Rules and Regulations of the State of Georgia
 

JavaScript Is Not Enabled alert

You need to have JavaScript enabled in your browser to utilise the full functionality of this website.

How to enable JavaScript in your browser






firefox Mozilla Firefox

  1. In the address bar, type about:config and press Enter.
  2. Click "I'll be careful, I promise" if a warning message appears.
  3. In the search box, search for javascript.enabled
  4. Toggle the "javascript.enabled" preference (right-click and select "Toggle" or double-click the preference) to change the value from "false" to "true".
  5. Click on the "Reload current page" button of the web browser to refresh the page.
  • 1. In the address bar, type about:config and press Enter.
  • 2. Click "I'll be careful, I promise" if a warning message appears.
  • 3. In the search box, search for javascript.enabled
  • 4. Toggle the "javascript.enabled" preference (right-click and select "Toggle" or double-click the preference) to change the value from "false" to "true".
  • 5. Click on the "Reload current page" button of the web browser to refresh the page.




ie Internet Explorer

  1. On web browser menu click "Tools" icon and select "Internet Options".
  2. In the "Internet Options" window select the "Security" tab.
  3. On the "Security" tab click on the "Custom level..." button.
  4. When the "Security Settings - Internet Zone" dialog window opens, look for the "Scripting" section.
  5. In the "Active Scripting" item select "Enable".
  6. When the "Warning!" window pops out asking "Are you sure you want to change the settings for this zone?" select "Yes".
  7. In the "Internet Options" window click on the "OK" button to close it.
  8. Click on the "Refresh" button of the web browser to refresh the page.
  • 1. ie9 01
  • 2. ie9 02
  • 3. ie9 03
  • 4. ie9 04
  • 5. ie9 05
  • 6. ie9 06
  • 7. ie9 07
  • 8. ie9 08
 Internet Explorer < 9
  1. On web browser menu click "Tools" and select "Internet Options"
  2. In the "Internet Options" window select the "Security" tab.
  3. On the "Security" tab click on the "Custom level..." button.
  4. When the "Security Settings - Internet Zone" dialog window opens, look for the "Scripting" section.
  5. In the "Active Scripting" item select "Enable".
  6. When the "Warning!" window pops out asking "Are you sure you want to change the settings for this zone?" select "Yes".
  7. In the "Internet Options" window click on the "OK" button to close it.
  8. Click on the "Refresh" button of the web browser to refresh the page.
  • 1. ie 01
  • 2. ie 02
  • 3. ie 03
  • 4. ie 04
  • 5. ie 05
  • 6. ie 06
  • 7. ie 07
  • 8. ie 08




chrome Google Chrome

  1. On the web browser menu click on the "Customize and control Google Chrome" and select "Settings".
  2. In the "Settings" section click on the "Show advanced settings..."
  3. Under the the "Privacy" click on the "Content settings...".
  4. When the dialog window opens, look for the "JavaScript" section and select "Allow all sites to run JavaScript (recommended)".
  5. Click on the "OK" button to close it.
  6. Close the "Settings" tab.
  7. Click on the "Reload this page" button of the web browser to refresh the page.
  • 1. chrome 01
  • 2. chrome 02
  • 3. chrome 03
  • 4. chrome 04
  • 5. chrome 05
  • 6. chrome 06
  • 7. chrome 07




opera Opera

  • 1. a) Click on "Menu", hover mouse on the "Settings" then hover mouse on the "Quick preferences" and mark the "Enable Javascript" checkbox.
  • 1. b) If "Menu bar" is shown click on the "Tools", hover mouse on the "Quick preferences" and mark the "Enable Javascript" checkbox.
1. a) opera10 a 1. b) opera10 b




safari Apple Safari

  1. On the web browser menu click on the "Edit" and select "Preferences".
  2. In the "Preferences" window select the "Security" tab.
  3. In the "Security" tab section "Web content" mark the "Enable JavaScript" checkbox.
  4. Click on the "Reload the current page" button of the web browser to refresh the page.
  • 1. safari 01
  • 2. safari 02
  • 3. safari 03
  • 4. safari 04
<xmp>.</xmp> <form name="form1" method="post" action="140-2?urlRedirected=yes&amp;data=admin&amp;lookingfor=140-2" id="form1"> <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTY5ODkwOTM2Nw8WAh4Ec3BhbQIHFgJmD2QWAgIFDw8WAh4EVGV4dAUFMSArIDZkZGS8uGcDDK6+cZuI82KyamxDyLmIXw==" /> <input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="EEBB6393" /> <input type="hidden" name="__EVENTVALIDATION" id="__EVENTVALIDATION" value="/wEWCAKT4fLtBwLniKOhBALV5cpNAoa5iIEFAoznisYGAsrv5u0MAsrv4u0MAsrv3u0MvydZ2qmhL830hSTe/tM1gdMtONw=" /> <div class='popup'> <div class='cnt223'> <div style="margin-bottom:6px;"> <img alt="Rules and Regulations of the State of Georgia" src="/images/new.gif"/> </div> <div class="header"> Terms and Conditions of Agreement for Access to Rules and Regulations of the State of Georgia Website </div> <div class="scroll"> <p>(Note: certain features of this site have been disabled for the general public to prevent digital piracy. If you are an entitled government entity pursuant the Georgia Administrative Procedures Act, <a target="_new" href="http://links.casemakerlegal.com/states/GA/books/Code_of_Georgia/browse?ci=25id=gasos&amp;codesec=50-13-7&amp;title=50&amp;#50-13-7(d)">O.C.G.A.§ 50-13-7(d)</a> contact the State of Georgia's Administrative Procedures Division at 678-364-3785 to enable these features for your location.)</p> <p>To access this website, you must agree to the following: </p> <p> These terms of use are a contract between you and/or your employer (if any), and Lawriter, LLC. </p> <p> You agree that you will not copy, print, or download anything from this website for any commercial use. </p> <p> You agree not to use any web crawler, scraper, or other robot or automated program or device to obtain data from the website.</p> <p> You agree that you will not sell, will not license, and will not otherwise make available in exchange for anything of value, anything that you download, print, or copy from this site.</p> <p> You agree that you will not copy, print, or download any portion of the regulations posted on this site exceeding a single chapter of regulations for sale, license, or other transfer to a third party, except that you may quote a reasonable portion of the regulations in the course of rendering professional advice.</p> <p> If you violate this agreement, or if you access or use this website in violation of this agreement, you agree that Lawriter will suffer damages of at least $20,000. </p> <p> THIS WEBSITE AND ITS CONTENT ARE PROVIDED "AS IS." THE STATE OF GEORGIA AND LAWRITER EXPRESSLY DISCLAIM ALL WARRANTIES, INCLUDING THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT AND ARE NOT LIABLE TO ANY PERSON FOR ANY ERRORS IN INACCURACIES CONTAINED IN THIS WEBSITE. </p> <p> If you accept these terms enter the information below and click “I AGREE”.</p> </div> <table border="0" style="width: 810px"> <tr> </tr> <tr> <td style="vertical-align: text-top; width: 243px;"> Full Name:</td> <td style="width: 532px; vertical-align:super;"> <input name="firstName" type="text" id="firstName" class="txt" /> <span id="lbl_fname"><font color="Red"></font></span> </td> </tr> <tr><td style="width: 243px"> Human verification: <b> <span id="lblStopSpam">1 + 6</span>&nbsp;= </b></td><td style="width: 532px"> <input name="captcha" type="text" id="captcha" class="txt" /> <span id="lbl_captcha"><font color="Red"></font></span> &nbsp; <input name="sum" type="hidden" id="sum" value="7" /> </td></tr> </table> <input type="submit" name="Button1" value="I AGREE" id="Button1" disabled="disabled" /> <span id="alrtmsg"><font color="Red"></font></span> <input name="v1" type="hidden" id="v1" /> <input name="v2" type="hidden" id="v2" /> <input name="v3" type="hidden" id="v3" /> <p>Privacy Policy: the above information is for internal use only as related to this agreement and will not be sold or distributed.</p> </div> </div> </form> <html> <head runat="server"> <title>GA - GAC</title> <link href="_files/main.css" media="all" rel="Stylesheet" type="text/css" /> <link href="_files/treeview_old.css" media="all" rel="Stylesheet" type="text/css" /> <link href="/_files/popup.css" media="all" rel="stylesheet" type="text/css" /> <script type="text/javascript" src="/_files/treeview.js"></script> <script type="text/javascript" src="/_files/jquery-1.8.0.min.js"></script> <script type="text/javascript" src="/_files/jquery-1.10.2.js"></script> <script type="text/javascript" src="/_files/popup.js"></script> <script type="text/javascript" src="http://code.jquery.com/jquery-1.8.2.js"></script> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.8/jquery.min.js" /> <script type="text/javascript" src="/_files/jquery.popup.js"></script> <script type="text/javascript" src="/_files/jquery.popup.min.js"></script> <script type="text/javascript" src="/_files/ValidateForm.js"></script> <script src="https://code.jquery.com/jquery-1.11.3.js"></script> <link href="/_files/enablejs.css" rel="Stylesheet" type="text/css" /> <link href="/_files/forJavascript.css" rel="Stylesheet" type="text/css" /> <style type="text/css"> .collapse{background-image:url('/images/expcoll_right.png');} .expand{background-image:url('/images/expcoll_down.png');} </style> <script type="text/javascript"> $(document).ready(function(){ $("#History-parent").click(function(){ $("#History-Childs").toggle(); if ($('#History-parent img').hasClass('expand')) { $('#History-parent img').addClass('collapse'); $('#History-parent img').removeClass('expand'); $('#History-parent img').attr('src', '/images/expcoll_right.png'); } else { $('#History-parent img').removeClass('collapse'); $('#History-parent img').addClass('expand'); $('#History-parent img').attr('src', '/images/expcoll_down.png'); } }); $("#History-Childs").hide(); var tocnode=document.getElementById('toc-children'); if (tocnode != null) { if(tocnode.childNodes.length != 0) { document.getElementById("doc-content").style.width="72%"; document.getElementById("toc").style.width="21%"; document.getElementById("toc").style.padding="10px"; } else { document.getElementById('toc').style.display="none"; } } }); function fnsetRDVal(id) { if (id=="y") { document.getElementById("y").value="yes" document.getElementById("n").value="" } else { document.getElementById("n").value="no" document.getElementById("y").value="" } } </script> <script type="text/javascript"> function TermsCon() { var overlay = $('<div id="overlay"></div>'); overlay.show(); overlay.appendTo(document.body); $('.popup2').show(); $('#btnAgree').click(function () { $('.popup2').hide(); $("#overlay").hide(); overlay.appendTo(document.body).remove(); }); $("#btnprint").click(function () { var contents = $("#popupterms").html(); var frame1 = $('<iframe />'); frame1[0].name = "frame1"; frame1.css({ "position": "absolute", "top": "-1000000px" }); $("body").append(frame1); var frameDoc = frame1[0].contentWindow ? frame1[0].contentWindow : frame1[0].contentDocument.document ? frame1[0].contentDocument.document : frame1[0].contentDocument; frameDoc.document.open(); //Create a new HTML document. frameDoc.document.write('<html><head>'); frameDoc.document.write('</head><body>'); //Append the external CSS file. frameDoc.document.write('<link href="_files/popup.css" rel="stylesheet" type="text/css" />'); //Append the DIV contents. frameDoc.document.write(contents); frameDoc.document.write('</body></html>'); frameDoc.document.close(); setTimeout(function () { window.frames["frame1"].focus(); window.frames["frame1"].print(); frame1.remove(); }, 500); }); // alert("Because you do not agree to the Terms and Conditions for Access, you must cease accessing and/or using this website and destroy all material obtained from this website without your agreement."); // $('.popup2').show(); } </script> </head> <body> <div class="popup2"> <div class='cnt2231' id="popupterms"> <div style="margin-bottom: 6px;"> <img alt="Rules and Regulations of the State of Georgia" src="/images/new.gif" /> </div> <div class="header"> Terms and Conditions of Agreement for Access to Rules and Regulations of the State of Georgia Website </div> <div class="scroll" style="height:100%;"> <p>(Note: certain features of this site have been disabled for the general public to prevent digital piracy. If you are an entitled government entity pursuant the Georgia Administrative Procedures Act, <a target="_new" href="http://links.casemakerlegal.com/states/GA/books/Code_of_Georgia/browse?ci=25id=gasos&amp;codesec=50-13-7&amp;title=50&amp;#50-13-7(d)">O.C.G.A.§ 50-13-7(d)</a> contact the State of Georgia's Administrative Procedures Division at 678-364-3785 to enable these features for your location.)</p> <p>To access this website, you must agree to the following: </p> <p> These terms of use are a contract between you and/or your employer (if any), and Lawriter, LLC. </p> <p> You agree not to use any web crawler, scraper, or other robot or automated program or device to obtain data from the website. </p> <p> You agree that you will not sell or license anything that you download, print, or copy from this website.