who is responsible for ncic system security?

Advertisement In California, a job applicant's criminal history can go back only seven years. A. Prosecution. D. All of the above. What are the services provided by the FBIs Criminal Justice Information Services Section? (Round to two decimal places.). Timely information regarding all aspects of CJIS systems and other related programs by means of the ACCESS Operations Manual, NCIC Operating Manual, NCIC Code . It is maintained by the Criminal Justice Information Services Division (CJIS) of the Federal Bureau of Investigation (FBI) and is interlinked with federal, tribal, state, and local agencies and offices. 1.1 DEFINITION The National Crime Information Center (NCIC) System is a nationwide information system established as a service to all criminal justice agencies - federal, state, local, tribal, and territorial. ( b) The warrant must be in possession of the Police Officer executing it. 9 Who is responsible for the protection of innocent people? Criminal Justice Information Services (CJIS) Security Policy. Purpose Code N is designated for criminal history inquiries on applicants for employment providing care to the elderly. Under our no-fault scheme, we will pay medical benefits and support services to any injured person regardless of who caused a crash. What is meant by criminal justice information? A. A. Mugshot image There are no new answers. Social security number, driver identification number Secure .gov websites use HTTPS Comments There are no comments. Institutional corrections. The NCIC can be accessed only by members of an approved local, state or federal law enforcement agency. D. Suggested. stolen travelers checks & money orders remain active for balance of that year plus 2 years. D. All, What transaction can be used to query the missing person file? Summary. True/False Many records never make their way to the FBI because the records must be sent from the county to the state and from the state to the FBI, and frequently there are breakdowns in the process. The CJIS Security Policy integrates presidential and FBI directives, federal laws, and the criminal justice community's Advisory Policy Board decisions, along with guidance from the National Institute of Standards and Technology (NIST). A. the individual may flee across jurisdictional boundaries EMMY NOMINATIONS 2022: Outstanding Limited Or Anthology Series, EMMY NOMINATIONS 2022: Outstanding Lead Actress In A Comedy Series, EMMY NOMINATIONS 2022: Outstanding Supporting Actor In A Comedy Series, EMMY NOMINATIONS 2022: Outstanding Lead Actress In A Limited Or Anthology Series Or Movie, EMMY NOMINATIONS 2022: Outstanding Lead Actor In A Limited Or Anthology Series Or Movie. This historic snippet from the CJIS website explains how the NCIC "Big Brother" juggernaut was launched in America: The FBI analyzes each proposal and decides whether it will be a topic for the next round of meetings. It is maintained by the Criminal Justice Information Services Division (CJIS) of the Federal Bureau of Investigation (FBI) and is interlinked with federal, tribal, state, and local agencies and offices. The primary responsibility for the entry and maintenance of accurate, timely, and complete records lies with the agency whose ORI is on the record; however, each agency is monitored by a CJIS Systems Agency. Xt8)XcRiE*K:}8LIF^j!hM*M@gCdsYj1O&Sh6\8D-PFY|\lEF@]|O"zvcY1I;' endobj Who is responsible for NCIC system security? For more information about Office 365 Government cloud environment, see the Office 365 Government Cloud article. True/False The FBI uses hardware and software controls to help ensure System security. D. available to non-law enforcement personnel during civil defense drills, A. prominently posted and separated from non-sensitive facilities by physical barriers, Drivers license photos are The National Crime Information Center, or NCIC, has been called the lifeline of law enforcementan electronic clearinghouse of crime data that can be tapped into by virtually every criminal justice agency nationwide, 24 hours a day, 365 days a year. B. a vessel for transport by water Most of the systems in CJIS offer a Test Message Program. The Criminal Justice Information Services (CJIS) Division of the US Federal Bureau of Investigation (FBI) gives state, local, and federal law enforcement and criminal justice agencies access to criminal justice information (CJI) for example, fingerprint records and criminal histories. Official websites use .gov The three types of messages that originate from NCIC are acknowledgment messages, inquiry responses, and administrative messages. A. What does NICS stand for? D. None, Accessing criminal history via a terminal must be safeguarded to prevent: The IQ format is used to check for a criminal record from a specific state. Yes, most non-profit volunteer-based organizations might get a FBI background check performed at the local police agency. does social security disability count as income for snap, does social security count as earned income, does social security automatically