Skip to Main Content
National Standard Microsite Logo

Police Digital Service National Standards

    Authentication failed. Please enable browser cookies and try again.
    Sign In
    Caps Lock is on.
    • Sign up
    • Forgot Password

    Search Everything - National Standard Microsite

    • Standards
    • Search Everything
    • Standards search
    • APIs
    • Blueprints
    • Procurement
    • About
    • Updates
    • FAQs
    • Contact Us
    Categories
    Clear All
    Tags
    Clear All
      Newest A-Z
      List Grid

      No results were found.

      Search listings
      Criminal Justice System Exchange Data Standards Catalogue (Version 6)
      The CJS Data Standards Catalogue is a collection of data standards used by Criminal Justice Organisations in England & Wales to support interoperability between their different ICT systems. If...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: Criminal Justice System (CJS) Exchange Product Board
      Reference Data / Templates
      Retrieval of Video Evidence and production of working copies from digital CCTV Systems (Version 2.0)
      Digital CCTV installations vary greatly in terms of the recording methods as a result of varying solutions with different capabilities and functionality which are used to capture picture and video...
      Standard  | 
      Published: 01/01/2008
       | 
      Authoring body: Defence Science and Technology Laboratory
      Guidance
      Recruitment Guidance - Candidate Management
      Ensuring that the right candidates are selected for policing roles is essential. Employing the right selection process is essential to make the most efficient use of money, time and resources and...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: College of Policing
      Guidance
      European Pool against Organised Crime (ePOC IV) Version 1.0
      European Pool against Organised Crime (EPOC IV) was introduced in 2004 as the Eurojust Case Management System.  It facilitates the secure storage of case-related personal data, the exchange of...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Reference data service platform
      Reference Data / Templates
      Operations Command and Control APP
      The Command and Control (C&C) solution is the incident management and deployment solution for police officers responding to incidents reports by the public. Command and control is the authority...
      Standard  | 
      Published: 01/01/2021
       | 
      Authoring body: College of Policing (CoP)
      Guidance
      Post-Incident Procedures following Death or Serious Injury APP
      There are incidents that take place where the police respond to a serious injury/incident or where there is a deceased or where at a later time the victim dies. This APP – describes the...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: College of Policing (CoP)
      Guidance
      All vehicles (VEH01)
      All vehicles (VEH01) is a dataset of all licensed and registered vehicles in Great Britain and the UK, produced by Department for Transport. It contains licensed vehicles, registered vehicles for...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: Department for Transport (DfT)
      Reference Data / Templates
      IDENT1
      This document should be used in reference to the appropriate legislation, such as the Protection of Freedoms Act 2012: DNA & Fingerprint Provisions IDENT1 is the UK’s nationals automated...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Home Office
      Reference Data / Templates
      DNA and Fingerprint Provisions
      Protection of Freedoms Act 2012: DNA and fingerprint provisions was introduced in October 2013 to cover the retention of DNA and fingerprints where it was ruled in the European Court in the case of...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Home Office
      Policy
      ICT Asset Recovery Standard 7.0
      Asset Disposal & Information Security Alliance (ADISA) is an organisation designed to improve risk management and data protection within business processes for IT asset retirement and disposal....
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: Asset Disposal & Information Security Alliance (ADISA)
      Standards
      Cyber Essentials guidance
      Most cyber attacks are conducted by unskilled individuals and are very basic in nature and cyber security is an important aspect to guard any organisation from cyber attacks. There are five...
      Standard  | 
      Published: 01/01/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Principles
      End User Device (EUD) Security Principles (Version 1.0)
      The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Principles
      End User Device (EUD) Security Guidance 2
      Guidance for organisations deploying a range of end user device platforms as part of a remote working solution. Modern smartphones, laptops and tablets provide users with great flexibility and...
      Standard  | 
      Published: 01/01/2018
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Secure Sanitisation of Storage Media (Version 1.0)
      Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data. Data sanitisation has to...
      Standard  | 
      Published: 13/02/2020
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      10 Steps to Cyber Security
      This guidance is designed to help organisations protect themselves in cyberspace and best practises for cyberspace security. It relays the task of defending your networks, systems and...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Application Development