</p> <p> THIS WEBSITE AND ITS CONTENT ARE PROVIDED "AS IS." THE STATE OF GEORGIA AND LAWRITER EXPRESSLY DISCLAIM ALL WARRANTIES, INCLUDING THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT AND ARE NOT LIABLE TO ANY PERSON FOR ANY ERRORS IN INACCURACIES CONTAINED IN THIS WEBSITE. </p> <p> By accessing and/or using this website, you agree to the terms and conditions above. If you do not agree to the terms and conditions above, you must cease accessing and/or using this website and destroy all material obtained from this website without your agreement. </p> </div> </div> <div class="modal-footer"> <input type="button" name="btnAgree" value="Close" id="btnAgree" class="btn-blue noprint" /> <input type="button" name="btnprint" value="Print" id="btnprint" class="btn-blue noprint" /> </div> </div> </div> <div id="main" class="noprint"> <!--class="noprint"--> <div id="header" class="noprint"> <div class="container"> <div class="terms"> NOTICE OF TERMS OF USE OF THIS WEBSITE. By accessing and/or using this website, you agree to the following <a onclick="javascript:TermsCon();" style="text-decoration: underline">terms and conditions.</a> </div> <div class="content"> <div id="logo"> <!--<a href="../" title="Home"><img alt="Rules and Regulations of the State of Georgia" src="/images/garr_logo.gif" /></a>--> <!--<span id="georgia"><a href="/">Rules and Regulations of the State of Georgia</a></span>--> <a href="../" title="Home"><img alt="Rules and Regulations of the State of Georgia" src="/images/ga_rulesreg.gif" /></a> </div> <div id="links"> <a href="../home.aspx" class="constant" title="home">Home</a> | <a href="../gac/" class="constant" title="home">Browse</a> | <a href="../help.aspx" class="constant" title="help">Help</a> | <a href="http://sos.ga.gov/index.php/General/rules_and_regulations" target="_blank" onclick="void(0);" class="constant" title="Georgia SOS">Go to Georgia SOS</a> </div> </div> </div> <div class="sidebar"> <div id="full-text-search"> <form class="searchform" action="../search.aspx" method="get" onsubmit="javascript:return fncheckqts();"> <span class="searchHierarchy" style="margin-right:10px;" > <em class="mnemonic">H</em>ierarchy Search:&nbsp; <input onclick="fnsetRDVal(id);" id="y" checked="checked" type="radio" name="hierarchysearch" value="yes" />&nbsp;Y <input onclick="fnsetRDVal(id);" id="n" type="radio" name="hierarchysearch" value="" />&nbsp;N </span> <input id="query" name="query" class="searchfield" value="Search GA R&R...." onfocus="if (this.value == 'Search GA R&R....') {this.value = '';}" onblur="if (this.value == '') {this.value = 'Search GA R&R....';}" type="text" /> <input class="searchbutton" value="Go" type="submit" /> <input type="hidden" name="searchvalue" value="Chapter 140-2 PRACTICE AND PROCEDURE" /> <input type="hidden" id="msg" value="REPLACE_MESSAGE" /> <input type="hidden" name="from" value="gac" /> </form> </div> <!--<div id="full-text-search"> <form id="search" action="../search.aspx" method="get" onsubmit="javascript:return fncheckqts();"> <span class="searchHierarchy" style="margin-right:10px;" > <em class="mnemonic">H</em>ierarchy Search:&nbsp; <input onclick="fnsetRDVal(id);" id="y" checked="checked" type="radio" name="hierarchysearch" value="yes" />&nbsp;Y <input onclick="fnsetRDVal(id);" id="n" type="radio" name="hierarchysearch" value="" />&nbsp;N </span> <label for="query" accesskey="s"> <em class="mnemonic">S</em>earch GA R&R: </label><input type="hidden" name="from" value="gac" /> <input id="query" name="query" type="text" /> <input class="submit" value="Go" type="submit" /> <input type="hidden" id="msg" value="REPLACE_MESSAGE" /> <input type="hidden" name="searchlevel" value="REPLACE_SEARCHLEVEL" /> <input type="hidden" name="searchvalue" value="Chapter 140-2 PRACTICE AND PROCEDURE" /> </form> </div>--> <div id="searchcitation"> <form class="searchform" action="../search.aspx" method="get" onsubmit="javascript:return fnchecks();"> <div> <input id="section" name="section" class="searchfield" value="Go to Citation...." onfocus="if (this.value == 'Go to Citation....') {this.value = '';}" onblur="if (this.value == '') {this.value = 'Go to Citation....';}" type="text" /> <input class="searchbutton" value="Go" type="submit" /> <input type="hidden" name="from" value="gac" /> </div> </form> </div> </div> <HTML xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:nll="uuid:{D3B28627-934D-41bc-8B7A-0549A8802FE4}"> <HEAD> <META http-equiv="Content-Type" content="text/html; charset=UTF-16"> </HEAD> <div id="infobar"><a href="javascript:;" accesskey="r" Name="Route" title="Route" class="quickkey"><em class="mnemonic">R</em>oute </a>:<div class="searchtips" style="float:right;margin-right:10px;color: rgb(47, 79, 79);"> <a style="text-decoration:none;color: rgb(47, 79, 79);" title="search tips" name="searchtip" href="../help.aspx#searching" target="_blank"><em class="mnemonic">S</em>earch tips</a></div><ul class="breadcrumb"> <li><a href="/GAC" name="GAC" title="GAC">GA R&amp;R</a></li> <li>&raquo; <a href="/GAC/140" title="140">Department 140</a></li> <li>&raquo; Chapter 140-2</li> </ul> </div> </div><div id="doc" class="container"> <div id="doc-content" class="content"> <h1><nllchapter>Chapter 140-2 PRACTICE AND PROCEDURE</nllchapter></h1> <h2><a href="/GAC/140-2-.01" name="140-2-.01" title="140-2-.01">Rule 140-2-.01 Scope</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> These Rules apply to Georgia criminal justice agencies and all other agencies or persons with access to criminal justice information as defined in Georgia law and Rule <a title="140-1-.02(c)" href="140-1-.02#140-1-.02(c)">140-1-.02(c)</a>.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> These Rules do not restrict any criminal justice agency from publicly disclosing certain information to include: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The status of a current investigation.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The recent arrest, release or prosecution of an individual.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> A criminal justice agency may release prior CHRI to the news media or any other person if the CHRI is based on data contained in: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(3)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Posters, announcements, flyers or computerized databases created to aid in the identification or arrest of fugitives, wanted persons, habitual offenders, career criminals or highly dangerous offenders.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(3)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Incident reports, arrest/booking reports and other reports prepared by criminal justice agencies and defined by law as public records.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(3)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Official records of public judicial proceedings.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The names of living victims of sexual offenses and juveniles involved in police investigations are not to be released.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Nothing in these Rules shall close any record that is now or hereafter made public by law.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.01(6)">(6)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Nothing in these Rules shall mandate the exchange of criminal justice information except where specifically required by these Rules.</td> </tr> </table> <h2><a href="/GAC/140-2-.02" name="140-2-.02" title="140-2-.02">Rule 140-2-.02 Security Policy for Criminal Justice Information</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Handling procedures. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Secret data (as defined in Rule <a title="140-1-.02(2)(c)3" href="140-1-.02#140-1-.02(2)(c)3">140-1-.02(2)(c)3</a>.): <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(a)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> When not in use it shall be stored in locking, fire-resistant vaults or safes. Computer programs and data files should be backed-up on electronic media and secured in a location separate from the building in which the computer system is located.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(a)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Areas where the information is processed and handled shall be restricted to authorized personnel in the performance of official duties.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(a)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> The information shall be under the absolute control of criminal justice agencies with access regulated by agency heads or their designees.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(a)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> A log or other record shall be maintained when information is removed from<B>,</B> or returned to the physically secured storage defined above in paragraph (1)(a)1.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CHRI, as defined in Rule <a title="140-1-.02(2)(c)1" href="140-1-.02#140-1-.02(2)(c)1">140-1-.02(2)(c)1</a>., shall be: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(b)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Stored in a secure location when not under the control of authorized criminal justice agency employees.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(b)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Processed in areas restricted to authorized personnel in the performance of official duties.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(b)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Under the absolute control of criminal justice agencies except as exempted by these Rules.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Restricted and Sensitive data, as defined in Rule <a title="140-1-.02(2)(c)2" href="140-1-.02#140-1-.02(2)(c)2">140-1-.02(2)(c)2</a>. and 4., shall be used and stored in a controlled access area.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Secret information, CHRI or restricted information is a "Secret of State", which is required by State policy, the interest of the community and the right of privacy of the citizens of this State to be confidential. Such information shall not be divulged except as permitted by Georgia law and these Rules. Criminal justice agencies must destroy documents containing secret information, CHRI or restricted information no longer required for operations in a manner precluding access to the information by unauthorized persons.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies shall disseminate CHRI only to agencies or persons requiring such information to perform duties serving the administration of criminal justice or as otherwise provided by statute, executive order or these Rules. Under no circumstances will CHRI be transmitted via the CJIS network to devices not authorized to access such information<B>,</B> which may exist in the GCIC computerized files, FBI Interstate Identification Index (III) or computerized files maintained in other states.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local agency heads shall provide the GCIC Director with written notification of security policy violations for criminal justice information committed by employees of their agencies or agencies over which they exercise management control.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.02(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Director shall establish an information security structure that provides for an ISO. The Director shall also ensure that each local agency having access to the CJIS network designates a LASO.</td> </tr> </table> <h2><a href="/GAC/140-2-.03" name="140-2-.03" title="140-2-.03">Rule 140-2-.03 Completeness and Accuracy of Criminal Justice Information</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each law enforcement agency is responsible for obtaining fingerprints of persons charged with criminal offenses described in O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-33&amp;title=35#" target="_newtab">35-3-33</a>. Additionally, O.C.G.A. § 15-11-83 requires agencies charging juveniles (16 years of age and younger) with felony offenses to submit criminal cards to GCIC in the same manner prescribed for adult offenders. Fingerprint images may be transmitted electronically to GCIC utilizing GCIC certified livescan/cardscan devices, or submitted manually (rolled, inked prints) on FBI provided fingerprint cards preprinted with the arresting agency's Originating Agency Identifier (ORI). Only black printer's ink or an alternative medium authorized by the FBI is acceptable for fingerprint images submitted manually to GCIC; additionally, two original arrest fingerprint cards are required for manual submissions. Agencies should seek GCIC approval before using other criminal fingerprint cards<B>,</B> or buying/using any alternative medium or system. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All required fields on arrest fingerprint cards or electronic transmissions must be complete and legible . When applicable, agencies should indicate "Treat as Adult" status (persons 13 to 16 years of age) by checking the appropriate block on the reverse side of fingerprint cards, or keying the appropriate code in designated field(s).</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Only law enforcement personnel may obtain fingerprints and complete the data fields necessary to submit an arrest record to GCIC. At no time should arrested persons or inmates of jails or correctional institutions assist in obtaining fingerprints or completing data fields.