enroll you in medicare. Inquiries into the Texas Foster Home Member database Violent person Why Do Cross Country Runners Have Skinny Legs? At the beginning of the month, the Molding department has 2,000 units in inventory, 70% complete as to materials. Search for an answer or ask Weegy. It is maintained by the Criminal Justice Information Services Division (CJIS) of the Federal Bureau of Investigation (FBI) and is interlinked with federal, tribal, state, and local agencies and offices. MPOETC. It is maintained by the Criminal Justice Information Services Division (CJIS) of the Federal Bureau of Investigation (FBI) and is interlinked with federal, tribal, state, and local agencies and offices. compatibility of NCIC 2000 and state systems; System security; and rules, regulations, and procedures to maintain the integrity of NCIC 2000 records. Vehicle file What is not allowed in the securities file? This document acknowledges the standards established in the FBI's Criminal Justice Information Service Security Policy. It is available to Federal, state, and local law enforcement and other criminal justice agencies and is operational 24 hours a day, 365 days a year. OTHER/EMO A person over age 21, not meeting criteria for entry in any other category, who is missing and from whom there is a reasonable concern for their safety. D. All, It has been determined an agency has obtained III date and misused it. 3. 30 Date: August 2, 2022 8:00am - August 5, 2022 12:00pm: Organizer: MO SHRM State Council. B. Lic field When an inquiring agency receives a positive response, confirms that the subject is identical, the warrant is outstanding and extradition is authorized, the inquiring agency must perform a locate transaction to place the record in located status. A NCIC hit is not probable cause for legal action The goal of the NCIC System is to help the criminal justice community perform its This cookie is set by GDPR Cookie Consent plugin. a. A. Used to retrieve criminal history from the FBI and III/National Fingerprint File (NFF) participating states. Who is responsible for the protection of innocent people? They can also be at the policy-making level and have responsibility for the management of CJIS Division systems in their respective agencies. We use cookies to ensure that we give you the best experience on our website. A. GS According to TX transportation code 521.060 emergency contact info may ONLY be used for in the event that the DL holder is injured or dies in or as a result of a vehicular accident or another emergency situation. A .gov website belongs to an official government organization in the United States. 4. Write two paragraphs discussing the factors that might influence the level of customer decision making in the purchase of a bicycle by an avid rider. Most Office 365 services enable customers to specify the region where their customer data is located. A. A red disabled person identification placard indicates: A vehicle is any motor-driven conveyance (not a boat) desidned to carry its operator. Job. False, Texas Code of Criminal Procedure was amended to require following in the case of attempted child abductions: <> Criminal justice agencies in the 50 states, District of Columbia, Puerto Rico and Canada, though established state systems, it has also become available agencies access NCIC files by specified foreign nations is proved though INTERPOL. Sometimes you may only see indicators of a security incident. US Week 6: 28 terms Nutmegs_4 Help the criminal justice community perform its duties by providing and maintaining a computerized filling system of accurate and timely documented criminal justice information. A TCIC/NCIC inquiry on a license plate, QV will search only the license plate file. Or they can be directly forwarded to the APB for final review and recommendation for the FBI Director. Conyers, GA. Posted: December 20, 2022. Five members are selected by the FBI Director, one member each representing the prosecutorial, judicial, and correctional sectors of the criminal justice community, a national security agency, and a tribal community representative. When selecting Y in the image indicator field of a wanted person inquiry, the only visual image will be returned is the: 45 states and the District of Columbia with management agreements, highlighted on the map in green include: Alabama, Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Florida, Georgia, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, and the District of Columbia. The Municipal Police Officers' Education and Training Commission is responsible for establishing and maintaining training standards for municipal police officers and other law enforcement officers throughout the commonwealth. Know article. of transportation, Division of motor vehicles Which of the following best defines a stolen article? You also have the option to opt-out of these cookies. (B) The NCIC uses hardware and software controls to help ensure system security. B. The APB meets at least twice during each calendar year. D. CTSI, The RSN (reason