      This guidance gives practical advice on the secure development, procurement and deployment of generic applications. There are three types of common security issues: Secure data handling ...
      Standard  | 
      Published: 01/01/2018
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      End user device (EUD) Security Guidance Windows 10 1809
      This guidance covers the deployment of a range of end user device platforms for the secure configuration of Windows 10 1809. Risk owners and administrators should agree a configuration which...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      End User Device (EUD) Security Guidance
      The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: National Cyber security Centre (NCSC)
      Principles
      Defence Industry Security Notices
      Industry Security Notices (ISNs)  A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating...
      Standard  | 
      Published: 01/01/2021
       | 
      Authoring body: Government Digital Services (GDS)
      Guidance
      Website and application accessibility regulations and guidance
      Public sector organisations need to think about accessibility at every stage and ensure they meet the Web Content Accessibility Guidelines (WCAG 2.1) design principles. The Public Sector...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Government Digital Services (GDS)
      Guidance
      ISO/IEC 27031:2011 IT Security Techniques — Guidelines for Information and Communication Technology Readiness for Business Continuity
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2011
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27033-1:2015 IT Security Techniques — Network Security — Part 1: Overview and Concepts
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2015
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 20000-1:2018 IT Service Management — Part 1: Service Management System Requirements
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2018
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27018:2019 IT Security Techniques — Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds acting as PII Processors
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27004:2016 IT Security Techniques — Information Security Management — Monitoring, Measurement, Analysis and Evaluation
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2016
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2012
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO 22301:2019 Security and Resilience — Business Continuity Management Systems — Requirements
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27013:2015 IT Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2015
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27034-2:2015 IT Security techniques - Application Security - Part 2: Organisation Normative Framework
      This document provides a framework for application security. ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the...
      Standard  | 
      Published: 01/01/2015
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27002:2013 IT Security techniques - Code of Practice for Information Security Controls
      This document informs the implementation of controls within an information security management system based on ISO 27001. ISO (the International Organisation for Standardisation) and IEC (the...
      Standard  | 
      Published: 01/01/2013
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27001:2013 IT Security techniques — Information Security Management Systems — Requirements
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2013
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27003:2017 Information Technology — Security techniques — Information Security Management Systems — Guidance
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2017
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO/IEC 27000:2020 IT Security techniques - Information Security management systems - Overview & Vocabulary
      The International Organisation Standardisation (ISO) and the International Electrotechnical Commission (IEC) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: International Organisation Standardisation (ISO)
      Standards
      National Intelligence Model
      The National Intelligence Model (NIM) is a well-established model within the policing world that was established in 2000 by the National Criminal Intelligence service (NCIS) and adopted by...
      Standard  | 
      Published: 01/01/2005
       | 
      Authoring body: Home Office
      Standards
      ISO/IEC 27003:2017 Preview
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
      Standard  | 
      Published: 01/01/2017
       | 
      Authoring body: International Organisation for Standardisation (ISO)
      Standards
      ISO 17025:2017 General requirements for the competence of testing and calibration laboratories
      ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. BSI provide the...
      Standard  | 
      Published: 01/01/2017
       | 
      Authoring body: International Standards Organisation (ISO)
      Standards
      Regulation of Investigatory Powers Act 2000 (RIPA)
      The regulation of Investigatory Powers Act 2000 relates to the interception, acquisition and disclosure of data relating to communications, the carrying out of surveillance, the use of covert human...