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies must forward individual arrest data and fingerprint images to GCIC within 24 hours of arrest; however, this time may be extended to cover any intervening holiday or weekend.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each law enforcement agency arresting persons under paragraph (1) above is also responsible for forwarding the Offender Tracking Number (OTN) and Charge Tracking Number (CTN), and other associated information, along with arrest warrants, citations or charges to appropriate prosecutors or courts. Prosecutors and courts use the OTN and CTN to report the final disposition of charges to GCIC. Agencies may electronically transmit disposition information to GCIC via systems and programs meeting GCIC requirements. Final disposition reporting is required for complete and accurate adult and juvenile criminal history records. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When a district attorney or solicitor makes a final disposition decision, it is the duty of this official to forward the disposition information to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When a final disposition or modification of earlier disposition decision occurs in a court of competent jurisdiction, it is the court's duty to forward the disposition information to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When the State Board of Pardons and Paroles modifies a sentence, revokes parole or discharges a parolee, it is the Board's duty to forward the disposition information of sentence modification to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When a probation sentence is successfully completed (under provisions of Georgia's First Offender Act), revoked, or there is a disposition arising from a revocation hearing, it is the duty of probation offices under the direct supervision of the Department of Corrections to forward disposition information to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When the Georgia Court of Appeals or Supreme Court of Georgia issues a decision or order to modify or suspend a trial court's decision regarding an individual defendant, it is the duty of the clerk of the Court of Appeals or the Supreme Court of Georgia and the clerk of the trial court to forward the disposition information of such modification or suspension to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Juvenile courts must submit final dispositions on juvenile offenses reported under O.C.G.A. § 15-11-83. Final dispositions are required for a complete and accurate juvenile criminal history database. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(f)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies must report final dispositions of juvenile cases.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(f)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> The specific name and ORI of the judicial agency handling the juvenile case must be in the disposition information. Superior Court Clerks will forward juvenile disposition information to GCIC for counties without a juvenile court and should indicate "Juvenile" in the final disposition information to ensure use of the appropriate juvenile codes when processing the record. Juvenile courts that do not have an ORI may make application for an ORI through GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(f)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Juvenile records are available to criminal justice agencies only for the administration of criminal justice using purpose code C.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(2)(f)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Juvenile records are not automatically purged from the criminal history database. A court order to seal, expunge, or destroy a juvenile record is required and must contain sufficient identifying information (juvenile's name, sex, race, date of birth, date of arrest, OTN and CTN) to carry out actions required. Further guidance may be found in O.C.G.A. §§ 15-11-79, 15-11-79.2, 15-11-81 and 15-11-82.</td> </tr> </table> </td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Responsible agencies must forward final disposition information to GCIC within 30 days of the final disposition decision.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.03(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will publish a list of fingerprintable offenses as prescribed by Georgia law and the Attorney General of Georgia and revise the list when necessary as determined by the Attorney General.</td> </tr> </table> <h2><a href="/GAC/140-2-.04" name="140-2-.04" title="140-2-.04">Rule 140-2-.04 Criminal Justice Information Exchange and Dissemination</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Exchange and dissemination of criminal justice information by criminal justice agencies: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies shall exchange criminal justice information with other criminal justice agencies and authorized private contractors to facilitate the administration of criminal justice and criminal justice employment. Dissemination of criminal justice information to such agencies will follow the provisions of user agreements executed between GCIC and criminal justice agency heads. If there is a question as to whether an agency is a criminal justice agency as defined by these Rules, the Director will determine the agency's status. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(a)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local criminal justice agencies must refer private attorneys requesting CHRI in criminal cases to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(a)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local criminal justice agencies may process CHRI requests from a Public Defender's Office when that Office has a State assigned ORI (ends in S). When processing these CHRI requests, the local agency must use the Public Defender's ORI and purpose code L. Consent of the individual (criminal defendant or witness) is not required.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(a)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local criminal justice agencies may process private attorney requests for CHRI in civil cases when provided the signed consent of the persons whose records are sought utilizing the appropriate purpose code.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(a)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal records containing information on arrest charges disposed of under provisions of the Georgia First Offender Act may be disseminated by Georgia criminal justice agencies as described in subparagraph (2)(a)3. of this Rule.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies may disseminate CHRI to private persons, businesses, public agencies, political subdivisions, authorities and other entities, including state or federal licensing and regulatory agencies or their designated representatives. In these cases, CHRI shall contain only Georgia or local criminal justice agency information, excluding information relating to any arrest disposed of under provisions of the Georgia First Offender Act after the person's successful discharge from First Offender status. The exchange of CHRI obtained from NCIC, or the III for a non-criminal justice purpose is prohibited except when permitted by federal law. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(b)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Requesters must provide the fingerprints or signed consent of persons whose criminal history records they are seeking at the time of each request. The signed consent must be in a format approved by GCIC and include the person's full name, address, social security number, race, sex and date of birth. When the requester represents a county Board of Voter Registrars or a county Board of Voter Registration and Elections, neither the fingerprints nor signed consent of persons whose records are sought shall be required, if the sole purpose is to verify information provided on a voter registration card by a voter registration applicant. In addition, criminal justice agencies may disseminate Georgia felony conviction records to any requester, without the person's consent, as provided for by Georgia law.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(b)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies may charge fees for disseminating criminal history records or "no record" reports to private individuals, public and private agencies or their designated representatives. Fees should approximate as nearly as possible the direct and indirect costs associated with providing such information services.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(b)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies that disseminate CHRI to private individuals and public and private agencies shall advise all requesters that if an adverse employment, licensing, housing or other decision is made, the individual or agency making the adverse decision must inform the applicant of all information pertinent to that decision. This disclosure must include that a CHRI check was made, the specific contents of the record and the effect it had on the decision. Failure to provide all such information to the applicant is a misdemeanor under Georgia law.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Federal law exempts the FBI, State Department, Defense Investigative Service, Central Intelligence Agency and Office of Personnel Management from these provisions of Georgia law. Authorized representatives of these agencies are not required to provide the fingerprints or signed consent of persons whose CHRI is sought. All criminal justice agencies are required by federal law to provide these agencies with CHRI, as described in subparagraph (1) (b) of this Rule, on security clearance applicants and applicants for employment in sensitive national security jobs. However, the Office of Personnel Management (OPM) contracts with companies that perform its background investigations. OPM contractors with Georgia offices have NCIC assigned ORIs, which end in R (GAOPM010R) and access Georgia's CJIS network to run background investigations under purpose code S (Security Clearance Information Act).</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Pursuant to signed GCIC user agreements and management control agreements, criminal justice agencies may provide criminal justice information and CHRI to individuals and agencies to provide for the development and operation of computerized information systems or for the operation of consolidated governmental communications centers supporting the administration of criminal justice. These individuals and agencies shall be under the management control of the criminal justice agencies they support. These agreements shall authorize specific access to information, limit the use of information to purposes for which it was disseminated, require the review and signing of Awareness Statements and ensure the security and confidentiality of information consistent with the Rules of the GCIC Council.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies may disseminate criminal justice information and CHRI to individuals and agencies for the express purpose of research when the Director has approved the research project in advance. In each case, GCIC shall execute a special user agreement with requesters prior to the dissemination of such information. The agreement shall provide for non-identification of specific individuals in published research reports and that information furnished by criminal justice agencies shall be immune from legal process and shall not, without consent of the criminal justice agency providing the information, be admitted as evidence for any purpose in any action, suit or other judicial or administrative proceedings.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies must advise recipients of CHRI that use of this information shall be limited to the intended purpose and may not be secondarily disseminated.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies have authority to access the FBI's III files for criminal justice administration and criminal justice employment. In addition, this information may be used in civil or criminal courts in domestic violence or stalking cases and other purposes authorized by federal law. Criminal justice agencies shall not access III files for information pursuant to state license/permit applications or for non-criminal justice employment purposes, unless specifically provided for by federal law or regulation.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)">(h)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The FBI CJIS Security Policy documents the minimum level of Information Technology (IT) security requirements determined acceptable for the transmission, processing and storage of the nation's CJIS data. It further stipulates that III CHRI may be accessed only for an authorized purpose. Dissemination to another agency is permissible if the other agency is an authorized recipient of such information. This policy also identifies the requirements for methods of disseminating III CHRI data. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Transmitting III CHRI via the internet and associated electronic media such as email facilities, remote access file transfers and any other file modifications is allowed, provided all technical security requirements have been met.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Transmitting III CHRI via electronic devices using wireless or radio technology is allowed when an officer determines there is an immediate need for this information to further an investigation or there is a situation affecting the safety of an officer or the public.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Transmitting III CHRI via a facsimile device not connected to a CJIS system is allowed when both agencies involved in the transmission have an authorized NCIC ORI number. Prior to the transmission, the sending agency shall verify the receiving agency's authenticity.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Georgia CHRI may be disseminated via the internet, wireless or radio technology, or facsimile to authorized agencies as described in the FBI CJIS Security Policy.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(h)5.">5.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Additionally, a criminal justice agency may only disseminate Georgia CHRI via facsimile to a non-criminal justice or entity provided the receiving facsimile is located in an area not readily accessible by persons other than the individual authorized to receive the CHRI.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(i)">(i)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Private contractors are permitted access to GCIC and FBI CJIS systems pursuant to a specific agreement/contract to provide services for the administration of criminal justice. The agreement/contract between the government agency and the private contractor must incorporate the Security Addendum approved by the Director of the FBI (acting for the U.S. Attorney General), as referenced in Title <a href="https://links.casemakerlegal.com/states/us/books/Code_of_Federal_Regulations/browse?ci=25&amp;id=gasos&amp;codesec=20.33&amp;title=28#20.33(a)(7)" target="_newtab">28 CFR 20.33(a)(7)</a>. Private entities performing the administration of criminal justice must meet the same training and certification criteria required by governmental agencies performing a similar function. All private entities performing criminal justice functions, including administration of private correctional facilities, police crime labs and the administration of probation services are included.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(1)(j)">(j)</a></td> <td valign="top" style="text-align:left" class="leftalign"> No criminal justice information shall be disseminated except as provided by law and these Rules.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Exchange and dissemination of criminal justice information by GCIC. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC shall exchange criminal justice information with criminal justice agencies and those non-criminal justice agencies under a specific contract to a criminal justice agency to serve the administration of criminal justice and to facilitate criminal justice employment, based on the following criteria: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(a)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC shall execute appropriate user agreements with all criminal justice agencies.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(a)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC shall provide any information in its files or in files available to GCIC, which may aid these agencies in the performance of their duties.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(a)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Use of information relating to any arrest disposed of under provisions of the Georgia First Offender Act is unauthorized for licensing or employment purposes after successful discharge of an individual from First Offender status, except as specifically authorized by Georgia law and these Rules.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(a)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> When requested electronically, GCIC may electronically disseminate CHRI of in-state felony convictions, pleas and sentences provided there is sufficient identifying information.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC shall exchange criminal justice information with: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(b)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Governor, when acting as Chief Law Enforcement Officer of the State.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(b)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Attorney General, when performing activities relating to the apprehension or prosecution of criminal offenders.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(b)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Supreme Court, when the Court's administrative arm is evaluating candidates for the Georgia bar.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC shall exchange CHRI with public agencies and officials, private businesses and individuals. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(c)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Public agencies, private individuals and businesses requesting fingerprint-based criminal history record checks shall submit applicant fingerprints using GCIC approved means and pay the prescribed fees for each criminal history record or "No Record" report disseminated by GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(c)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> If CHRI provided by GCIC is for employment, licensing or other decisions, GCIC shall provide guidance to requesters as contained in subparagraph (1)(b)3. of this Rule.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(c)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Public agencies and officials requesting criminal history record checks shall be subject to periodic audits by GCIC to assure compliance with the relevant provisions of Georgia law and these Rules.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(c)4.">4.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Georgia law authorizes GCIC to conduct certain criminal history record checks for criminal defense purposes based on personal identifiers supplied by authorized requesters. All such record checks are conducted in a manner determined by the Director. Criminal history records provided by GCIC pursuant to this subparagraph shall contain the entire Georgia criminal history record to include completed first offender records. Authorized requesters shall pay prescribed fees.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will perform criminal history record checks for non-criminal justice purposes only after fulfilling its duties and obligations to criminal justice agencies as required by law.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC may allow access to the CJIS network and other computerized files containing criminal justice information and/or CHRI, pursuant to special user agreements and management control agreements with governmental computerized information systems and governmental dispatch centers in support of criminal justice agencies. These governmental agencies shall be under the management control of the criminal justice agencies they support. User agreements and management control agreements shall authorize access to information, limit the use of information to purposes for which it was disseminated, require the signing of Awareness Statements and ensure the security and confidentiality of data consistent with these Rules.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The commercial dissemination of state or federal hot file records obtained from NCIC is prohibited. Information derived for other than criminal justice purposes from national hot file records can be used by authorized criminal justice personnel only to confirm the status of a person or article, e.g. wanted or stolen. Any advertising of services providing "data for dollars" is prohibited. Authorized agencies are allowed to charge a processing fee for disseminating data for authorized purposes. The wholesale marketing of data for profit is not permitted, as in the example of a pre-employment screening or background check company requesting that wanted person checks from NCIC be conducted on individuals for various non-criminal justice employments.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Use of information disseminated by GCIC shall be limited to the purposes for which it was disseminated. Recipients shall be so advised.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.04(2)(h)">(h)</a></td> <td valign="top" style="text-align:left" class="leftalign"> No information shall be disseminated by GCIC except as provided by Georgia law or these Rules.</td> </tr> </table> </td> </tr> </table> <h2><a href="/GAC/140-2-.05" name="140-2-.05" title="140-2-.05">Rule 140-2-.05 Integrity of Criminal Justice Information</a></h2> <P>Documents containing criminal justice information, regardless of its source, shall not be altered, obtained, copied, destroyed, delayed, misplaced, misfiled, given, bought or sold when the intent of such action is to obstruct justice or facilitate the violation of any law or these Rules.</P> <h2><a href="/GAC/140-2-.06" name="140-2-.06" title="140-2-.06">Rule 140-2-.06 Criminal History Dissemination Logs</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will maintain computer system logs of all criminal history record inquiries and record requests transmitted to GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The following minimum information shall be maintained in GCIC computer system logs. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Date, time and purpose of each inquiry or request.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Identification of each requester.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Identification of the terminal operator or practitioner.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Identification of each person inquired.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each record subject's GCIC assigned state identification (SID) and/or FBI number(s).</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(2)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agency reference numbers (ARN) are required for all criminal justice (purpose code C)<B>,</B> firearm permits or purchases (purpose code F), defense attorney (purpose code L), POST certification (purpose code Z) and DHR exigent circumstances (purpose code X) record checks. ARNs shall be unique, significant numbers and limited to incident report numbers, other criminal case numbers, docket numbers, inmate numbers or any other numbers that link criminal history record requests to criminal investigations or specific files.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.06(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies that access Georgia's CJIS network may establish local paper or computer system logs to control and document requests for criminal history records, CJIS inquiries and/or secondary disseminations within their agencies. These agencies may request printouts of GCIC system logs when required for internal investigations or other special circumstances. Agencies establishing computer system logs may record information items listed above; detailed criminal history record information shall not be recorded in computer system logs.</td> </tr> </table> <h2><a href="/GAC/140-2-.07" name="140-2-.07" title="140-2-.07">Rule 140-2-.07 Audit Procedures</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Director shall appoint auditors to conduct performance audits of criminal justice agencies that access Georgia's CJIS network to assess and enforce compliance with these Rules, O.C.G.A. §§ <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-34&amp;title=35#" target="_newtab">35-3-34</a> through <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-38&amp;title=35#" target="_newtab">35-3-38</a>, other relevant Georgia code sections and pertinent federal statutes and regulations. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The GCIC audit program shall be designed and conducted to meet the performance audit standards and practices set out in the General Accounting Office (GAO) publication <I>Government Auditing Standards</I> also adhered to by the FBI CJIS Division audit staff.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC auditors shall audit these agencies triennially as required by NCIC operating policy. A representative sample of agencies that do not access Georgia's CJIS network will be audited, based on the availability of auditor resources.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agency heads shall receive at least 15 days advance notice of on-site GCIC audits. Written notification will identify all areas of audit program interest and the applicable performance standards.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Upon completion of each performance audit<B>, </B> GCIC auditors shall discuss their findings with agency heads, TACs, or their designees. GCIC auditors will recommend strategies for remedial action to resolve any area of non-compliance. In addition, GCIC auditors will assist agency heads in obtaining agency personnel training or any other assistance related to efforts to resolve areas of non-compliance.