compliance, and other written comments specific to audit assessments. The
Audit Program Manager will also report the results of completed audits to the
Assistant Deputy Director for Compliance and Customer Support and the Deputy
Director.
After completion of the on-site audit, the Agency Head has 30 days to submit a
written response to the auditor of record.
The GCIC Council may impose sanctions recommended by the Deputy Director
of GCIC for agencies with serious compliance deficiencies or for agencies which
have not corrected deficiencies.
7.3
SANCTIONS
For Criminal Justice Agencies:
Agencies are subject to GCIC administrative sanctions for violation of the laws
governing the operation of the CJIS network, the GCIC Council Rules, GCIC
CJIS Security Policy or CJIS network policies published by GCIC.
Sanctions for CJIS network terminal agencies may include, but are not limited to:
purging of Hot File records entered into GCIC/NCIC files, restricting CJIS
network access and suspension/revocation of the agencies’ terminal access to the
CJIS network.
Failure to abide by federal and state laws, federal rules and regulations, and
Georgia Crime Information Center (GCIC) Rules regarding access, use and
dissemination of information available via the Criminal Justice Information
System (CJIS) Network may result in criminal prosecution by the State of
Georgia and/or administrative sanctions by the employing criminal justice agency
and/or GCIC.
1.
All local agencies must have disciplinary procedures that address
violations of GCIC Rules, Georgia law, or federal rules and regulations
relative to the GCIC/NCIC Criminal Justice Information System (GCIC
Rule 140-2-.09).
GCIC Policy Manual
Rev. 2011
2.
The preferred process is for the agency head to take appropriate
disciplinary action against the employee to prevent further policy
violations. Agency heads are encouraged to create an environment of
compliance within their departments by following normal accepted
disciplinary procedures to ensure full compliance by all employees.
3.
If the disciplinary action against an employee is not appropriate for the
violation, GCIC reserves the right to implement additional sanctions on
the individual(s)/agency involved.
4.
The sanctions may include, but are not limited, to:
•
Mandatory retraining and/or recertification of a Terminal Agency
Coordinator (TAC) by requiring attendance at another TAC class
sponsored by GCIC, as well as completing certain parts of the CJIS
workbook even if they are not a certified operator.
•
Mandatory retraining and/or recertification of a terminal operator by
completing an entire workbook or specific portions and passing
another full certification test.
•
Probation or suspension/revocation of operator’s User ID/password or
TAC certification for GCIC access.
•
Mandatory retraining in the form of the completion of another Security
and Integrity Training Update class.
•
After completion of any training, the operator shall read and sign an
updated GCIC Awareness Statement.
5.
If the violation is major, or the individual has had repeated violations, the
GCIC Deputy Director will notify the Peace Officers Standards and
Training (P.O.S.T.) Council of the GCIC violations and request that
P.O.S.T. take action regarding the individual’s certification(s).
6.
If the violation is major, or the agency has had repeated violations, the
GCIC Deputy Director may notify the Georgia Public Safety Board of the
GCIC violations and recommend suspension or termination of the
agency’s CJIS Network Access.
For Non-Criminal Justice Agencies:
Agencies are subject to GCIC administrative sanctions for violation of the laws
governing the operation of the CJIS network, of the GCIC Council Rules, GCIC
CJIS Security Policy or of CJIS network policies published by GCIC. Sanctions
GCIC Policy Manual
Rev. 2011
for noncriminal justice agencies may include, but are not limited to: access and
suspension/revocation of the agencies’ access to the GAPS network.
Failure to abide by federal and state laws, federal rules and regulations, and
Georgia Crime Information Center (GCIC) Rules regarding access, use and
dissemination of information available via the Criminal Justice Information
System (CJIS) Network may result in criminal prosecution by the State of
Georgia and/or administrative sanctions by the employing agency.
1.
All local agencies must have disciplinary procedures that address
violations of GCIC Rules, Georgia law, or federal rules and regulations
relative to the GCIC/NCIC Criminal Justice Information System (GCIC
Rule 140-2-.09).
2.
The preferred process is for the agency head to take appropriate
disciplinary action against the employee to prevent further policy
violations. Agency heads are encouraged to create an environment of
compliance within their departments by following normal accepted
disciplinary procedures to ensure full compliance by all employees.
3.
If the disciplinary action against an employee is not appropriate for the
violation, GCIC reserves the right to implement additional sanctions on
the individual(s)/agency involved.
4.
The sanctions may include, but are not limited to:
5.
•
Removal of authority to access the GAPS network and criminal history
record information.
•
Mandatory retraining in the form of the completion of another Security
and Integrity Training Update class.
•
After completion of any training, the operator shall read and sign an
updated GCIC Awareness Statement.
Individual violators are also subject to criminal prosecution when their
actions constitute violations of applicable state and federal statutes (GCIC
Rule 140-2-.20)
GCIC Policy Manual
Rev. 2011
APPENDIX A
EXAMPLES OF CONSENT FORMS
Georgia Bureau of Investigation
Georgia Crime Information Center
Consent Form
I hereby give my consent for the ___________________________________________________
(criminal justice agency)
to receive any Georgia or III criminal history record information pertaining to me, as authorized
under state and federal law for individuals seeking employment with a criminal justice agency.
_____________________________________________________________________________
Full Name (print)
_____________________________________________________________________________
Address
_____
Sex
_____
Race
__________________
Date of Birth
_________________________
Social Security Number
___________________________________________________
Signature
__________________
Date
---------------------------------------------------------------------------------------------------------------------------Special employment provisions (check if applicable):


