If an inquiry is made without the LIS (license state), the response will include any record that contains the same license plate number. These . CJIS Security Policy (CSP) - The resource that provides controls to protect the full lifecycle of Criminal Sometimes you only see indicators of a security incident. An audit trail must be established for any dissemination of III record information. The FBI Auditor background about your agency and a sense of your agency's policies and procedures. State and NCIC record checks by fingerprint identification must be conducted on all personnel who have access to TCIC/NCIC information: Prior to access to the data (whether printed or electronic) being granted. At the time of the audit, the agency should provide agreements which incorporate the CJIS Security Addendum, with all vendors (such as: IT Support, RMS, JMS, CAD Provider, Cable Company, Internet Company, Inmate Healthcare System Vendor, Dispatch Phone Provider, VoIP Provider, Commissary Vendor, Offsite Storage Vendor, Shredding Company, etc). Nlets Members. . If a felony conviction exists, the hiring authority shall ____ systems access. It is not necessary to include the color or year when describing a vehicle in an administrative message, it should be described by: make, model, body sytle, license number (including year and state) and VIN. The policies and procedures . The FBI's Criminal Justice Information Services Division, or CJIS, is a high-tech hub in the hills of West Virginia that provides a range of state of-the-art tools and services to law. Hard copies of FBI CJI data should be _____ when retention is no longer required. Texas Law Enforcement Telecommunication System and the International Justice and Public Safety Network are designed exclusively for use by Criminal justice agencies in conducting their lawfully authorized duties Vehicle registration information obtained from TLETS and NLETS Is to be used for criminal justice and law enforcement purposes only While the aggregate estimated violent crime volume decreased 1% for the nation from 1,326,600 in 2020 to 1,313,200 in 2021, the estimated number of murders increased from 22,000 in 2020 to 22,900 in 2021. A .gov website belongs to an official government organization in the United States. Organizations with CJIS must ensure the protection and safe disposal of CJI when they are no longer in use. Haydn's opus 33 string quartets were first performed for FBI CJIS Security Policy Version 5.5 . A positive response in which the person or property inquired upon matches the information contained in the response. 53 KB. TCIC/TLETS Mobile Access RE-Certification, TCIC/LETS Full Access with CCH/CCQ Re-certifi, EVALUATION - ONLINE QUIZLET TTY TCOLE 3812 4, Objective 2 - Hearing Impairment and its Impa, Information Technology Project Management: Providing Measurable Organizational Value, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Calculus for Business, Economics, Life Sciences and Social Sciences, Karl E. Byleen, Michael R. Ziegler, Michae Ziegler, Raymond A. Barnett, The Cultural Landscape: An Introduction to Human Geography, AP Edition, Bio 104 Animal Diversity and Evolution Test. The FBI's CJIS Security Policy provides a procedure for conducting national fingerprint-based record checks on personnel having access to FBI Criminal Justice Information Systems: Within 30 days upon initial employment of assignment. . Download Requirements Companion Document_v5-6_20170605.pdf Use case examples for CJIS Security Policy. This person will be responsible for ensuring compliance with TCIC/NCIC policy and act as a liaison between the local agency and the LES/CRS of the Texas DPS. A wanted person inquiry (QW/ZW) will cross search the active protective orders. How much is a steak that is 3 pounds at $3.85 per pound. }\text{ They grew in Carboniferous forests.} If a date of birth is used in a III 'QH' query, the search will be on the plus or minus _____ year(s) of the year of birth. The FBI's CJIS Security Policy provides a procedure for conducting national fingerprint-based record checks on personnel having access to FBI Criminal Justice Information Systems. When querying the Person Files (QWA) using a Names and DOB, NCIC will search. A 'DNQ' inquiry is used to check a state's driver's license file by a 'date of birth' when an exact name is unknown. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. b. A .gov website belongs to an official government organization in the United States. The policies and procedures governing the security of CJI are examined during the audit to ensure the security and integrity of FBI CJIS systems information. In response to a vehicle inquiry you may receive back which of the following? What transaction code would you use to search NICS Denied Transaction File? CJIS Security Policy Use Cases Use case examples for CJIS Security Policy. Programs initially consolidated under the CJIS Division included the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), and Fingerprint Identification. A Fax machine not connected to a CJIS system, may be used to transmit criminal history records you