In accordance with the CJIS Security Policy, agencies must be as specific as possible in the _____ field to help identify why criminal history record information transactions have been run through the TLETS system.
a) Requester
b) Operator
c) Purpose Code
d) Location