HomeMy WebLinkAbout82C- Laptop Computer Usage - 2019
Policy & Procedure Page 1 of 6
Lexington Police
Department
Subject:
Laptop Computer Usage
Policy Number:
82C Accreditation Standards:
Reference: 41.3.7 Effective Date:
3/11/13
New
Revised
Revision
Dates:
1/24/19
By Order of: Mark J. Corr, Chief of Police
The Municipal Police Institute, Inc. (MPI) is a private, nonprofit charitable affiliate of the
Massachusetts Chiefs of Police Association. MPI provides training and model policies and
procedures for police agencies. This policy is an edited version of MPI Policy 1.21, “Use of
Mobile Date Terminals (MDT’s).”
GENERAL CONSIDERATIONS AND GUIDELINES
The advent of computer access to Criminal Justice Information Sharing (CJIS) and
Department records from police vehicles has put a powerful tool into the hands of
police employees. Access to CJIS and the gateway to national files are controlled by
the Criminal History Systems Board (CHSB), under an agreement with the Federal
Bureau of Investigation (FBI) CJIS Division.
Through this agreement, CHSB is mandated with providing 24/7 access to national
criminal justice information files such as missing and wanted persons, Interstate
Identification Index (III), convicted sex offenders, and others.
CHSB is also charged with maintaining network and user security. Software vendors
who apply to CHSB for access to CJIS files must pass rigorous reliability and security
testing prior to being certified for use in Massachusetts.
All CJIS applications must maintain transaction log files. Some portions of log files of
data queries and mobile-to-mobile communications are a public record and may have
to be released pursuant to a public records request.
The purpose of this policy is to provide Lexington Police Officers with guidelines for the
proper use of Laptop Computers (sometimes referred to as “Mobile Data Terminals” or
“MDTs”). In order to ensure legal and proper use of this resource, all Department
members must have a thorough understanding of the content of this policy and the
importance of it.
82C-MDT/Laptop Use (Registry Computer)
Policy & Procedure Page 2 of 6
It is the policy of the Lexington Police Department that:
• Employees using mobile computers and software will be trained to the
appropriate level of use;
• Mobile computers are to be used for legitimate police business, research
and investigations;
• Employees are responsible for ensuring that mobile computers are used
in an effective, efficient and lawful manner;
• Random and periodic audits of laptop use and log files will be made at
the Department's discretion; and
• The security and safety of mobile computers is a top priority for
employees assigned this equipment.
DEFINITIONS
MDT: Mobile Data Terminal (LAPTOP): A cruiser-mounted or otherwise
portable computer used by trained and certified department members for
purposes of accessing Criminal Justice Information System, Criminal History
Systems Board, Law Enforcement Administrative Processing System records,
police department information systems or other available information via secure
access to various information bureaus.
Accounts: All users are responsible for the proper use of the accounts,
including proper password protection. Accounts will be created and assigned by
the Account Administrator.
CJIS: Criminal Justice Information System: The computerized network,
services and applications that offers law enforcement agencies within the state
and nationally secure access to state and interstate criminal history, driver and
vehicle records, restraining orders and other important confidential data.
CHSB: Criminal History Systems Board: The state agency responsible for
maintaining the state’s law enforcement data communications network and
systems and for the processing and dissemination of C.O.R.I. to authorized
entities and persons.
C.O.R.I.: “Criminal Offender Record Information”: records and data in any
communicable form compiled by a criminal justice agency which concern an
identifiable individual and relate to the nature or disposition of a criminal charge,
an arrest, a pre-trial proceeding, other judicial proceedings, sentencing,
incarceration, rehabilitation, or release. For a more in-depth definition, see
Department policy 82B- Criminal Offender Record Information.
LEAPS: Law Enforcement Administrative Processing System
82C-MDT/Laptop Use (Registry Computer)
Policy & Procedure Page 3 of 6
PROCEDURES
A. Hardware
1. Computers connected to mobile application software will generally be mobile
(laptop) computers.
2. Computer connectivity to the mobile system may be accomplished by:
a. Laptops with built in modems; or
b. Laptop air card.
3. Servers, which run mobile applications, are located in a secure facility with
access limited to authorized persons only.
B. Software
1. Authorized Software
a. Mobile software applications running on the mobile network are:
i. Criminal Justice Information System – CJIS Web;
ii. ProPhoenix
iii. Microsoft Outlook;
iv. Internet explorer;
v. Microsoft word.
2. Prohibited [41.3.7]
a. Only authorized software may be run on mobile computers. Unauthorized
software programs or files may not be introduced into agency computers.
b. Authorized software may not be manipulated or altered on any agency-
owned mobile or desktop. Modifying computer settings, such as
changing Windows or ProPhoenix is prohibited.
C. User Access
1. Each authorized user of the system will be issued a login name and password.
Users are responsible for maintaining the security of their passwords, and
should never share them with anyone, including other employees.
2. Employees authorized to query Board of Probation (BOP) checks must have a
user name and password and be trained to at least the “Admin and Inquiry” level
of use. A user name and password is obtained from the Department authorized
Criminal Justice Information System Representative.