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC auditors will provide agency heads with written reports<B>, </B> which identify areas of compliance, non-compliance and other written comments specific to audit assessments. The Audit Program Manager will report the results of completed audits to the Assistant Deputy Director for Compliance and Customer Support and the Director.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(1)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Director shall report the status of the Georgia audit program to the Chairman and members of the GCIC Council. In cases of continued non-compliance, the Director shall provide recommendations to the Council for sanctions or other actions per the provisions of GCIC Council Rule <a title="140-2-.20(Sanctions)" href="140-2-.20#140-2-.20(Sanctions)">140-2-.20(Sanctions)</a>.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies scheduled for audit shall make the following available to GCIC auditors: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Facility access policy.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Personnel records (maintained in agency files) to include results of employee fingerprint-based background checks, GCIC Awareness Statements, records of relevant training, e.g., CJIS Network Terminal Operator workbooks, end of chapter tests and final certification tests, as well as any other training materials used for practitioners and any other documents deemed appropriate to accomplish the audit responsibilities.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local criminal history record files.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CHRI handling procedures.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Standard operating procedures governing the access, use, security and discipline regarding the dissemination of criminal justice information.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Case files that support GCIC/NCIC computerized record entries, e.g. incident and supplemental reports, missing persons reports, family violence reports, arrest warrants.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computer system hardware, when requested.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(h)">(h)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computer system software, when requested.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.07(2)(i)">(i)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computer system documentation to include system topologies, when requested.</td> </tr> </table> </td> </tr> </table> <h2><a href="/GAC/140-2-.08" name="140-2-.08" title="140-2-.08">Rule 140-2-.08 Physical Security Standards</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.08(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies, governmental dispatch centers and other governmental agencies approved by the Director for direct CJIS network access shall provide secure areas out of public view in which criminal justice information is handled.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.08(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Such agencies shall place CJIS network devices in secure areas with adequate physical security to protect at all times against any unauthorized viewing or access to computer terminals, access devices or stored/printed data. This includes locations or vehicles housing Mobile Data Terminals (MDTs) or personal/laptop computers capable of accessing criminal justice information.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.08(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Such agencies shall institute reasonable procedures to protect any central depository of CHRI from unauthorized access, theft, sabotage or damage resulting from fire, wind, flood, power failure or other natural or manmade disaster s .</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.08(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Such agencies operating computer systems connected to the Georgia CJIS network should provide adequate backup and recovery plans to protect these systems and ensure system recovery within minimal time. Recovery should focus on hardware and software.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.08(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Authorized personnel must accompany visitors to CJIS computer centers and/or terminal areas at all times. Access to terminal areas should be restricted to the minimum number of authorized employees required for operations.</td> </tr> </table> <h2><a href="/GAC/140-2-.09" name="140-2-.09" title="140-2-.09">Rule 140-2-.09 Personnel Security Standards</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agency employees, and other personnel as identified by the GCIC Director, who handle criminal justice information shall consent to investigations of their moral character, reputation and honesty. All applicants, including appropriate information technology (IT) personnel having access to CJIS systems information, shall submit to a state and national fingerprint-based identification check to be conducted within 30 days of employment, assignment or subsequent re-employment. Investigations should produce information sufficient to determine applicants' suitability and fitness for employment.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies, governmental dispatch centers and other governmental agencies handling criminal justice information shall disqualify applicants convicted by any state or the federal government of any felony, or have convictions of sufficient misdemeanors to establish a pattern of disregard for the law. If the applicant appears to be a fugitive or have an arrest history without conviction for a felony or serious misdemeanor, the Director or criminal justice agency head, or his/her designee, will review the matter and decide if access/employment is appropriate.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Giving false information shall disqualify applicants and be cause for employee dismissal.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies identified in subparagraph (2) of this Rule shall establish security constraints for all personnel who work in secure areas where criminal justice information is stored, collected or disseminated. Terminal operators and practitioners shall access the CJIS network only for purposes within their authority. Each criminal justice agency authorized to access CJIS network information must have a written disciplinary policy for violators of GCIC Council Rules and GCIC/FBI CJIS Security Policy as amended.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Within their political subdivisions, criminal justice agencies must monitor the selection, utilization and retention of non-criminal justice personnel who are authorized direct access to criminal justice information in support of criminal justice operations.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.09(6)">(6)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All personnel whose jobs require them to access or process criminal justice information shall sign an Awareness Statement for permanent filing in the employees' personnel file. Should the content of the Awareness Statement change by act of law, action by the Director or other official act, agency heads shall direct their employees to sign amended Awareness Statement forms when provided by GCIC.</td> </tr> </table> <h2><a href="/GAC/140-2-.10" name="140-2-.10" title="140-2-.10">Rule 140-2-.10 Procedures for Criminal History Record Inspection by Record Subjects</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC processing procedures: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All applications for criminal history record inspection must include a current set of the record subject's fingerprints taken by a GCIC employee or trained employee of a local criminal justice agency. GCIC personnel will request identification documentation at time of fingerprinting.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Applications are processed upon payment of a $3.00 fee payable in cash or money order. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)(b)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will issue receipts for cash payments.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)(b)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Money orders shall be made payable to the Georgia Bureau of Investigation.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will accept applications from 8:00 a.m. to 4:30 p.m., Monday through Friday, except for State holidays. Appointments are preferred.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> An attorney may, upon written application and payment of fees, inspect and obtain a copy of his or her client's criminal history record maintained by GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> General processing procedures: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Pursuant to these Rules, a local criminal justice agency may prescribe its own applicable forms and procedures for a record subject, or his or her attorney<B>,</B> to review and obtain a copy of the record subject's criminal history record.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local agencies may charge reasonable fees to offset costs of handling inspection requests.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies providing record inspection services shall impose only such procedures and restrictions reasonably necessary to <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(c)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Ensure the integrity of its records.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(c)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Verify the identity of those who seek to inspect their records; verification procedures may include fingerprinting.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(3)(c)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Establish orderly and efficient inspection procedures.</td> </tr> </table> </td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal history records determined by GCIC or other criminal justice agencies to be in error shall be corrected without undue delay; the record subject or attorney of representation shall be notified when record corrections have been made.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.10(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> For criminal history records determined by GCIC or other criminal justice agencies as accurate, the individual may initiate further actions under the provisions of Georgia law.</td> </tr> </table> <h2><a href="/GAC/140-2-.11" name="140-2-.11" title="140-2-.11">Rule 140-2-.11 Security Requirements for Criminal Justice Information in a Data Processing Environment</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computers used to collect, store or disseminate CHRI shall be protected from unauthorized access by means of software or hardware control systems, which log all access attempts. Each individual authorized to store, process and/or transmit CJIS information will use a unique identifier. The unique identification is also required for personnel who administer and maintain the system. The unique identification can take the form of a full name, badge number, serial number or other unique alphanumeric identifier. The identifier shall be authenticated.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CHRI transmitted from one point to another by computer shall be protected from unauthorized access by means of software or hardware control systems. Standards for control systems outlined here must meet FBI CJIS Security Policy requirements. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Procedures to prevent unauthorized copying or retaining of messages containing CHRI must be in place.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computers may log any message traffic and record such data elements as date, time, message number, origin and destination.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS information passing through a public network segment shall be protected with encryption.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS information transmitted over dial-up or internet connections shall be protected with encryption.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Director may grant authorization for internet access to support CJIS processing when a minimum set of technical and administrative requirements, which assure the security of the CJIS system from unauthorized access via the internet are in place.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS information passing over wireless links shall be protected with encryption. Transmitting hot file data over wireless links is allowed with either encryption or a proprietary data transmission protocol that prevents recognizable clear text transmissions. All wireless links or server access points shall be protected by authentication to ensure protection from unauthorized system access.