Empty
Welcome Visitor
Browse Courses
  • Show All
  • +   Courses
Color Legend
Telecommunicator Courses
Trainer Courses
Supervisor/Manager Courses
General Courses
Online Courses
Refresh Data
Sort by: Default Ascending | Course number | Course name | Course start | Location | Course time | Course date
5304
Course Description: 

This course is for telecommunicators that are responsible for training individuals in the dispatch center. The training will focus on the responsibilities of trainers, training methods for adult learners, liability related to training, and giving feedback to your trainees.

Students will be required to give a 5 minute teach back to another student in the classroom.


EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 12/10/2018 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: Closed
Class Size Class size: 18 seats
Closed Enrollment
3802
Learning Objectives: Full Access Section 1 • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process Section 2 • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry Section 3 • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. Section 4 • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations Part 2 Section 1- Record Responsibility • Summarize the entering agency’s responsibility for records entered into TCIC and NCIC • Define the terms accuracy, timeliness and completeness in reference to TCIC and NCIC • Describe the methods used to maintain NCIC system integrity • Discuss the role of the FBI CJIS personnel and the TCIC Control room with quality control checks • Explain the automatic purging of records and retention periods Part 2: Section 2 – Property File Entry • List the definition, criteria for entry and the information required to enter a record into the Vehicle file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Vehicle file. • List the definition, criteria for entry and the information required to enter a record into the License Plate file. • List the definition, criteria for entry and the information required to enter a record into the Vehicle/Boat Part file. • List the definition, criteria for entry and the information required to enter a record into the Boat file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Boat file. • List the definition, criteria for entry and the information required to enter a record into the Gun file. • List the definition, criteria for entry and the information required to enter a record into the Article file. • List the definition, criteria for entry and the information required to enter a record into the Security file. Section 3 – Record Maintenance • Recognize the responses received when entering a record into TCIC and NCIC • Define the purpose for record modification and the responses received from TCIC and NCIC • Define the purpose for record cancelation and the responses received from TCIC and NCIC • Define the purpose of a locate message and the responses received from TCIC and NCIC • Define the purpose of a clear message and the responses received from TCIC and NCIC Section 4 – Wanted Person Entry • List the criteria for entry and the information required to enter a record into the Wanted Person file. • Indicate the $. messages associated with the Wanted Person file and the possible action required. • List the criteria for entry and the information required to enter a record into the Identity Theft file. • List the criteria for entry and the information required to enter a record into the Violent Person file. • List the criteria for entry and the information required to enter into the Threat Against Peace or Detention Officer file. • List the criteria for entry and the information required to enter into the Protection Order file. • Indicate the $. messages associated with the Protection Order file and the possible action required. • List the criteria for entry and the information required to enter a record into the Child Safety Check Alert List. • List the criteria for entry and the information required to enter into the Missing Person file. • List the criteria for entry and the information required to enter a Person With Information record. • Indicate the $. messages associated with the Missing Person file and the possible action required. • List the criteria for entry and the information required to enter into the Unidentified Person file. • Indicate the $. messages associated with the Unidentified Person file and the possible action required. Section 5 – Originating Agency Identifier Files • Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction. • Summarize the process for ORI Validation and the information required to validate. Section 6 – Record Validation and $. Messages • Summarize the process for proper record validation • List the validation certification letter requirements • Define the $. Messages that may be received from NCIC and the possible actions required More
Starts Starts: 1/16/2019 8:00 AM
Sessions Sessions: 2
Location Location:
Class Size Class size: 15 seats
Class full
3807
Learning Objectives: Upon successful completion, the student will be able to: • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to non criminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations More
Starts Starts: 1/16/2019 8:00 AM
Sessions Session: 1
Location Location:
Class Size Class size: 15 seats
Class full
22109
Learning Objectives: The student will be able to use proper enunciation of the Spanish alphabet, words and phrases. The student will be able to pronounce Spanish numbers, weekdays and months and use these in conversation. The student will be able to use basic Spanish grammar which will help them communicate more effectively. The student will describe when and how to use language translation services. The student will be able to identify key Spanish phrases that indicate a need for response from Police, Fire, and EMS. The student will discuss the unique cultural norms of callers who speak Spanish as they impact an emergency call. More
Starts Starts: 2/4/2019 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: 23 open seats left
Class Size Class size: 30 seats
Add to cart
5309
Is your PSAP prepared for an Active Shooter event? Students will be able to recognize an active shooter incident, discuss the history of active shooters, and recognize potential warning signs of an active shooter. The students will learn the questions to ask callers, and be familiar with instructions to give callers in an active shooter situation. 



YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 2/15/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 22 open seats left
Class Size Class size: 30 seats
Add to cart
2120
This course is designed to provide the student with skills necessary to recognize a crisis, decrease emotions of the caller, and provide information to ensure responder safety. More
Starts Starts: 2/20/2019 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: 28 open seats left
Class Size Class size: 30 seats
Add to cart
1014
YOU MUST HAVE A TCOLE PID NUMBER TO ATTEND THIS COURSE, WITH TWO YEARS EXPERIENCE AS A PEACE OFFICER, TELECOMMUNICATOR, OR JAILER. TO RECEIVE TCOLE CERTIFICATION, YOU MUST ATTEND 100% OF THIS COURSE. NO EXCEPTIONS. This is an intense, time consuming course. Students will be required to complete homework, as well as give two presentations on a law enforcement/dispatch topic. Students must bring a laptop to class and access to a printer is required. Classroom instruction will be given in the following areas: Teaching/Learning Process, Learning Objective Preparation, Lesson Plan Preparation, Instructional Media, Methods of Instruction, Testing and Evaluation, and Liability Issues related to training. Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately. Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building. The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded. EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A $25 NO SHOW FEE FOR 1 OR 2 DAY CLASSES, a $50 FEE FOR 3 OR 4 DAY CLASSES, AND A $100 FEE FOR FIVE DAY CLASSES IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE. More
Starts Starts: 2/25/2019 8:00 AM
Sessions Sessions: 5
Location Location:
Status Status: 2 open seats left
Class Size Class size: 2 seats
Add to cart
1014
YOU MUST HAVE A TCOLE PID NUMBER TO ATTEND THIS COURSE, WITH TWO YEARS EXPERIENCE AS A PEACE OFFICER, TELECOMMUNICATOR, OR JAILER.

TO RECEIVE TCOLE CERTIFICATION, YOU MUST ATTEND 100% OF THIS COURSE. NO EXCEPTIONS.

YOU MUST BE A TELECOMMUNICATOR TO REGISTER FOR THIS COURSE, IF YOU ARE NOT A TELECOMMUNICATOR YOUR REGISTRATION WILL BE CANCELLED.

This is an intense, time consuming course. Students will be required to complete homework, as well as give two presentations on a law enforcement/dispatch topic. Students must bring a laptop to class and access to a printer is required. Classroom instruction will be given in the following areas: Teaching/Learning Process, Learning Objective Preparation, Lesson Plan Preparation, Instructional Media, Methods of Instruction, Testing and Evaluation, and Liability Issues related to training.

Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately.

Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building.

The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded.

EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A $25 NO SHOW FEE FOR 1 OR 2 DAY CLASSES, a $50 FEE FOR 3 OR 4 DAY CLASSES, AND A $100 FEE FOR FIVE DAY CLASSES IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 2/25/2019 8:00 AM
Sessions Sessions: 5
Location Location:
Status Status: 11 open seats left
Class Size Class size: 11 seats
Add to cart
3802
Learning Objectives: Full Access Section 1 • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process Section 2 • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry Section 3 • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. Section 4 • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations Part 2 Section 1- Record Responsibility • Summarize the entering agency’s responsibility for records entered into TCIC and NCIC • Define the terms accuracy, timeliness and completeness in reference to TCIC and NCIC • Describe the methods used to maintain NCIC system integrity • Discuss the role of the FBI CJIS personnel and the TCIC Control room with quality control checks • Explain the automatic purging of records and retention periods Part 2: Section 2 – Property File Entry • List the definition, criteria for entry and the information required to enter a record into the Vehicle file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Vehicle file. • List the definition, criteria for entry and the information required to enter a record into the License Plate file. • List the definition, criteria for entry and the information required to enter a record into the Vehicle/Boat Part file. • List the definition, criteria for entry and the information required to enter a record into the Boat file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Boat file. • List the definition, criteria for entry and the information required to enter a record into the Gun file. • List the definition, criteria for entry and the information required to enter a record into the Article file. • List the definition, criteria for entry and the information required to enter a record into the Security file. Section 3 – Record Maintenance • Recognize the responses received when entering a record into TCIC and NCIC • Define the purpose for record modification and the responses received from TCIC and NCIC • Define the purpose for record cancelation and the responses received from TCIC and NCIC • Define the purpose of a locate message and the responses received from TCIC and NCIC • Define the purpose of a clear message and the responses received from TCIC and NCIC Section 4 – Wanted Person Entry • List the criteria for entry and the information required to enter a record into the Wanted Person file. • Indicate the $. messages associated with the Wanted Person file and the possible action required. • List the criteria for entry and the information required to enter a record into the Identity Theft file. • List the criteria for entry and the information required to enter a record into the Violent Person file. • List the criteria for entry and the information required to enter into the Threat Against Peace or Detention Officer file. • List the criteria for entry and the information required to enter into the Protection Order file. • Indicate the $. messages associated with the Protection Order file and the possible action required. • List the criteria for entry and the information required to enter a record into the Child Safety Check Alert List. • List the criteria for entry and the information required to enter into the Missing Person file. • List the criteria for entry and the information required to enter a Person With Information record. • Indicate the $. messages associated with the Missing Person file and the possible action required. • List the criteria for entry and the information required to enter into the Unidentified Person file. • Indicate the $. messages associated with the Unidentified Person file and the possible action required. Section 5 – Originating Agency Identifier Files • Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction. • Summarize the process for ORI Validation and the information required to validate. Section 6 – Record Validation and $. Messages • Summarize the process for proper record validation • List the validation certification letter requirements • Define the $. Messages that may be received from NCIC and the possible actions required More
Starts Starts: 3/4/2019 8:00 AM
Sessions Sessions: 2
Location Location:
Status Status: 4 wait spaces available
Class Size Class size: 15 seats
Wait space available
3807
Learning Objectives: Upon successful completion, the student will be able to: • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to non criminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations More
Starts Starts: 3/4/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 8 open seats left
Class Size Class size: 15 seats
Add to cart
1013
All licensing students must meet TCOLE minimum standards as indicated in TCOLE Rule 217.1. This 56 hour class will be held Monday - Friday and the following Monday - Wednesday. Students will report back on Wednesday for half a day of review and then take the State Licensing Exam.