Commented [GS1]: Added new computer system
82C-MDT/Laptop Use (Registry Computer)
Policy & Procedure Page 4 of 6
D. Use
1. At the beginning of the shift, employees shall check the laptop computer while
completing their routine vehicle checks. Damaged equipment must be reported
to a supervisor immediately.
2. Employees should log onto the assigned computer and complete their vehicle
checklist after roll call. The system should remain active for their entire tour. If
any problems are encountered, employees should check the equipment as
explained in this policy under “trouble shooting” prior to reporting the equipment
inoperative. Unresolved issues should be reported to the Commanding Officer.
3. All mobile computing transactions must conform to FCC guidelines regarding
radio transmissions and shall not contain improper language or subject matter.
4. Use of the computer should be avoided while the vehicle is in motion, as this
may divert the officer’s attention from the safe operation of the vehicle. The
preferred method when a vehicle is in motion is to run a query through Dispatch.
5. No food, beverage or any other substance that may inflict damage will be placed
on or near the computer.
6. Only the provided stylus pen or a clean finger may be used to operate the touch
screen. Use of any other object to activate the touch screen is prohibited, as it
may scratch or otherwise damage the screen display.
7. Laptop screens should be cleaned with a soft, clean cloth, such as a micro fiber
cloth. Use of cleaning solvents and liquid-based products on the computer is
prohibited, this includes disinfectant wipes, as they often cause hazing or
damage to the screen. If further cleaning is required, notify the Commanding
Officer or Police Mechanic.
8. To ensure that officers’ accounts are not accessed, officers must log off of the
computer at the end of their tour.
9. All computer inquiries will be done for legitimate police operations. All users
are prohibited from querying any person or vehicle for personal reasons or
simple curiosity. The querying of high profile individuals will trigger an
immediate audit by the Commonwealth of Massachusetts and/or the Federal
Government.
E. Security
1. Vehicle Mounted computers:
a. All cruisers equipped with computers shall be locked whenever
unoccupied.
82C-MDT/Laptop Use (Registry Computer)
Policy & Procedure Page 5 of 6
b. Laptop computers should be removed from any vehicle, which is
anticipated to be out of service for an extended period of time.
c. Computers should be rendered non-functional when a vehicle is sent to
be repaired by a non-municipal repair facility. They may remain in the
vehicle when municipal employees service the vehicle.
i. In all cases, computers may be removed from the vehicle.
ii. Computers equipped with air cards may have the air cards
removed.
d. If a computer or air card is discovered to be lost or stolen, this shall be
reported immediately to the Commanding Officer, who will make sure the
proper steps are taken to render access of the device to the network
inaccessible.
2. Any user who finds a potential lapse in security on any system shall be obligated
to report the potential lapse to their Commanding Officer immediately. The
system(s) shall then be taken out of service until the problem can be
investigated.
3. Security incidents, which violate confidentiality, integrity, or availability of data,
must be reported to the Criminal History Systems Board.i
4. No employee shall log into any computer or application using the username and
password of another employee. This action is a crime under M.G.L. c. 266,
§120F and a serious breach of security.ii
F. Training
1. All employees using mobile / laptop computers shall be trained on the use of
the computer and software applications they are to use.
2. Criminal Justice Information System users are required to be trained, tested,
and certified, at the minimum, to the “Admin and Query” level of use.iii
G. Data Log Files
1. A transaction log of CJIS queries and responses must be maintained pursuant
to 3.8.1 of the CJIS User Agreement. Files must be maintained for at least two
years and must be available to CHSB upon their request. For further
information, see Department policy 13A-Computers, Security and General
Management.
2. The mobile software logs, mobile communications and data queries may be
public records and may have to be released upon receipt of a public records
request. For more information see Department policy 82A-Records
Management.
82C-MDT/Laptop Use (Registry Computer)
Policy & Procedure Page 6 of 6
H. Trouble Shooting
1. Computer won’t power on:
a. Check for battery light and power to the system. The computers are hard
wired to the cars.
2. Computer is on but the screen is frozen:
a. Check to see if the mouse or keyboard is working. If so, reboot the
computer. If not, shut the computer off using the power switch, wait at
least 30 seconds, and then turn the computer on.
3. Computer comes on and the programs load but the user cannot log in:
a. Ensure that the “cap lock” or “numbers lock” key is not on and that the
keyboard and mouse are working.
b. Check to see if the computer is connected to the network.
4. The computer is not connected to the network:
a. Check to ensure that the access is connected to the provider.
b. If access is not connected try to “connect” by pressing the button that
states connect. If this is not successful try to reboot the system.
c. If the computer is equipped with an air card, (none of the marked units
have air cards) check to ensure that the card is properly seated and that
the antenna connection is tight.
5. The program is running but the user does not get any Criminal Justice
Information System data back:
a. Check with other officers to see if they are having difficulty as well.
b. Multiple vehicle problems indicate a network or server issue.
i Appendix D, CJIS Users Agreement.
ii M.G.L. c. 266, §120F.
iii CJIS User Agreement, 3.18.