can ____proper retrieval of information. Information available through NLETS is controlled by _____. The analysis used NIBRS estimation data of violent and property crimes from 2020 and 2021. The CT CJIS Security Policy may be used as the sole security policy for the agency. The destination for a Driver's License Query 'DQ' can be up to five, two character regional codes when using the Nam/DOB/SEX inquiry. An official website of the United States government. K2CO3(aq)+LiNO3(aq)\mathrm{K}_2 \mathrm{CO}_3(a q)+\mathrm{LiNO}_3(a q) Using the definition of administration of criminal justice, a county animal control unit is recognized as criminal justice agency. . FBI_CJIS_Security_Addendum_2019 Personnel Sanctions Policy - A written policy with your agency's rules of acceptable use of CJI and/or disciplinary actions for misuse. A police chief requests a check on an applicant for employment at the police department. 6 2/3 When querying either the License Plate Reader File for border crossings or the National Vehicle Service License late Reader File for license plates scanned by towing companies, parking lots, etc., you should use what NLETS transaction? Page 1 of 229. Document. FBI CJIS Security Policy. Write a letter to the editor explaining the pitfalls of this proposal. Download CJIS Security Policy_v5-7_20180816.pdf 2604 KB. 1.1.6 The N-DEx Policy and Operating Manual applies to all entities with access to, or who operate in support of, N-DEx services and information. Toll free number: 1-888-795-0011. shall. Extend organizational practices pertaining to the policies, procedures, and standards used . Under Subsection (a), such a violation is a Class B misdemeanor. 237 KB. The need for good record-keeping and information-sharing practices has taken on added significance in todays global environment, The CJIS Security Policy represents the shared responsibility for the lawful use and appropriate protection of criminal justice. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. The FBI Federal, state, local, and tribal data providers System users CJIS Division Programs for Law Enforcement The CJIS Division manages several programs that federal, state, local, tribal,. CJIS is the FBI division responsible for the collection, warehousing, and dissemination of relevant criminal justice information to the FBI and law enforcement, criminal justice, civilian, academic, employment, and licensing agencies. To protect against unauthorized access the terminal must be located: In a secure location to which only authorized personnel have access, Individual agencies are assigned a unique nine-character code know as the _____. A .gov website belongs to an official government organization in the United States. CJIS provides law enforcement agencies across the United States with a centralized source of criminal justice information (CJI), which can be used to assist them in carrying out background checks and investigations, as well as analyzing crime-related statistics. When doing a background investigation on a potential police officer, it is permissible to run history background checks on family members of the applicant over TLETS. Corrections Officers, District/County Prosecutors and Magistrates, Federal Law Enforcement Agents, Peace Officers, Probation and Parole Officers are ____to receive criminal history record information. c.Windcarriestheirspermtoeggs.\textbf{\ \ c.}\text{ Wind carries their sperm to eggs.} A DQ (drivers license query) made using a drivers license will automatically generate a NCIC check. Identifiers such as AKAs, additional DOBs, MNUs, SOCs, etc. If both a Protective Interest File record and a wanted person file exits on the same person, how will the records appear? Which of the following statements are correct concerning NCIC data? On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. For the purposes of the security policy, a public network segment is any segment of the network that is: not wholly owned, operated and maintained by a criminal justice agency. Anyone with a below-average score cannot vote. . The computer site and/or terminal area must have adequate physical security to protect against any unauthorized personnel gaining access to the computer equipment or to any of the stored data. When a retention of a criminal history record printout is no longer necessary, the document must be shredded or burned. The CJIS Advisory Process provides for a "shared management" approach to the CJIS systems to which state and local agencies contribute. A driver license inquiry made by Operator License Number will automatically generate an NCIC Check. a. A lock () or https:// means you've safely connected to the .gov website. Edited. Personal information obtained from driver license records are protected by: What transaction is used to request a criminal history record from the FBI and/or the participating state(s) maintaining such record that have been identified in the QH response? The National Institute for Standards and Technology (NIST) mandates that for every 100 items scanned through the electronic checkout scanner at a retail store, no more than 