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(2)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Networks having terminals or devices that access CJIS and/or the internet must be protected by firewalls meeting the GCIC/FBI CJIS Security Policy standard as amended.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computers storing or disseminating CHRI may perform logging activities pursuant to Rule <a title="140-2-.06" href="140-2-.06">140-2-.06</a>.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Computers and the agencies operating or administratively responsible for the operation of computers utilized in whole or part for the collection, storage, dissemination or message switching of CHRI shall be subject to GCIC audits pursuant to Rule <a title="140-2-.07" href="140-2-.07">140-2-.07</a>.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Physical security standards for these computers shall be maintained pursuant to Rule <a title="140-2-.08" href="140-2-.08">140-2-.08</a>.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(6)">(6)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Personnel security standards for persons employed to operate, program or maintain these computers shall be established pursuant to Rule <a title="140-2-.09" href="140-2-.09">140-2-.09</a> as follows: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(6)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> A criminal justice agency responsible for collecting, storing, disseminating or transmitting CHRI by computers not under its direct administrative control shall not employ any person convicted by any state or the federal government of any felony or sufficient misdemeanors to establish a pattern of disregard for the law</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(6)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> A criminal justice agency responsible for collecting, storing, disseminating or transmitting CHRI by a computer center not under its direct administrative control has the right and responsibility to investigate computer center job applicants and employees and disqualify any person convicted by any state or the federal government of any felony or sufficient misdemeanors to establish a pattern of disregard for the law.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(7)">(7)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Secret data or CHRI contained in a computer system, whether dedicated or shared, shall be kept under maximum-security conditions. Documents containing secret data or CHRI no longer required to support criminal justice operations, must be destroyed in a secure manner that precludes unauthorized access to the information.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.11(8)">(8)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The agency administratively responsible for the supervision of persons, computer hardware or software assumes liability for any misuse of secret data or CHRI stored in a shared computer environment.</td> </tr> </table> <h2><a href="/GAC/140-2-.12" name="140-2-.12" title="140-2-.12">Rule 140-2-.12 Uniform Crime Reporting</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.12(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each law enforcement agency is required by Georgia law (O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-36&amp;title=35#" target="_newtab">35-3-36</a>) to participate in the Uniform Crime Reporting (UCR) program. GCIC is similarly required (O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-33&amp;title=35#" target="_newtab">35-3-33</a>) to manage Georgia's UCR program and participate in the FBI's national UCR program.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.12(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Law enforcement agencies are required to submit UCR and Family Violence reports to GCIC in a manner prescribed by GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.12(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC will provide general crime and offender data derived from UCR reports to the Governor, the General Assembly, state and local criminal justice agencies and the public.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.12(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Law enforcement agencies shall retain case file copies (or an equivalent) of incident and Family Violence reports in manual or automated format that supports active wanted/missing person and/or stolen serial numbered property records entered in GCIC/NCIC computerized files until these records are cleared, canceled or purged.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.12(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Local agency UCR program procedures, records and supporting documents are subject to GCIC and FBI audit.</td> </tr> </table> <h2><a href="/GAC/140-2-.13" name="140-2-.13" title="140-2-.13">Rule 140-2-.13 Wanted/Missing Persons and Stolen/Abandoned Serial Numbered Property</a></h2> <P>Responsible agencies shall enter (or cause entry of) information in GCIC and/or NCIC computerized files pertaining to wanted/missing persons, protected persons, sex offenders, unidentified deceased persons and serial-numbered property reported as stolen; entries shall be made when required data elements become available. O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-36&amp;title=35#" target="_newtab">35-3-36</a> requires agencies to enter records within 12 hours of determining that persons should be arrested or serial-numbered property was stolen. Provisions for entry of GCIC/NCIC computerized records regarding missing persons are contained in GCIC Council Rule <a title="140-2-.15" href="140-2-.15">140-2-.15</a>.</P> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies accessing Georgia's CJIS network shall use GCIC/NCIC codes, formats and operating procedures when making record entries. GCIC will provide procedural manuals and operations bulletins containing codes, procedures and guidance for record entry. GCIC will also provide updates and revisions as needed. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(a)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Heads of criminal justice agencies authorized to make GCIC/NCIC record entries or otherwise access databases maintained by Georgia, other states and the FBI are responsible for ensuring that current GCIC publications are maintained and used as authoritative CJIS network operational directives within their respective agency.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(a)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Heads of criminal justice agencies accessing Georgia's CJIS network are responsible for ensuring the proper training of employees authorized to enter, modify, locate, clear, cancel and validate GCIC/NCIC record entries identified by this Rule. The training program shall emphasize that a second employee must verify each record entry for completeness and accuracy. Training requirements are contained in GCIC Council Rule <a title="140-2-.16" href="140-2-.16">140-2-.16</a>.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies accessing Georgia's CJIS network shall assist criminal justice and other authorized agencies by providing controlled and monitored network access.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each record entered in GCIC/NCIC computerized files shall contain the ORI of the agency responsible for the record entry. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(c)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Any criminal justice agency or governmental dispatch center connected to the CJIS network may act as "holder" of GCIC/NCIC record entries on behalf of another agency responsible for criminal cases or other actions involving GCIC/NCIC computerized files. An agency may use its own ORI in GCIC/NCIC record entries only when a signed Holder of Record Agreement exists between the entering agency and the non-terminal agency. The Holder of Record Agreement must outline each agency's legal responsibilities for records entered in GCIC/NCIC computerized files.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(c)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Record responsibilities include entry, update and confirmation of positive inquiry responses (known as "hits") made by other agencies when these agencies confront persons who may be wanted or missing, violators of protection orders, or come into contact with serial-numbered property which may be stolen.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Record entries shall be made within 12 hours of a determination by the investigating criminal justice agency that a wanted person should be arrested or serial-numbered property is stolen. Missing person record entries shall be made in accordance with Rule <a title="140-2-.15(2)(a)" href="140-2-.15#140-2-.15(2)(a)">140-2-.15(2)(a)</a>. Record entries shall be made within the above period as soon as minimum information for records is obtained. Agencies responsible for record entries shall take necessary actions to obtain minimum data to meet the 12-hour entry requirement.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All record entries must have supporting official documents that reflect initial and continuing efforts to apprehend wanted persons, validate registered sex offender information, protect victims of domestic violence, or recover identifiable, serial-numbered stolen property. Arrest warrants must be available to support GCIC/NCIC wanted person record entries. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(e)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS network terminal agencies shall require non-terminal agencies to provide copies of such supporting documents prior to making GCIC/NCIC record entries on behalf of such agencies. If emergencies arise, where immediate or prompt record entry is critical to apprehending a wanted person or recovering serial-numbered property reported as stolen, supporting documents may be provided after record entries are made. CJIS network terminal agencies and non-terminal agencies should establish Service Agreements to ensure proper and timely handling of record entries and responsibilities.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(e)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> If supporting documents are not provided within 48 hours of entry, record entries shall be removed from GCIC/NCIC computerized files. CJIS network terminal agencies shall notify non-terminal agencies upon removal of GCIC/NCIC record entries from GCIC/NCIC files.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(e)3.">3.</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS network terminal agencies shall maintain supporting documents in their files until arrest warrants are served or recalled, stolen serial-numbered property is recovered, missing persons are located or record entries are otherwise removed from GCIC/NCIC computerized files.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Any agency with records entered in GCIC/NCIC computerized files shall respond to hit confirmation request messages. Responses may include notification that a specific amount of time will be required for record verification or deemed as official verification. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(f)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Responses to priority messages must be made within ten minutes; responses to routine messages must be made within one hour. Obvious abuse of this process, such as a priority hit request (10 minutes) for wanted/missing persons who are in custody or stolen property that has been recovered, shall be subject to GCIC disciplinary procedures as determined by the Director.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(f)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Verification messages must include the status of record entries representing wanted/missing persons, protected persons, or stolen serial-numbered property.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC/NCIC record entries that are no longer valid must be removed immediately from GCIC/NCIC computerized files. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(g)1.">1.</a></td> <td valign="top" style="text-align:left" class="leftalign"> CJIS network terminal agencies are responsible for the timely removal of their records when no longer valid.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(g)2.">2.</a></td> <td valign="top" style="text-align:left" class="leftalign"> Non-terminal agencies are likewise responsible for the timely removal of their records when no longer valid by submitting a request for record removal to the CJIS network agency providing service.