Laserfiche WebLink
82C-MDT/Laptop Use (Registry Computer) <br /> <br /> <br />Policy & Procedure Page 5 of 6 <br />b. Laptop computers should be removed from any vehicle, which is <br />anticipated to be out of service for an extended period of time. <br />c. Computers should be rendered non-functional when a vehicle is sent to <br />be repaired by a non-municipal repair facility. They may remain in the <br />vehicle when municipal employees service the vehicle. <br /> <br />i. In all cases, computers may be removed from the vehicle. <br />ii. Computers equipped with air cards may have the air cards <br />removed. <br /> <br />d. If a computer or air card is discovered to be lost or stolen, this shall be <br />reported immediately to the Commanding Officer, who will make sure the <br />proper steps are taken to render access of the device to the network <br />inaccessible. <br /> <br />2. Any user who finds a potential lapse in security on any system shall be obligated <br />to report the potential lapse to their Commanding Officer immediately. The <br />system(s) shall then be taken out of service until the problem can be <br />investigated. <br /> <br />3. Security incidents, which violate confidentiality, integrity, or availability of data, <br />must be reported to the Criminal History Systems Board.i <br /> <br />4. No employee shall log into any computer or application using the username and <br />password of another employee. This action is a crime under M.G.L. c. 266, <br />§120F and a serious breach of security.ii <br /> <br />F. Training <br /> <br />1. All employees using mobile / laptop computers shall be trained on the use of <br />the computer and software applications they are to use. <br /> <br />2. Criminal Justice Information System users are required to be trained, tested, <br />and certified, at the minimum, to the “Admin and Query” level of use.iii <br /> <br />G. Data Log Files <br /> <br />1. A transaction log of CJIS queries and responses must be maintained pursuant <br />to 3.8.1 of the CJIS User Agreement. Files must be maintained for at least two <br />years and must be available to CHSB upon their request. For further <br />information, see Department policy 13A-Computers, Security and General <br />Management. <br /> <br />2. The mobile software logs, mobile communications and data queries may be <br />public records and may have to be released upon receipt of a public records <br />request. For more information see Department policy 82A-Records <br />Management. <br />