1/11
Flashcards covering definitions of terminology, procedures, and confidentiality related to armed/potentially dangerous subjects in the KCMPD Procedural Instruction (17-08).
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
For officer safety purposes only and it does not provide reasonable suspicion or probable cause.
What is the purpose of the armed/potentially dangerous subject computer inquiry response?
A subject who has been known to use or threaten an officer with a weapon and/or has been arrested in connection with a violent criminal act where a weapon was used.
What constitutes an 'Armed' subject in this policy?
A subject who has physically hindered, obstructed, or resisted arrest.
What does 'Obstructing and Resisting an Officer' mean?
A subject who has assaulted a properly identified department member.
What does 'Assaultive' mean in this policy?
A subject with a prior record for violence who has made verbal or written threats against an officer which the officer believes to be valid.
What does 'Prior Criminal History' refer to?
Interdepartment Communication, Form 191 P.D. 1.
Which form is used to request listing a subject as armed/potentially dangerous?
The nature of the request and the circumstances involved; sources may include other police officers, records/reports, or information from outside law enforcement agencies.
What information should the Form 191 P.D. 1 outline?
Through the reporting officer’s chain of command to the Records Unit Commander for final approval.
To whom should the Form 191 P.D. 1 be forwarded for final approval?
The Records Unit Commander will ensure the information is forwarded to the Real Time Section for entry into REJIS, RMS, and the Perpetrator Information Center (PIC) to be flagged in REJIS.
What happens after approval of the designation?
No. It is confidential, for law enforcement use only, and will not be released to the public or written in any report that may be released to the public.
Is the armed/potentially dangerous subject designation public information?
REJIS, RMS, and the Perpetrator Information Center (PIC) to be flagged in REJIS.
Which systems are used to flag the subject after approval?
Darryl Forté, Chief of Police.
Who signs the procedural instruction?