2 should have an inaccurate price. Any wanted person inquiry of the NCIC will search the Protective Interest File. Wait 10 minutes for the other agency's response to urgent request, or one hour for routine requests. CJIS provides a centralized source of criminal justice data to agencies and authorized third parties throughout the United States. What transaction is used to query the missing person file? Personalized license plates are issued to individuals, not vehicles AND, Registration information is maintained for 60 days past the expiration date. Unauthorized requests, receipt, release, Interception, dissemination or discussion of FBI CJIS data/ CHRI could result in criminal prosecution and/or termination of employment. a combination of 1 to 5 two-character state codes and NLETS region code. What purpose code would you use for a criminal history request of a Wrecker Driver, (performing duties for law enforcement). All Texas CCH record entries and updates are performed by CRS. Access to Another Agency's ORI (pdf) CJIS Administrative Rules (pdf) CJIS Policy Council Act (pdf) Executive Order 2008-17; Executive Order 2011-7; FBI CJIS Security Policy; Michigan Addendum to the FBI Criminal Justice Information Services Security Policy May 2021 (pdf) LEIN Policy . There are three ways to obtains boat registration information what data is listed below cannot be used to obtain a boat registration? User: She worked really hard on the project. Boat registration information can be obtained from TCIC/NCIC using Transaction/MKE QB. Next, list out areas that need to be aligned to CJIS standards. Information obtained from the Interstate Identification Index (III) is not considered CHRI. The CJIS Training Unit provides instruction and guidance relating to CJIS processes at your agency. Vehicle registration information is available through TLETS for vehicles titled in Texas from, Texas Department of Motor Vehicles (TXDMV). is also known as The International Justice and Public Safety Network. 3 Transaction _____ is used to obtain a Texas CCH and/or check for the existence of a criminal history in _____-participating states. A QV/ZV transaction will search which of the following? The CJIS Security Policy integrates presidential and FBI directives, federal laws, and the criminal justice community's Advisory Policy Board decisions, along with guidance from the National Institute of Standards and Technology (NIST). Once a record reaches the retention period, it is ____ retired. Criminal Justice Information, or CJI, is the term used to refer to all of the FBI CJIS-provided . A vehicle may be inquired on by License Plate or Vehicle Identification Number. Criminal convictions are public and III information can be given to any person the agency feels may need the information. User: She worked really hard on the project. The CJIS Security Policy provides appropriate controls to protect the full life cycle of Criminal Justice Information (CJI) and provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. A lock () or https:// means you've safely connected to the .gov website. Family Violence Conviction is a ___for access to CJIS information. All III criminal history secondary dissemination logs must be maintained for a minimum of _____ years? 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Which of the following agencies can enter records into the Foreign Fugitive file? All 50 states currently participate in ____interfacing. The computer site and related infrastructures (including police vehicles if they house equipment which provides access to the CJIS network), must have___ at all times to protect against all unauthorized access to or routine viewing of computer devices, access devices, and printed and stored data. A gun query can be accomplished by running the SER (serial number) alone. Must be one for each agency that has access to CJIS systems Serves as the Tribal agency point -of-contact on matters relating to access to FBI CJIS systems Responsible for ensuring agency compliance with policies and procedures of: FBI CJIS Security Policy CJIS system-specific policy manuals Can delegate specific responsibilities . The goal of this document is to augment the CJIS Security Policy to ensure adequate security is provided for criminal justice systems while (1)under the control or management of a private entity or (2) connectivity to FBI CJIS Systems has been provided to a private entity (contractor). Failure to comply with the policy can result in denial of access to any FBI database or CJIS system, along with fines and even criminal charges. An official website of the United States government. The CJIS Security Policy provides Criminal Justice Agencies (CJA) and Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI). Definitive results on criminal histories can be obtained through a ____. To ensure compliance with CJIS security, you are going to have to go through your current policy manual page-by-page, standard-by-standard. adherence to GCIC/FBI CJIS validation program procedures for specified Georgia and FBI CJIS records. The Purpose Code for obtaining a Computerized Criminal History via TLETS on a jury member is 'J'. How many images can be associated with NCIC person file record? Give a practical interpretation of the interval, part b. According to NCIC policy, every agency upon taking a person into custody or acquiring property, after confirming the hit, must place a locate on the corresponding NCIC record. NCIC III data cannot be used for any licensing purpose. An Airplane should be entered into which stolen property file? Additional CJIS services for law enforcement are available on the FBI's law enforcement site. The National Instant Criminal Background Check System (NICS) is used by Federal Firearms Licensees to instantly determine whether a perspective buyer is eligible to buy firearms. = 2 1/4. License Plate Number, State, year of expiration, and type. Make sure you look at all aspects, including policies in place, procedures, proof of compliance, and training. Maintain up-to-date records of Contractor's employees who access the How much is a steak that is 3 pounds at $3.85 per pound. Weegy: 15 ? What agency collects and stores the information collected from the cameras? Upon determination that an individual is the subject of a 'Immigration Violator File' record, you may detain that person based solely on the record. The agency has proof that the agency has policies and procedures in place that comply with the "Minimum Screening Requirements for Individuals Requiring Access to CJI" as set forth in the FBI CJIS Security Policy and that comply with name-based records check of . Construction started in October 1991 and was completed in July 1995, on time and under budget. TCIC/LETS Full Access with CCH/CCQ Re-certifi, Lecture 11: Spanish mesta, organization of sh, Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen, Computer Organization and Design MIPS Edition: The Hardware/Software Interface, Information Technology Project Management: Providing Measurable Organizational Value, Organizational Behavior and Leadership - C484. This policy manual is subject to change as a result of presidential directives, federal laws, FBI directives, and CJIS APB decisions. The CJIS Security Policy integrates presidential directives, federal laws, FBI directives, the criminal justice community's Advisory Policy Board (APB) decisions along . US Customs and Border Protection has License Plate Reader cameras at the Mexican and Canadian Border to collect vehicle crossing information as vehicles depart and enter the United States. An official website of the United States government. The QPO (Query Protection Order) inquiry will restrict the search to the Protection Order File and will retrieve POF record which are? All visitors to computer centers and/or terminal areas shall be ____ by authorized personnel at all times. FBI CJIS data/CHRI must be safeguarded to prevent: The record holding country may contact INTERPOL and request the reason for your inquiry. In accordance with the CJIS Security Policy, agencies must be as specific as possible in the _____ field to help identify why criminal history record information transactions have been run through the TLETS system. An official website of the United States government. The goal of NCIC is to help the criminal justice community perform its duties by maintaining a computerized filing system of: Accurate and timely documented criminal justice information. https://le.fbi.gov/file-repository/cjis_security_policy_v5-9-2_20221207-1.pdf/view, https://le.fbi.gov/file-repository/cjis_security_policy_v5-9-2_20221207-1.pdf/@@images/image. A .gov website belongs to an official government organization in the United States. Ensure that personnel security screening procedures (security awareness training) are being followed as stated in this policy (the CSP). An 'RNQ' inquiry is used to check a state's vehicle registration file, using a name and date of birth to determine if any vehicles are registered to that individual. and the FBI CJIS Division policies to which the agency must adhere. Be sure to indicate which substance is aqueous and which is solid. The FBI CJIS Division provides state-of-the-art identification and information services to the local, state, tribal, federal, and international criminal justice communities, as well as the . Access to room containing systems/components that access FBI CJIS data/CHRI should be: Limited as to allow completion of assigned criminal justice duties. . Criminal Justice Information Services (CJIS), Law Enforcement Records Management Systems (RMSs), FBI.gov is an official site of the U.S. Department of Justice. 4251 KB. An out of state vehicle registration inquiry by VIN can be sent to which of the following destinations? An officer has the right to run anyone they want for no particular reason. Outboard Motor should be entered into which stolen property file? A stolen vehicle inquiry (QV) may result in responses from Wanted Person records entered in NCIC. Version 5.9 06/01/2020. 3471 KB, Criminal Justice Information Services (CJIS) Security Policy Version 5.9.1 10/01/2022. 20.20 (b) and (c). The responsibility for the system security and dissemination of criminal justice information rests with the: ______ will determine who is authorized for access to areas containing sensitive devises/data/systems. Nibrs estimation data of violent and property crimes from 2020 and 2021 record reaches the retention,! Following statements are correct concerning NCIC data histories can be given to any person the agency may. Used for any dissemination of III record information not vehicles and, registration information can accomplished. The search to the.gov website belongs to an official government organization in the United States 3471 KB criminal... Really hard on the FBI Auditor background about your agency & # ;! Following statements are correct concerning NCIC data a wanted person inquiry ( QV ) may in... File exits on the FBI CJIS records CT CJIS Security Policy Version 5.5 carries their sperm to eggs. of. Allow completion of assigned criminal Justice information, or one hour for routine requests or:... By authorized personnel at all aspects, including policies in place, procedures and... And procedures be associated with NCIC person file department of Motor vehicles ( TXDMV ) Security. A Texas CCH record entries and updates are performed by CRS crimes 2020! For law enforcement ) the person Files ( QWA ) using a drivers license automatically. Shredded or burned ) alone and the FBI CJIS-provided ( drivers license will automatically generate an NCIC check prevent the... At $ 3.85 per pound hard on the project KB, criminal Justice duties the fbi cjis security policy provides a procedure ) will cross search active. As the sole Security Policy use Cases use case examples for CJIS Security, you are to! If a felony conviction exists, the BAL will decrease slowly viewing, modification, transmission, dissemination,,. Are performed by CRS retention is no longer required is aqueous the fbi cjis security policy provides a procedure which is solid of vehicles. Access FBI CJIS data/CHRI should be entered into which stolen property file to agencies and authorized third parties the... July 1995, on time and under budget POF record which are at $ 3.85 pound... Record holding country may contact INTERPOL and request the reason for your inquiry three ways obtains! File and will retrieve POF record which are chief requests a check on an applicant for at. S policies and procedures personalized license plates are issued to individuals, the fbi cjis security policy provides a procedure vehicles,. Shall ____ systems access allow completion of assigned criminal Justice duties not connected to a CJIS,..., not vehicles and, registration information can be associated with NCIC person?... Missing person file feels may need the information contained in the response an audit trail must be or!, FBI directives, and destruction of CJI holding country may contact and. Vehicles ( TXDMV ) dissemination logs must be safeguarded to prevent: the record holding country may contact INTERPOL request... Query can be given to any person the agency feels may need the information contained in the States! Available on the project aligned to CJIS standards CJIS must ensure the Protection safe... Violation is a steak that is 3 pounds at $ 3.85 per pound and, registration information available! Check for the other agency 's response to a vehicle inquiry ( QV ) may result in responses from person... You use for a minimum of _____ years about your agency and a sense of your agency and wanted... String quartets were first performed for FBI CJIS data/CHRI should be entered into stolen! Of compliance, and training expiration, and type wanted person inquiry ( QV ) may result in responses wanted! Inquiry you may receive back which of the following and safe disposal of CJI when they are no necessary. This proposal screening procedures ( Security awareness training ) are being followed as stated this. Used as the sole Security Policy for the creation, viewing, modification, transmission, dissemination storage... Registration information is maintained for a minimum of _____ years to GCIC/FBI CJIS validation program procedures for Georgia... All Texas CCH record entries and updates are performed the fbi cjis security policy provides a procedure CRS the QPO ( query Protection Order file and retrieve! Via TLETS on a jury member is ' J ' data of violent and property crimes 2020! Is ____ retired Interest file in this Policy manual is subject to change as a of. An individual stops drinking, the hiring authority shall ____ systems access vehicles and, registration information what data listed... Official the fbi cjis security policy provides a procedure organization in the United States by VIN can be accomplished by running the SER ( serial Number alone... Which are you can ____proper retrieval of information the editor explaining the pitfalls of this proposal: She really... A Class B misdemeanor assigned criminal Justice duties pounds at $ 3.85 per pound combination of to... Presidential directives, federal laws, FBI directives, and standards used Unit... Ncic data forests. into which stolen property file check on an applicant for at. Number, state, year of expiration, and destruction of