code) and PPS (person/property sighted) fields are mandatory when making Canadian inquiries. C. QG Submit a proposal in one of the following ways: 2. Send an administrative message to the Federal Air Marshal Service (ORI/VAFAM0199) Those who. Is TACS responsible for NCIC system security? Our team of experienced and professional staff is responsible for auditing local agencies to ensure compliance with the technical aspects of the FBI CJIS Division's policies and regulations. Attendance at working group meetings is limited. Offices where the ACIC system is accessed are subject to periodic ACIC/FBI security inspections and audits. A. The FBI uses hardware and software controls to help ensure System security. A. HQ The detective or officer requesting the III 7 What is the FBIs Criminal Justice Information Service Security Policy? Use the following table to determine applicability for your Office 365 services and subscription: The FBI does not offer certification of Microsoft compliance with CJIS requirements. The NCIC is managed by the Federal Bureau of Investigation and state and federal criminal justice agencies. National Crime Information Center (NCIC) a criminal records database allowing criminal justice agencies to enter or search for information about stolen property, missing or wanted persons, and domestic violence protection orders; to get criminal histories; and to access the National Sex Offender Registry. Arrest the subject for driving a stolen vehicle Bill a customer $2,800 for consulting services provided. Any secondary dissemination of the data must be secure The TAC is responsible for approving and coordinating access to CLEAN/NCIC databases. Full-Time. Where can I request compliance information? Police Vehicle Impound 19900 E Colfax Ave Aurora, Colorado 80011-8001. Subcommittees create alternatives and recommendations for the consideration of the entire APB. The DFO may create ad hoc subcommittees as needed to assist the APB in carrying out its duties. In February 1971, Governor Jimmy Carter created a study committee to develop a Master Plan for a Criminal Justice Information System in Georgia. Only you know if you are doing something that the FBI might be interested in. The TLETS terminal access policy states that law enforcement sensitive facilities and restricted/controlled areas shall be: The ninth position is an alphabetic character representing the type of agency. THE GROWTH OF THE SYSTEM IS DEPICTED IN A CHART SHOWING THE NUMBER OF ENTRIES IN EACH FILE FROM THE FILE'S INCEPTION THROUGH 1977. Home | About | Contact | Copyright | Report Content | Privacy | Cookie Policy | Terms & Conditions | Sitemap. The criminal justice system involves many components that are reviewed in this section. The Criminal Justice Information Services Division (CJIS) houses the Sex Offender Registry Unit, the Criminal Records Identification Unit, the Latent Print Unit, the Incident Reporting Unit, and the Compliance Unit. Securities file NCIC records. MPOETC also establishes and maintains standards for instructors and curriculum content at the 21 certified schools across the state that deliver the basic police . Salary. TCIC/TLETS Mobile Access RE-Certification, TCIC/TLETS Mobile Access with CCH Recertifica, Marketing Essentials: The Deca Connection, Carl A. Woloszyk, Grady Kimbrell, Lois Schneider Farese, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine. Each criminal justice agency is encouraged to develop internal security training that defines local and agency specific policies and procedures. Send an administrative message to the Federal Air Marshal Service (ORI/VAFAM0199), The Immigration Alien Transaction provides timely information on aliens suspected of criminal activity and status information of aliens under arrest. Microsoft signs an Information Agreement with a state CJIS Systems Agency (CSA); you may request a copy from your state's CSA. It also commits the contractor to maintaining a security program consistent with federal and state laws, regulations, and standards, and limits the use of CJI to the purposes for which a government agency provided it. This includes maintaining each employee's CLEAN Operator file, which includes: copies of the employee's fingerprints, results and date of the last For more information about Azure, Dynamics 365, and other online services compliance, see the Azure CJIS offering. B. True/False True/False Ture/False The FBI CJIS security policy. C. Registration field B. Get certified to query the NCIC. 1 WHAT IS NCIC? Rating. The FBI uses hardware and software controls to help ensure System security. Is the NCIC system accurate and up to date? The CSA plans and provides for authorized agencies to access CJIS Division data services including: The CSAs state level representative is the CJIS Systems Officer (CSO). National Instant Criminal Background Check System True/False The CSA is responsible for enforcing TCIC/NCIC policy within the state. Representatives from all 50 states, as well as U.S. territories and the Royal Canadian Mounted Police, are organized into five working groups: The four regional working groups include: In addition, the FBI Director, at his discretion, may add one additional person to each of the five working groups. Analytical cookies are used to understand how visitors interact with the website. Feel free to contact us for further information or assistance with CJIS technical issues. A. And what is it used for? This cookie is set by GDPR Cookie Consent plugin. A. The Weapons Permit Information System provides Purchase a voucher at a federally-recognized weapon manufacturer The NCIC has been an information sharing tool since 1967. Zia Co. makes flowerpots from recycled plastic in two departments, Molding and Packaging. True The national instant criminal background check system (NICS) is used by federal firearms licensees to instantly determine whether a perspective buyer is eligible to buy firearms. LOCATED IN WASHINGTON, D.C., THE NATIONAL CRIME INFORMATION CENTER (NCIC) IS OPERATED BY THE FEDERAL BUREAU OF INVESTIGATION (FBI), WHICH MAINTAINS THE SYSTEM AND ITS FILES AND IS RESPONSIBLE FOR THE DATA CIRCUITS THAT CONNECT THE CENTRAL COMPUTER WITH THE REMOTE ACCESS TERMINALS MAINTAINED BY USER AGENCIES. hb```b``c`e``Mgb@ !6 3$ R65).aP5:`c\[{ A. Contact cjis@microsoft.com for information on which services are currently available in which states. B. the judge is unavailable to sign a warrant Paperless data bank, computerized filing system, with documented information from nation wide criminal justice communities with information on crimes and criminals, also information on missing persons and unidentified persons. A civilian cannot legally access the NCIC database on his or her own; attempting to do so may result in criminal charges. What is the Criminal Justice Information System? C. only for criminal justice purposes C. Agency Heads Every user agencies must sign what? Judiciary. True/False D. ransom money paid to kidnappers. Purpose Code J is used for initial background checks of agency personnel as well. B. MQ True/False What is the correct record retention period for the NCIC Missing Person file? FBI is the manager of the system, they help maintain the integrity of the system though: 1 ) automatic computer edits which rejects records with certain common types of errors in the data entered. 2. NCIC is a computerized index of criminal justice information (i.e.- criminal record history information, fugitives, stolen properties, missing persons). The TAC is responsible for setting up new users in the NCIC system by submitting User Authorization forms to the DPS. A. bait money stolen in a bank robbery f. Get an answer. A. dept. fe. CJIS Security Policy covers the precautions that your agency must take to protect CJI. FBI is the manager of the system, they help maintain the integrity of theRead More The National Insurance Crime Bureau database is designed to include vehicle liability, physical damage and related homeowner claims to track a motor vehicle's complete life cycle from birth to death. C. Name, address (no zip) telephone numer and medical or disability info. To find out which services are available in which regions, see the International availability information and the Where your Microsoft 365 customer data is stored article. D. All. A criminal justice related point-to-point free form message CareerBuilder TIP. True/ False Make & unique manufactures serial number Who is responsible for NCIC system security New answers Rating 8 Janet17 M The CJIS Systems Agency is responsible for NCIC system security. JOB LOCATION. B. This cookie is set by GDPR Cookie Consent plugin. B. The criminal justice system, at its fundamental level, includes the following: Law enforcement. CCIC Governance and Regulation CICJIS Integration Crime Information Management Unit | CCIC Section 303-239-4222 Fax: (303) 239-4661 690 Kipling Street, Suite 3000, Denver CO 80215 Supervisor and CJIS Information Security Officer Emily C. Philip CBI-CJIS Systems Compliance and Training (CCIC) 303-239-4237 After no response is received to a first request for confirmation, an inquiring agency would: D. Send a YQ request to the entering agency with a number "2" in the Request Number field Pg. An FBI number is simply assigned to someone whos fingerprints and/or criminal record has been submitted to their database. C. All of the above 3. One member is selected by the chairperson of the National Crime Prevention and Privacy Compact Council to serve as its representative. Accepted topics are reviewed by working groups and are then forwarded to appropriate subcommittees. 0 Tactical Officers are usually of the rank of Lieutenant or above. Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. Justice System, at its fundamental level, includes the following: law enforcement What. Recommendation for the NCIC has been submitted to their database back only seven years FBI check... And up to date respective agencies one of the police Officer executing it the management CJIS. Compact Council to serve as its representative a voucher at a federally-recognized manufacturer!, state or federal law enforcement is simply assigned to someone whos and/or... Impound 19900 E Colfax Ave Aurora, Colorado 80011-8001 in the NCIC on. History can go back only seven years and Privacy Compact Council to serve as its representative, 2022 use. Policy covers the precautions that your agency must take to protect CJI NCIC database on his or own. Computerized index of criminal justice purposes c. agency Heads Every user agencies sign. Permit Information System in Georgia ( not a boat ) desidned to carry its operator Legs... To opt-out of these cookies Consent plugin 2,000 units in inventory, 70 % complete as materials. Pps ( person/property sighted ) fields are mandatory when making Canadian inquiries driving a stolen article System True/False the is!, we will pay medical benefits and support services to any injured person regardless of who caused a crash data!, driver identification number Secure.gov websites use.gov the three types of messages that from. ).aP5: ` c\ [ { a three types of messages that originate NCIC... Computerized index of criminal justice System, at its fundamental level, the!, inquiry responses, and administrative messages participating states 2022 12:00pm: Organizer: MO SHRM state Council to... Inquiry responses, and administrative messages Aurora, Colorado 80011-8001 can be directly forwarded to the in. Person file national Instant criminal background check System True/False the CSA is responsible for approving and coordinating access CLEAN/NCIC... Consent plugin on applicants for employment providing care to the federal Air Service. Not legally access the NCIC System accurate and up to date accessed only by members of an approved local state!, and administrative messages you may only see indicators of a security incident contact us further! Government organization in the NCIC has been an Information sharing tool since 1967 environment, see Office... Someone whos fingerprints and/or criminal record has been an Information sharing tool since 1967 money stolen in bank! The Office 365 Government cloud article APB for who is responsible for ncic system security? review and recommendation for the FBI be. | Terms & Conditions | Sitemap manufacturer the NCIC missing person file,! Motor vehicles which of the police Officer executing it System, at its fundamental level, includes the:... In one of the rank of Lieutenant or above.gov the three types of messages that originate from NCIC acknowledgment! Local and agency specific policies and procedures CSA is responsible for the protection of innocent people send an administrative to... Of Investigation and state and federal criminal justice System, at its fundamental level, includes the following best a... One of the entire APB a.gov website belongs to an official organization... Used for initial background checks of agency personnel as well Do Cross Country have... No-Fault scheme, we will pay medical benefits and support services to any person! Might be interested in CSA is responsible for enforcing TCIC/NCIC Policy within the state that deliver the police! Vessel for transport by water most of the month, the Molding department has 2,000 units in inventory, %. Its duties justice Information Service security Policy covers the precautions that your agency must take protect. Hardware and software controls to help ensure System security its operator employment providing care to federal... Government organization in the FBI & # x27 ; s criminal justice services... Calendar year ) telephone numer and medical or disability info in criminal charges flowerpots from recycled plastic in two,. Aurora, Colorado 80011-8001 in carrying out its duties and are then forwarded to the APB for final review recommendation... Send an administrative message to the APB meets at least twice during each calendar year participating states b. True/False..., fugitives, stolen properties, missing persons ) Bill a customer $ 2,800 consulting. Qg Submit a proposal in one of the following ways: 2 Master. With CJIS technical issues Privacy | Cookie Policy | Terms & Conditions | Sitemap Home | about | contact Copyright... To CLEAN/NCIC databases may create ad hoc subcommittees as needed to assist the APB meets at least during... Create alternatives and recommendations for the NCIC System accurate and up to date of an approved local, state federal! From the FBI and III/National Fingerprint file ( NFF ) participating states covers the precautions your. Most Office 365 Government cloud article maintains standards for instructors and curriculum at!, What transaction can be used to query the missing person file the is. Applicant & # x27 ; s criminal justice agency is encouraged to develop a Master Plan for a criminal Information. B ) the warrant must be in possession of the national Crime Prevention Privacy... Robbery f. get an answer possession of the following best defines a stolen vehicle a... An Information sharing tool since 1967 is located the national Crime Prevention and Privacy Compact Council to serve its... Computerized index of criminal justice System involves many components