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.13(h)">(h)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC provides a computerized file for entry of abandoned motor vehicles recovered by law enforcement agencies and/or reported to them by wrecker service operators or vehicle storage facilities. Georgia law requires a law enforcement agency to make record entries<B>,</B> or have record entries made if the law enforcement agency does not have access to Georgia's CJIS network, in the designated GCIC computerized file. Georgia law also requires law enforcement agencies to furnish wrecker service operators, or vehicle storage facilities, with the name and address of the last known registered owner and title/lien holder information. Such information is available from the Georgia Department of Revenue via the CJIS network. The name and address of the last known owner of an abandoned vehicle registered in another state is available from that state's motor vehicle file through Nlets via a CJIS network inquiry. Georgia law further requires owners of abandoned motor vehicles, which later are determined as stolen, to receive recovery notification from law enforcement agencies after receiving reports that such vehicles were stolen. GCIC abandoned vehicle file records are automatically purged 90 days after entry if not removed sooner by entering agencies. NCIC does not maintain an abandoned vehicle file.</td> </tr> </table> <h2><a href="/GAC/140-2-.14" name="140-2-.14" title="140-2-.14">Rule 140-2-.14 Validation Procedures for Wanted/Missing Person and Stolen Property Records</a></h2> <P>All criminal justice agencies with wanted/missing persons, protected persons and/or stolen property record entries in GCIC and NCIC computerized files are required to participate in the record validation program established and administered by GCIC and NCIC.</P> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Record entries subject to validation are wanted/missing persons, protected persons, unidentified deceased persons, stolen vehicles, stolen guns, stolen boats, stolen securities, protection order records, records on violent gangs and terrorist organizations, persons on supervised released and abandoned vehicles.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC produces monthly listings of record entries for validation. Specifically, a CJIS network terminal agency will receive a validation package for its own records and records established for another agency under a Holder of Record Agreement. When a CJIS network terminal agency establishes GCIC/NCIC records for another criminal justice agency the agency of record, not the terminal agency, will receive validation packages.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies of record shall review validation listings by (1) comparing each record to supporting documentation such as the original arrest warrant (has it been served) and the court of jurisdiction; criminal case file (is information accurate, complete and valid); protection order; missing persons report, including available criminal history records; documented extradition limit changes, if any, from the District Attorney; wanted persons record; (2) checking with issuing authorities or prosecutors to determine if warrants remain valid or cases will be prosecuted; (3) determining from owners of stolen serial-numbered property if recovery has been made or ownership has changed; (4) verifying that missing persons have not returned; and, (5) contacting the Clerk of Superior Court to ensure Protection Orders are valid.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies shall cancel record entries that are no longer valid.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies shall modify record entries that contain erroneous information or are incomplete and create supplemental record entries as required when additional information becomes available.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> When record entries are verified as accurate and current or have been modified or canceled, persons responsible for processing validation packages shall complete validation certification using procedures prescribed by GCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Non-receipt of certification messages by GCIC cited suspense dates will result in the removal of all record entries contained in validation listings processed from GCIC/NCIC files.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.14(h)">(h)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Validation procedures, records and supporting documents are subject to GCIC and NCIC audits.</td> </tr> </table> <h2><a href="/GAC/140-2-.15" name="140-2-.15" title="140-2-.15">Rule 140-2-.15 Procedures for Handling Missing and Unidentified Deceased Persons</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All law enforcement agencies shall collect information about each person reported missing by a parent, guardian or next of kin. Information about unknown deceased persons shall also be collected and preserved for identification purposes. Information collected includes physical descriptions, descriptions of clothing, dental charts, fingerprints if available and other personal data useful in identifying missing or unknown deceased persons.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies receiving missing person reports shall enter appropriate records in GCIC/NCIC computerized files. Agencies investigating unknown deceased cases shall enter, or authorize entry of, unidentified deceased persons in NCIC. In compliance with federal law ( <a href="https://links.casemakerlegal.com/states/us/books/United_States_Code/browse?ci=25&amp;id=gasos&amp;codesec=5779&amp;title=42#" target="_newtab">42 USC 5779</a>, Section <a href="https://links.casemakerlegal.com/states/us/books/United_States_Code/browse?ci=25&amp;id=gasos&amp;codesec=3701&amp;title=42#" target="_newtab">3701</a>), GCIC will advise the Georgia Missing Person Clearinghouse of all such record entries. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Record entries for missing minors, including juveniles reported as runaways, shall be made immediately. Entries for all other persons reported missing must be made within 12 hours, pursuant to O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-36&amp;title=35#" target="_newtab">35-3-36</a>.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Within sixty (60) days of entry of a missing juvenile, the agency must attempt to update the record with any available medical/dental records for identification purposes.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Thirty days after missing person records are entered in the NCIC computerized file, NCIC will check all records for completeness. NCIC sends messages to agencies of record when records are incomplete.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> A non-terminal agency should request assistance in making missing person record entries from the terminal agenc<B>y</B> that provides it CJIS network service.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(2)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies that enter or authorize the entry of missing person and unidentified deceased person records in GCIC/NCIC computerized files shall respond within 10 minutes to priority messages from other agencies reference possible identifications. Responses to messages classified as 'routine' shall be made within one hour. NCIC conducts daily matches to determine if identifiers in a missing person record are similar to those of a recent unidentified deceased person entry.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.15(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agencies authorizing entry of missing person and unidentified deceased person records shall cause these record entries to be removed from GCIC/NCIC computerized files immediately upon identification of missing or unidentified deceased persons.</td> </tr> </table> <h2><a href="/GAC/140-2-.16" name="140-2-.16" title="140-2-.16">Rule 140-2-.16 Training</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice officials and agency heads shall provide training and retraining, as required by policy, to ensure their employees' effective performance of job-specific tasks relating to <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Use of the Georgia CJIS network and information files to which it provides access and CJIS network terminal operations.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Use of NCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Use of Nlets.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Dissemination and use of CHRI.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> State and national UCR programs.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Fingerprinting arrested persons and use of the OTN and CTN when reporting an arrest, update or modification of an offender's criminal history record.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(1)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Preparing and submitting OBTS reports with final dispositions of charges.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> All personnel directly associated with maintaining, processing or disseminating CHRI shall be specially trained. The training shall provide a working knowledge of federal and state regulations and laws governing the security and processing of criminal justice information. Agency heads are responsible for ensuring their personnel receive such training as supported by the GCIC Policy Manual. In cases where agency head requests for training cannot be accommodated within a reasonable time, employees are required to read the Rules of the GCIC Council as contained herein. This will provide basic knowledge regarding the access, use, control and dissemination of criminal justice information until training occurs.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Managers of computer centers and governmental dispatch centers shall ensure that employees supporting criminal justice operations are trained to perform job-specific tasks relating to the functions described in paragraph (1) above.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each CJIS network terminal agency head shall immediately appoint a TAC to serve as the agency point of contact on GCIC/NCIC record validations, hit confirmations, training and all other NCIC/CJIS network related matters. GCIC shall provide job-specific training for TACs and any assistant TACs.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(5)">(5)</a></td> <td valign="top" style="text-align:left" class="leftalign"> TACs must be trained as CJIS terminal operators before admission to the TAC certification course. The minimum requirement is terminal operator practitioner.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(6)">(6)</a></td> <td valign="top" style="text-align:left" class="leftalign"> TACs shall be subject to certification training and testing within 90 days of appointment.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(7)">(7)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each TAC must attend a TAC refresher course, as required by GCIC policy, to maintain TAC certification.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(8)">(8)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Agency heads and TACs are responsible for developing agency specific policies and procedures relating to CJIS network operations and the administration of terminal operator and practitioner training programs developed by GCIC. Agency heads have discretion to designate CJIS network terminals users as either terminal operators or practitioners.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(9)">(9)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Terminal operators are subject to certification testing within six months of their employment or assignment of terminal operator duties and subject to re-certification testing every two years thereafter for the duration of their employment as terminal operators. Additionally, practitioners must receive training in the components of CJIS network operations they use in performing their official duties. Practitioners must also successfully complete performance tests administered by TACs and are subject to retesting every two years thereafter for the duration of their employment in which CJIS network access in necessary to complete job assignments.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.16(10)">(10)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The appointment of a TAC, the immediate appointment of a new TAC when required to fill a TAC vacancy, the training, testing and certification of the TAC, and the training, testing, certification and recertification of terminal operators and practitioners are mandatory for initial and on-going terminal agency status on the Georgia CJIS network.</td> </tr> </table> <h2><a href="/GAC/140-2-.17" name="140-2-.17" title="140-2-.17">Rule 140-2-.17 Brady Handgun Violence Prevention Act</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.17(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Effective November 1998, the Federal Brady Law established a National Instant Criminal Background Check System (NICS) that Federal Firearms Licensees (FFLs) must contact before transferring any firearm to an unlicensed individual. GCIC has authority to provide criminal history, wanted person and involuntary hospitalization records information to the FBI in conjunction with the NICS and in accordance with the federal 'Brady Handgun Violence Prevention Act'.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.17(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> GCIC records shall include information as to whether a person has been involuntarily hospitalized. Notwithstanding any other provisions of law, and in order to carry out O.C.G.A § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=16-11-172&amp;title=16#" target="_newtab">16-11-172</a>, GCIC shall be provided - in a manner agreed upon by the Probate Judges Training Council and the Georgia Bureau of Investigation (GBI) - such information and no other mental health information, to preserve the confidentiality of patient's rights in all other respects, from the involuntary hospitalization records of the probate courts concerning persons involuntarily hospitalized after March 22, 1995. Further, notwithstanding any other provisions of law and in order to carry out the provisions of O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=16-11-172&amp;title=16#" target="_newtab">16-11-172</a>, GCIC shall be provided information as to whether a person has been adjudicated mentally incompetent to stand trial or not guilty by reason of insanity at the time of the crime, has been involuntarily hospitalized or both from the records of the clerks of the superior courts concerning persons involuntarily hospitalized after March 22, 1995, in a manner agreed upon by the Council of Superior Court Clerks of Georgia and the GBI to preserve the confidentiality of patient's rights in all other respects. Five years from the date that GCIC receives a person's involuntary hospitalization information, the center shall purge its records of such information as soon as practicable and, in any event, within 30 days of the expiration of such five-year period.</td> </tr> </table> <h2><a href="/GAC/140-2-.18" name="140-2-.18" title="140-2-.18">Rule 140-2-.18 The Georgia Sexually Violent Offender Registry</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Georgia law places responsibility for the establishment, operation and management of a sexually violent offender registry within the Georgia Bureau of Investigation and principally, GCIC. Accordingly, GCIC will perform the following functions: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Provide public access to the registry via the internet.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Participate in the National Sex Offender Public Registry (NSOPR).</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Mail non-forwarding verification letters to the last known address of each registered sex offender, as required by law. The verification letter will serve as official notification to sex offenders that they must re-register with the Sheriff's Department in their county of residence.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Notify sheriffs when a sex offender record is entered, updated, or deleted from the registry.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Publish periodic reports for sheriffs that list sex offenders and sexually dangerous predators residing in each county.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Notify appropriate out-of-state law enforcement agencies when a sex offender relocates to their state.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(1)(g)">(g)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Conduct training on issues related to operation and maintenance of the sex offender registry.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Department of Corrections, State Board of Pardons and Paroles and the Director of Private Probation agencies will enter sex offender records on the registry. They will submit updates including photos to the CJIS file as prescribed by statute and GCIC policy.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each sheriff must maintain accurate information on all registered sex offenders residing within their jurisdiction, as required by law. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.18(3)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each sheriff must update all required information, i.e. residence address, employment, school, etc. as required by law.</td> </tr> </table> </td> </tr> </table> <h2><a href="/GAC/140-2-.19" name="140-2-.19" title="140-2-.19">Rule 140-2-.19 The Georgia Protective Order Registry</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Georgia law places responsibility for the establishment, operation and management of a protective order registry within the GBI and principally, GCIC. Accordingly, GCIC will perform the following functions: <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Provide access via a secure internet web site to a centralized database for statewide protective orders.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Assign law enforcement officers, prosecuting attorneys and the courts a unique user ID and password established specifically for access to the registry.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Ensure entry into the registry of any protective order or modification thereof received from the Clerk of Court.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(d)">(d)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Ensure transmission to the NCIC Protection Order File of all protective orders and modifications entered in the registry that meet NCIC data requirements.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(e)">(e)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Authorize an alternative method of transmitting protective orders to the registry in the event of electronic failure.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(1)(f)">(f)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Consult with the Georgia Commission on Family Violence regarding the effectiveness of the registry in enhancing the safety of the victims of domestic violence and stalking.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Superior Court Clerk will scan the protective orders issued by the judge and enter data requested, if available, required by NCIC. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(2)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Court Clerk shall electronically transmit a copy of the protective order or modification thereof to the registry as prescribed by statute.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(2)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Court Clerk shall provide the local Sheriff with a hard copy of all protective orders transmitted to the registry.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each Sheriff shall be responsible for the validation of all NCIC protective order entries made on its behalf by the Superior Court Clerks office. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(3)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each Sheriff shall validate in accordance with the validation steps and file retention schedule established by both GCIC and NCIC.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(3)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Each Sheriff shall respond to and confirm hit confirmation requests based on the records maintained in their office.</td> </tr> </table> </td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(4)">(4)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Courts of this state shall use a standardized form or forms for the issuance of any protective order. <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(4)(a)">(a)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Standardized form or forms shall be subject to approval as to form and format by GCIC and the Georgia Superior Court Clerks Cooperative Authority (GSCCCA).</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(4)(b)">(b)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The form or forms shall be promulgated by the Uniform Superior Court Rules Committee.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.19(4)(c)">(c)</a></td> <td valign="top" style="text-align:left" class="leftalign"> The Administrative Office of the Courts shall distribute the forms.</td> </tr> </table> </td> </tr> </table> <h2><a href="/GAC/140-2-.20" name="140-2-.20" title="140-2-.20">Rule 140-2-.20 Sanctions</a></h2> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.20(1)">(1)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Criminal justice agencies, governmental dispatch centers and other governmental agencies are subject to GCIC administrative sanctions for violating laws governing operation of the CJIS network, these Rules or CJIS network policies published by GCIC pursuant to O.C.G.A. § <a href="https://links.casemakerlegal.com/states/ga/books/Code_of_Georgia/browse?ci=25&amp;id=gasos&amp;codesec=35-3-33&amp;title=35#35-3-33(13)" target="_newtab">35-3-33(13)</a>. Administrative sanctions for terminal agencies may include, but not limited to purging wanted/missing person and stolen property serial-numbered records entered in GCIC/NCIC computerized files by CJIS network agencies or established by these agencies for non-terminal agencies pursuant to signed service agreements; restricted access to the CJIS network; and suspension/revocation of an agency's CJIS network access.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.20(2)">(2)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Administrative sanctions may be imposed on individual violators. Such sanctions may include mandatory re-training and/or re-certification of TACs, terminal operators and/or practitioners and suspension from access to the CJIS network.</td> </tr> </table> <table border="0" width="100%" cellspacing="4" cellpadding="4"> <tr> <td valign="top" width="1%" style="white-space:nowrap;text-align:left;width:18px;"><a style="white-space:nowrap;" name="140-2-.20(3)">(3)</a></td> <td valign="top" style="text-align:left" class="leftalign"> Individual violators are also subject to criminal prosecution when their actions constitute violations of applicable state or federal statutes.</td> </tr> </table> </div> </div> </HTML> </div> <div id="toc" class="sidebar noprint"> <ul id="toc-children" class="children"><li><a href="/GAC/140-2-.01" name="140-2-.01" title="140-2-.01">Rule 140-2-.01 Scope</a></li><li><a href="/GAC/140-2-.02" name="140-2-.02" title="140-2-.02">Rule 140-2-.02 Security Policy for Criminal Justice Information</a></li><li><a href="/GAC/140-2-.03" name="140-2-.03" title="140-2-.03">Rule 140-2-.03 Completeness and Accuracy of Criminal Justice Information</a></li><li><a href="/GAC/140-2-.04" name="140-2-.04" title="140-2-.04">Rule 140-2-.04 Criminal Justice Information Exchange and Dissemination</a></li><li><a href="/GAC/140-2-.05" name="140-2-.05" title="140-2-.05">Rule 140-2-.05 Integrity of Criminal Justice Information</a></li><li><a href="/GAC/140-2-.06" name="140-2-.06" title="140-2-.06">Rule 140-2-.06 Criminal History Dissemination Logs</a></li><li><a href="/GAC/140-2-.07" name="140-2-.07" title="140-2-.07">Rule 140-2-.07 Audit Procedures</a></li><li><a href="/GAC/140-2-.08" name="140-2-.08" title="140-2-.08">Rule 140-2-.08 Physical Security Standards</a></li><li><a href="/GAC/140-2-.09" name="140-2-.09" title="140-2-.09">Rule 140-2-.09 Personnel Security Standards</a></li><li><a href="/GAC/140-2-.10" name="140-2-.10" title="140-2-.10">Rule 140-2-.10 Procedures for Criminal History Record Inspection by Record Subjects</a></li><li><a href="/GAC/140-2-.11" name="140-2-.11" title="140-2-.11">Rule 140-2-.11 Security Requirements for Criminal Justice Information in a Data Processing Environment</a></li><li><a href="/GAC/140-2-.12" name="140-2-.12" title="140-2-.12">Rule 140-2-.12 Uniform Crime Reporting</a></li><li><a href="/GAC/140-2-.13" name="140-2-.13" title="140-2-.13">Rule 140-2-.13 Wanted/Missing Persons and Stolen/Abandoned Serial Numbered Property</a></li><li><a href="/GAC/140-2-.14" name="140-2-.14" title="140-2-.14">Rule 140-2-.14 Validation Procedures for Wanted/Missing Person and Stolen Property Records</a></li><li><a href="/GAC/140-2-.15" name="140-2-.15" title="140-2-.15">Rule 140-2-.15 Procedures for Handling Missing and Unidentified Deceased Persons</a></li><li><a href="/GAC/140-2-.16" name="140-2-.16" title="140-2-.16">Rule 140-2-.16 Training</a></li><li><a href="/GAC/140-2-.17" name="140-2-.17" title="140-2-.17">Rule 140-2-.17 Brady Handgun Violence Prevention Act</a></li><li><a href="/GAC/140-2-.18" name="140-2-.18" title="140-2-.18">Rule 140-2-.18 The Georgia Sexually Violent Offender Registry</a></li><li><a href="/GAC/140-2-.19" name="140-2-.19" title="140-2-.19">Rule 140-2-.19 The Georgia Protective Order Registry</a></li><li><a href="/GAC/140-2-.20" name="140-2-.20" title="140-2-.20">Rule 140-2-.20 Sanctions</a></li></ul> </div> </div> <!--content ends here--> <div id="footer" class="noprint"><span class="footer">Copyright &copy; 2019 Lawriter LLC - All rights reserved.</span>| <a href="mailto:support@casemakerlegal.com?subject=Rules and Regulations of the State of Georgia">Email Us</a> | 844-838-0769 | <a href="http://livechat.casemakerlegal.com/client.php?locale=en" target="_blank" onclick="if(navigator.userAgent.toLowerCase().indexOf('opera') != -1 && window.event.preventDefault)window.event.preventDefault();this.newWindow = window.open('http://livechat.casemakerlegal.com/client.php?locale=en&url='+escape(document.location.href)+'&referrer='+escape(document.referrer), 'webim','toolbar=0,scrollbars=0,location=0,status=1,menubar=0,width=640,height=480,resizable=1');this.newWindow.focus();this.newWindow.opener=window;return false;">Live Chat</a> </div> </div> </body> </html>