Crime records  2
Length
16 hours
Enrollments
228
Modules
1
Rating

REQUIREMENT: Bring the FA Handbook to class. The handbook can be located in the course module.

Day One

By the end of this training session the participant will be able to:

- Describe the function and goal of the National and Texas Crime Information Centers.

- Show the CJIS System Agency concept and the relation between the FBI, Texas DPS and the local agency.

- Show how to find additional information if needed through the TCIC contact list and TLETS help files.

- Describe the relationship of TCIC/NCIC to TLETS/NLETS.

- Review the CJIS Systems Access Policy for terminal location/access and personnel access.

- Describe the NCIC/TCIC system design.

- List the files in NCIC and TCIC and the retention periods for each file.

- Identify record responsibility and the validation process.

- Define the general criteria for an inquiry.

- Define Vehicle file and list the information required to run an inquiry.

- Explain the Help End Auto Theft and Texas Recovery and Identification Programs.

- List the information required to run an inquiry on an NCIC Boat File.

- Indentify the Gun file and list the information required to run an inquiry.

- Define the Article file and list the information required to run an inquiry.

- Describe Security file and list the information required to run an inquiry.

- Describe Wanted Persons file and list the information required to run an inquiry.

- List the possible files cross searched with a Wanted Person inquiry.

- Explain specific files inquiries (Concealed Handgun License, Protective Order, Registered Sex Offender, Foster Home Member, Corrections Tracking System, and Continuity of Care).

- Identify the ORI file, TIC/NIC, Orion, and Date of Entry Transaction Inquiry.

- Discuss the importance of confirming a hit.

- List the files that do not require hit confirmation.

- List the hit confirmation levels of priority and define substantive response.

- Create the steps in confirming a hit.

- Explain the use for Detained Wanted Person file.

- State the criteria for an Off-line Search and the possible search fields.

- Define the Delayed Inquiry program.

- Identify the sources of criminal history record information (CHRI).

- Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC.

- List the required fields for a QH inquiry into Texas CCH and NCIC III.

- Discuss and explain the common purpose codes used for requesting CCH and III data.

- Discuss the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR.

- Show the possible TCIC/NCIC responses and resulting actions needed from a QH.

- Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel.

- Discuss CHRI logging and secondary dissemination procedures.

- list the only methods of CHRI storage and destruction.

- List and discuss the CHRI related laws and list the possible sanctions for violations.  

 

Day Two

By the end of this training session, the participant will be able to:

- Review the responsibility for records entered into TCIC and NCIC.

- Describe the validation process and define validation certification.

- Show and explain the possible $ messages received from NCIC.

- Define and give examples of the transaction and possible caution codes for an entry.

- Identify the information required to enter into the Vehicle file.

- List the information required to enter into the Boat file.

- Review the information required to enter into Gun file.

- State the information required to enter into the Article file.

- List the information required to enter into the Security file.

- Define and give examples the transaction and possible caution codes for an entry.

- Show examples and create an entry with information required to enter into the Wanted Person file.

- List the information required to enter into the Identity Theft file.

- Identify and devlop a record with the information required to enter into the Threat Against Peace or Detention Officer file.

- List the information required to enter into the Criminal Gang file.

- Review and list the information required to enter into the Protective Order file.

- Describe the information required to enter into the Capias Warrant for Non-Payment of Child Support file.

- Create and develop from the information required to enter into the Missing Person file a sample of a missing person record.  

- List the information required to enter into the Unidentified Person file.

- Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction.

- Explain the NLETS ORION file and how to modify the file using the TU transaction.


Course Prerequisites



Upcoming Dates

Upcoming course schedule dates
Date Time Instructor Location Room Name Room #