      Standard  | 
      Published: 01/01/2000
       | 
      Authoring body:  Her Majesty’s Stationery Office (HMSO)
      Principles
      Data Protection
      On the 25th May 2018 the Data Protection Act 2018 was implemented by the UK as the General Data Protection Regulation also known as GDPR. It controls how personal information is captured and used...
      Standard  | 
      Published: 01/01/2018
       | 
      Authoring body: Information Commissioner's Office (ICO)
      Principles
      Criminal Justice System: Data Standards Forum Guidance
      An agreed and designed common data standards are used by the Criminal Justice System, ICT suppliers to support ICT communications between systems used by Criminal Justice Organisations (CJO) to...
      Standard  | 
      Published: 17/12/2020
       | 
      Authoring body: Ministry of Justice (MOJ)
      Guidance
      Security Policy Framework for HMG Organisations
      This Framework describes the Cabinet Secretary and Official Committee on Security expectations of how HMG organisations and third parties handling HMG information and other assets will apply...
      Standard  | 
      Published: 01/01/2018
       | 
      Authoring body: Government Digital Service (GDS)
      Policy
      Equality Act 2010: Guidance (2015)
      The Equality Act 2010 replaced previous anti-discrimination laws with a single Act. It protected people from discrimination, age discrimination and public sector Equality Duty, sets out the...
      Standard  | 
      Published: 01/01/2015
       | 
      Authoring body: Government Equalities Office
      Policy
      Domain-based Message Authentication, Reporting & Conformance (DMARC)
      The Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email standard that used in email transactional activity. It helps validates a senders identity using Sender...
      Standard  | 
      Published: 01/01/2016
       | 
      Authoring body: Government Digital Service (GDS)
      Standards
      Securing Government Email
      This guidance applies to all email domains that public sector organisations run on the internet. It also helps ensures that public sector organisations exchanges email securely with other public...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Government Digital Service (GDS)
      Guidance
      DomainKeys Identified Mail (DKIM)
      DomainKeys Identified Mail (DKIM) verifies an email’s domain and ensures it has not been tampered with in transit. The receiving email service can then filter or reject email that fails...
      Standard  | 
      Published: 01/01/2016
       | 
      Authoring body: Government Digital Service (GDS)
      Guidance
      Encoding Characters
       UTF-8, an encoding form for Unicode character sets, for government digital services and technology encodes all Unicode characters without changing the ASCII code. Unicode is based...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: Government Digital Service (GDS)
      Policy
      Technology Code of Practice
      The Technology Code of Practice is a set of criteria to help government design, build and buy technology. Technology Code of Practice should be used for all technology projects and programmes and...
      Standard  | 
      Published: 01/01/2019
       | 
      Authoring body: Government Digital Service (GDS)
      Guidance
      Surveillance Camera Code of Practice
      The purpose of the code will be to ensure that individuals and wider communities have confidence that surveillance cameras are deployed to protect and support them, rather than spy on them. ...
      Standard  | 
      Published: 01/06/2013
       | 
      Authoring body: Home Office
      Policy
      Criminal Procedure & Investigations Act 1996 Code of Practice
      The Criminal Procedure and Investigations Code of Practice applies in respect of criminal investigations conducted by police. A criminal investigation can be defined an investigation conducted by...
      Standard  | 
      Published: 01/01/2015
       | 
      Authoring body: Ministry of Justice (MoJ)
      Standards
      Auditing Principles - Directive 2006/43/EC of the European Parliament and of the Council
      Statutory auditors should adhere to the highest ethical standards and should be subject to professional ethics. This Directive aims at high-level to bring about harmonisation of statutory audit...
      Standard  | 
      Published: 01/01/2006
       | 
      Authoring body: European Parliament
      Principles
      Criminal Intelligence Manual for Analysts
      Intelligence is information (raw data) worked, evaluated in context to its source and reliability to create added value and meaning to its user (Information + Evaluation = Intelligence). Analysis...
      Standard  | 
      Published: 01/01/2011
       | 
      Authoring body: United Nations Office on Drugs and Crime (UNODC)
      Guidance
      • 4 Entries per Page
      • 8 Entries per Page
      • 20 Entries per Page
      • 40 Entries per Page
      • 60 Entries per Page

      Showing 181 to 240 of 275 entries.

      • Page 1
      • Page 2
      • Page 3
      • Page 4
      • Page 5

      Knowledge Hub

      • Sign up to the Knowledge Hub

      Quick links

      • National Policing Digital Strategy

      Partners

      • Police Digital Service
      • Government Digital Service
      • TechUK

      Contact us

      • National Standards Team