Before students will be allowed to attend this course, their agency's Chief must sign and return a TCOLE required letter verifying the student meets TCOLE minimum standards for the licensed Telecommunicator position. Students will also be required to take the TCOLE Rules Test (1305) for Telecommunicators and bring documentation that they passed. This test is located on the TCOLE Website at http://www.tcole.texas.gov/

After registering, students and supervisors will receive an email with further details on the above requirements.

Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately.

Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building.

The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded.

YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 3/18/2019 8:00 AM
Sessions Sessions: 8
Location Location:
Status Status: 27 open seats left
Class Size Class size: 30 seats
Add to cart
3802
Learning Objectives: Full Access Section 1 • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process Section 2 • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry Section 3 • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. Section 4 • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations Part 2 Section 1- Record Responsibility • Summarize the entering agency’s responsibility for records entered into TCIC and NCIC • Define the terms accuracy, timeliness and completeness in reference to TCIC and NCIC • Describe the methods used to maintain NCIC system integrity • Discuss the role of the FBI CJIS personnel and the TCIC Control room with quality control checks • Explain the automatic purging of records and retention periods Part 2: Section 2 – Property File Entry • List the definition, criteria for entry and the information required to enter a record into the Vehicle file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Vehicle file. • List the definition, criteria for entry and the information required to enter a record into the License Plate file. • List the definition, criteria for entry and the information required to enter a record into the Vehicle/Boat Part file. • List the definition, criteria for entry and the information required to enter a record into the Boat file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Boat file. • List the definition, criteria for entry and the information required to enter a record into the Gun file. • List the definition, criteria for entry and the information required to enter a record into the Article file. • List the definition, criteria for entry and the information required to enter a record into the Security file. Section 3 – Record Maintenance • Recognize the responses received when entering a record into TCIC and NCIC • Define the purpose for record modification and the responses received from TCIC and NCIC • Define the purpose for record cancelation and the responses received from TCIC and NCIC • Define the purpose of a locate message and the responses received from TCIC and NCIC • Define the purpose of a clear message and the responses received from TCIC and NCIC Section 4 – Wanted Person Entry • List the criteria for entry and the information required to enter a record into the Wanted Person file. • Indicate the $. messages associated with the Wanted Person file and the possible action required. • List the criteria for entry and the information required to enter a record into the Identity Theft file. • List the criteria for entry and the information required to enter a record into the Violent Person file. • List the criteria for entry and the information required to enter into the Threat Against Peace or Detention Officer file. • List the criteria for entry and the information required to enter into the Protection Order file. • Indicate the $. messages associated with the Protection Order file and the possible action required. • List the criteria for entry and the information required to enter a record into the Child Safety Check Alert List. • List the criteria for entry and the information required to enter into the Missing Person file. • List the criteria for entry and the information required to enter a Person With Information record. • Indicate the $. messages associated with the Missing Person file and the possible action required. • List the criteria for entry and the information required to enter into the Unidentified Person file. • Indicate the $. messages associated with the Unidentified Person file and the possible action required. Section 5 – Originating Agency Identifier Files • Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction. • Summarize the process for ORI Validation and the information required to validate. Section 6 – Record Validation and $. Messages • Summarize the process for proper record validation • List the validation certification letter requirements • Define the $. Messages that may be received from NCIC and the possible actions required More
Starts Starts: 3/28/2019 8:00 AM
Sessions Sessions: 2
Location Location:
Status Status: 2 open seats left
Class Size Class size: 3 seats
Add to cart
<< Previous of 2 Next >> Total: 18 Page size: