Information Verification Policy

1. Purpose

The purpose of this policy is to establish standardized procedures for validating tips, reports, and intelligence before internal dissemination. Accurate verification ensures operational integrity, reduces risk, and maintains organizational credibility.


2. Scope

This policy applies to:

  • All operational personnel handling incoming tips, reports, or intelligence
  • Supervisors and managers responsible for reviewing verified information
  • Data management staff responsible for logging, distribution, or archiving information

3. Policy Statement

  • All incoming information must be verified to the greatest extent feasible before being distributed internally.
  • Verification procedures must balance timeliness with accuracy, prioritizing actionable and credible information.
  • Unverified, speculative, or false information must not be disseminated internally or externally.

4. Verification Procedures

A. Initial Intake Review

  • Record the source, date, and context of the information
  • Assess completeness and clarity of the report or tip
  • Flag any missing or ambiguous details for follow-up

B. Source Assessment

  • Determine credibility of the source:
    • Past reliability
    • Knowledge or expertise relevant to the information
    • Potential biases or conflicts of interest
  • Anonymous tips may be accepted but require higher levels of corroboration

C. Corroboration

  • Cross-check the information with independent sources when available
  • Verify facts against internal databases, public records, or law enforcement channels
  • Document all steps taken to validate information

D. Classification & Confidence Levels

Verified information must be classified according to confidence in accuracy:

  • Confirmed: Fully verified and reliable
  • Probable: Likely accurate, pending further confirmation
  • Unverified: Cannot be confirmed; do not act on until verified

5. Internal Distribution

  • Only verified or appropriately classified information may be shared internally
  • Recipients must adhere to confidentiality requirements and need-to-know principles
  • Unverified information may be logged but flagged clearly as pending verification

6. Documentation

  • Maintain a verification log for each tip, report, or intelligence item
  • Record:
    • Source and date
    • Verification steps taken
    • Confidence level assigned
    • Personnel responsible for verification
  • Logs shall be retained according to organizational records retention policies

7. Supervisor Oversight

  • Supervisors shall review verification logs for completeness and adherence to procedures
  • Ensure that unverified or low-confidence information is not acted upon prematurely
  • Approve distribution of verified information to operational personnel

8. Training

  • All personnel handling information must be trained in verification protocols
  • Refresher training shall occur annually or when procedures are updated
  • Training includes assessing source reliability, cross-referencing, and documentation practices

9. Policy Review

This policy shall be reviewed annually or after significant operational changes to ensure accuracy, effectiveness, and compliance with organizational standards.