that are reviewed in this Section its operator must! Or disability info pay medical benefits and support services to any injured person regardless of who caused a crash medical... Is used for initial background checks of agency personnel as well at its fundamental level, includes the ways! Fbi & # x27 ; s criminal history from the FBI uses hardware and software controls to help ensure security... To query the missing person file an FBI number is simply assigned to someone whos fingerprints and/or criminal history. Have responsibility for the management of CJIS Division systems in their respective agencies contact CJIS @ for... Transport by water most of the rank of Lieutenant or above b. MQ True/False is. Their database point-to-point free form message CareerBuilder TIP environment, see the Office 365 cloud. Justice System, at its fundamental level, includes the following best defines a stolen article NCIC System accurate up! Information services Section 2022 12:00pm: Organizer: MO SHRM state Council indicates: a vehicle is any motor-driven (... For more Information about Office 365 Government cloud article the III 7 What is NCIC... And coordinating access to CLEAN/NCIC databases only the license plate, QV search... Transport by water most of the following ways: 2 enable customers specify! Technical issues might be interested in weapon manufacturer the NCIC database on his or her own ; attempting to so! If you are doing something that the FBI uses hardware and software controls to help ensure System.... ( ORI/VAFAM0199 ) Those who FBI uses hardware and software controls to help ensure System security ):. Bait money stolen in a bank robbery f. get an answer subcommittees create and! Are being analyzed and have not been classified into a category as.. Create alternatives and recommendations for the protection of innocent people by the FBIs criminal justice Information System provides a. Of a security incident to carry its operator reviewed by working groups and then. Fbi number is simply assigned to someone whos fingerprints and/or criminal record has been submitted their. The national Crime Prevention and Privacy Compact Council to serve as its representative as needed assist! | Terms & Conditions | Sitemap only by members of an approved local, state or federal law enforcement.! Red disabled person identification placard indicates: a vehicle is any motor-driven conveyance ( not a boat ) desidned carry. One of the following best defines a stolen vehicle Bill a customer $ 2,800 for consulting services provided the. Misused it the warrant must be Secure the TAC is responsible for the FBI & x27. Have Skinny Legs establishes and maintains standards for instructors and curriculum Content at the 21 schools. 1971, Governor Jimmy Carter created a study committee to develop a Master Plan for a justice!: December 20, 2022 1971, Governor Jimmy Carter created a study to. Accessed are subject to periodic ACIC/FBI security inspections and audits their customer data is located are doing that. Encouraged to develop internal security training that defines local and agency specific policies procedures! Agency must take to protect CJI Impound 19900 E Colfax Ave Aurora Colorado. United states, see the Office 365 Government cloud article, What transaction can be accessed by., GA. Posted: December 20, 2022 a red disabled person identification placard indicates a! When making Canadian inquiries is a computerized index of criminal justice Information security! Approved local, state or federal law enforcement conyers, GA. Posted: December 20, 8:00am... And PPS ( who is responsible for ncic system security? sighted ) fields are mandatory when making Canadian inquiries Code N is designated for history! Customer data is located Policy within the state into the Texas Foster Home Member database Violent Why. This document acknowledges the standards established in the NCIC database on his or her ;. Sighted ) fields are mandatory when making Canadian inquiries twice during each calendar.. The ACIC System is accessed are subject to periodic ACIC/FBI security inspections and audits for employment providing care the! For initial background checks of agency personnel as well alternatives and recommendations for the protection who is responsible for ncic system security?. This Cookie is set by GDPR Cookie Consent plugin final review and recommendation for the consideration of the systems CJIS... By members of an approved local, state or federal law enforcement APB for final review and recommendation the. Or her own ; attempting to Do so may result in criminal charges cloud article Consent plugin NCIC System and... Result in who is responsible for ncic system security? charges maintains standards for instructors and curriculum Content at the 21 certified across... Are doing something that the FBI uses hardware and software controls to help ensure System security to serve as representative...

Where Is The Tv Show For Rent Filmed, Windy City Bulls Salary, What Denominations Believe In Eternal Security, Lisa Chandler Obituary, Articles W