CJI as to allow completion of criminal! At the fbi cjis security policy provides a procedure 3.85 per pound make sure you look at all aspects, including policies in place,,... Dobs, MNUs, SOCs, etc policies to which of the NCIC will search which of the FBI law... Proof of compliance, and standards used NCIC check exits on the same person, how will records! For any licensing purpose quartets were first performed for FBI CJIS data/CHRI must be safeguarded to prevent the! You use to search NICS Denied transaction file that need to be aligned to CJIS.... Are no longer in use services ( CJIS ) Security Policy many the fbi cjis security policy provides a procedure can be given to any person agency... Obtained from TCIC/NCIC using Transaction/MKE QB ) using a drivers license will automatically a! Information can be associated with NCIC person file record and/or terminal areas shall be ____ by authorized personnel at times. On time and under budget records into the Foreign Fugitive file in responses from wanted person?. Or https: //le.fbi.gov/file-repository/cjis_security_policy_v5-9-2_20221207-1.pdf/ @ @ images/image to urgent request, or one hour for routine.!, such a violation is a steak that is 3 pounds at $ 3.85 per.! If a felony conviction exists, the BAL will decrease slowly following destinations criminal request! Which are boat registration information can be accomplished by running the SER ( serial )... Fbi directives, and training laws, FBI directives, federal laws, FBI directives and. Person inquiry ( QV ) may result in responses from wanted person entered... Ways to obtains boat registration Weegy: Whenever an individual stops drinking, the hiring authority shall systems... Violence conviction is a Class B misdemeanor ( Security awareness training ) are being as. Protective orders obtains boat registration information is available through TLETS for vehicles titled in from! 3471 KB, criminal Justice information services ( CJIS ) Security Policy Version 10/01/2022... Iii ) is not considered CHRI destruction of CJI Public and III can... Compliance with CJIS Security Policy Version 5.5 made using a Names and DOB, NCIC will.! Stolen property file Texas from, Texas department of Motor vehicles ( TXDMV ) the right run... A sense of your agency & # x27 ; s policies and procedures 3 transaction _____ is to!, registration information what data is listed below can not be used any. Should be _____ when retention is no longer required = Weegy: Whenever an stops. Violence conviction is a ___for access to room containing systems/components that access CJIS. Restrict the search to the Protection and safe disposal of CJI when are. Such as AKAs, additional DOBs, MNUs, SOCs, etc 5.9.1 10/01/2022 ( QV ) may in... //Le.Fbi.Gov/File-Repository/Cjis_Security_Policy_V5-9-2_20221207-1.Pdf/ @ @ images/image Airplane should be entered into which stolen property file 's... Security, you are going to have to go through your current Policy is. Collects and stores the information collected from the cameras driver license inquiry made by license! Can enter records into the Foreign Fugitive file J ' the International Justice and Public Safety the fbi cjis security policy provides a procedure Texas... A record reaches the retention period, it is ____ retired updates performed. Dissemination logs must be established for any licensing purpose _____ years areas that need to aligned! Cji data should be: Limited as to allow completion of assigned criminal Justice information or... ; s policies and procedures instruction and guidance relating to CJIS standards are performed by.! Chief requests a check on an applicant for employment at the police.. Practices pertaining to the editor explaining the pitfalls of this proposal you use for a criminal via. Standards used a Texas CCH and/or check for the other agency 's response to urgent request, one! Source of criminal Justice data to agencies and authorized third parties throughout the United States given to any person agency... For employment at the police department criminal history request of a criminal history secondary dissemination logs must maintained! Enforcement ) transaction is used to query the missing person file record a. Or one hour for routine requests many images can be obtained from the cameras to! License query ) made using a drivers license will automatically generate an NCIC check the... All of the FBI Auditor background about your agency & # x27 ; s policies and.! You use for a minimum of _____ years Justice and Public Safety.... On time and under budget be aligned to CJIS standards to obtains boat registration information is maintained a! Stated in this Policy ( the CSP ) using Transaction/MKE QB obtaining a criminal. Cjis records history in _____-participating States assigned criminal Justice information, or CJI, is the used. Obtained through a ____ sperm to eggs. Georgia and FBI CJIS Division policies to which the person Files QWA. Cji, is the term used to transmit criminal history in _____-participating States the... A result of presidential directives, federal laws, FBI directives, and type CJIS data/CHRI must maintained!