Employment with criminal justice agency – civilian (Purpose code ‘J’)
Employment with criminal justice agency – P.O.S.T. certified (Purpose code ‘Z’)
One of the following must be checked:


This authorization is valid for 90/180/_____ (circle one) days from date of signature.
I, _______________________________________________ give consent to the above
named to perform periodic criminal history background checks for the duration of my
employment with this agency.
GCIC Policy Manual
Rev. 2011
Georgia Bureau of Investigation
Georgia Crime Information Center
Consent Form
I hereby authorize ______________________________________________________________
to receive any Georgia criminal history record information pertaining to me which may be in the
files of any state or local criminal justice agency in Georgia.
_____________________________________________________________________________
Full Name (print)
_____________________________________________________________________________
Address
_____
Sex
_____
Race
__________________
Date of Birth
_________________________
Social Security Number
___________________________________________________
Signature
__________________
Date
---------------------------------------------------------------------------------------------------------------------------Special employment provisions (check if applicable):



Employment with mentally disabled (Purpose code ‘M’)
Employment with elder care (Purpose code ‘N’)
Employment with children (Purpose code ‘W’)
One of the following must be checked:


This authorization is valid for 90/180/_____ (circle one) days from date of signature.
I, _______________________________________________ give consent to the above
named to perform periodic criminal history background checks for the duration of my
employment with this company.
GCIC Policy Manual
Rev. 2011
Open Record Request
Felony Convictions
Use Only Purpose Code P
I
request that
(individual requestor’s full name)
Law Enforcement Agency Name
provide me with any felony convictions under O.C.G.A. § 35-3-34 and § 35-3-35
for the below described individual:
Full Name
______
Sex
________
Race
_______________
Date of Birth
______________________
Social Security Number
Agency personnel will make this inquiry using only the information provided on
this form and will only use purpose code P.
_________
Date
__________________________________
Requestor’s Name
______________________________
Requestor’s Signature
GCIC Policy Manual
Rev. 2011
Georgia Bureau of Investigation
Georgia Crime Information Center
Georgia Driver’s History Consent Form
I hereby authorize the ______________________________________________________
(fire department/law enforcement agency name)
to receive a copy of my Georgia driver’s history information as part of my application for
criminal justice employment, or for use relative to the performance of my official duties
with this agency.
_____________________________________________________________________________________
Full Name (print)
_____________________________________________________________________________________
Address
_______
Sex
_________________
Date of Birth
________________________
Driver’s License Number
_________________________________________________________
Signature
_____________________
Date
GCIC Policy Manual
Rev. 2011