Skip to Main Content
Police Digital Service National Standards
Authentication failed. Please enable browser cookies and try again.
Sign In
Email Address
Password
Caps Lock is on.
Log in
Sign up
Forgot Password
Search Everything - National Standard Microsite
Standards
Search Everything
Standards search
APIs
Blueprints
Procurement
About
Updates
FAQs
Contact Us
Categories
Security (161)
Incident, Crime and Records Management (25)
Data (24)
Devices (17)
Forensics (17)
Intelligence Systems (17)
Operational Policing (12)
Criminal Justice (12)
Analytics (11)
Mobile Applications (8)
Clear All
Tags
ncsp (60)
cyber (48)
standard (43)
risk (42)
operational policing (36)
sbd (28)
resilience (25)
assurance (23)
compliance (21)
network (21)
Clear All
Newest
A-Z
List
Grid
No results were found.
Search listings
Criminal Justice System Exchange Data Standards Catalogue (Version 6)
The CJS Data Standards Catalogue is a collection of data standards used by Criminal Justice Organisations in England & Wales to support interoperability between their different ICT systems. If...
Standard
|
Published:
01/01/2020
|
Authoring body:
Criminal Justice System (CJS) Exchange Product Board
Reference Data / Templates
Retrieval of Video Evidence and production of working copies from digital CCTV Systems (Version 2.0)
Digital CCTV installations vary greatly in terms of the recording methods as a result of varying solutions with different capabilities and functionality which are used to capture picture and video...
Standard
|
Published:
01/01/2008
|
Authoring body:
Defence Science and Technology Laboratory
Guidance
Recruitment Guidance - Candidate Management
Ensuring that the right candidates are selected for policing roles is essential. Employing the right selection process is essential to make the most efficient use of money, time and resources and...
Standard
|
Published:
01/01/2020
|
Authoring body:
College of Policing
Guidance
European Pool against Organised Crime (ePOC IV) Version 1.0
European Pool against Organised Crime (EPOC IV) was introduced in 2004 as the Eurojust Case Management System. It facilitates the secure storage of case-related personal data, the exchange of...
Standard
|
Published:
01/01/2019
|
Authoring body:
Reference data service platform
Reference Data / Templates
Operations Command and Control APP
The Command and Control (C&C) solution is the incident management and deployment solution for police officers responding to incidents reports by the public. Command and control is the authority...
Standard
|
Published:
01/01/2021
|
Authoring body:
College of Policing (CoP)
Guidance
Post-Incident Procedures following Death or Serious Injury APP
There are incidents that take place where the police respond to a serious injury/incident or where there is a deceased or where at a later time the victim dies. This APP – describes the...
Standard
|
Published:
01/01/2020
|
Authoring body:
College of Policing (CoP)
Guidance
All vehicles (VEH01)
All vehicles (VEH01) is a dataset of all licensed and registered vehicles in Great Britain and the UK, produced by Department for Transport. It contains licensed vehicles, registered vehicles for...
Standard
|
Published:
01/01/2020
|
Authoring body:
Department for Transport (DfT)
Reference Data / Templates
IDENT1
This document should be used in reference to the appropriate legislation, such as the Protection of Freedoms Act 2012: DNA & Fingerprint Provisions IDENT1 is the UK’s nationals automated...
Standard
|
Published:
01/01/2019
|
Authoring body:
Home Office
Reference Data / Templates
DNA and Fingerprint Provisions
Protection of Freedoms Act 2012: DNA and fingerprint provisions was introduced in October 2013 to cover the retention of DNA and fingerprints where it was ruled in the European Court in the case of...
Standard
|
Published:
01/01/2019
|
Authoring body:
Home Office
Policy
ICT Asset Recovery Standard 7.0
Asset Disposal & Information Security Alliance (ADISA) is an organisation designed to improve risk management and data protection within business processes for IT asset retirement and disposal....
Standard
|
Published:
01/01/2020
|
Authoring body:
Asset Disposal & Information Security Alliance (ADISA)
Standards
Cyber Essentials guidance
Most cyber attacks are conducted by unskilled individuals and are very basic in nature and cyber security is an important aspect to guard any organisation from cyber attacks. There are five...
Standard
|
Published:
01/01/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Principles (Version 1.0)
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Guidance 2
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution. Modern smartphones, laptops and tablets provide users with great flexibility and...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data. Data sanitisation has to...
Standard
|
Published:
13/02/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
10 Steps to Cyber Security
This guidance is designed to help organisations protect themselves in cyberspace and best practises for cyberspace security. It relays the task of defending your networks, systems and...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Application Development
This guidance gives practical advice on the secure development, procurement and deployment of generic applications. There are three types of common security issues: Secure data handling ...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End user device (EUD) Security Guidance Windows 10 1809
This guidance covers the deployment of a range of end user device platforms for the secure configuration of Windows 10 1809. Risk owners and administrators should agree a configuration which...
Standard
|
Published:
01/01/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End User Device (EUD) Security Guidance
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber security Centre (NCSC)
Principles
Defence Industry Security Notices
Industry Security Notices (ISNs) A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating...
Standard
|
Published:
01/01/2021
|
Authoring body:
Government Digital Services (GDS)
Guidance
Website and application accessibility regulations and guidance
Public sector organisations need to think about accessibility at every stage and ensure they meet the Web Content Accessibility Guidelines (WCAG 2.1) design principles. The Public Sector...
Standard
|
Published:
01/01/2019
|
Authoring body:
Government Digital Services (GDS)
Guidance
ISO/IEC 27031:2011 IT Security Techniques — Guidelines for Information and Communication Technology Readiness for Business Continuity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2011
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27033-1:2015 IT Security Techniques — Network Security — Part 1: Overview and Concepts
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 20000-1:2018 IT Service Management — Part 1: Service Management System Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2018
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27018:2019 IT Security Techniques — Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds acting as PII Processors
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27004:2016 IT Security Techniques — Information Security Management — Monitoring, Measurement, Analysis and Evaluation
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2016
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2012
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO 22301:2019 Security and Resilience — Business Continuity Management Systems — Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27013:2015 IT Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27034-2:2015 IT Security techniques - Application Security - Part 2: Organisation Normative Framework
This document provides a framework for application security. ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27002:2013 IT Security techniques - Code of Practice for Information Security Controls
This document informs the implementation of controls within an information security management system based on ISO 27001. ISO (the International Organisation for Standardisation) and IEC (the...
Standard
|
Published:
01/01/2013
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27001:2013 IT Security techniques — Information Security Management Systems — Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2013
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27003:2017 Information Technology — Security techniques — Information Security Management Systems — Guidance
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27000:2020 IT Security techniques - Information Security management systems - Overview & Vocabulary
The International Organisation Standardisation (ISO) and the International Electrotechnical Commission (IEC) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2020
|
Authoring body:
International Organisation Standardisation (ISO)
Standards
National Intelligence Model
The National Intelligence Model (NIM) is a well-established model within the policing world that was established in 2000 by the National Criminal Intelligence service (NCIS) and adopted by...
Standard
|
Published:
01/01/2005
|
Authoring body:
Home Office
Standards
ISO/IEC 27003:2017 Preview
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO 17025:2017 General requirements for the competence of testing and calibration laboratories
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. BSI provide the...
Standard
|
Published:
01/01/2017
|
Authoring body:
International Standards Organisation (ISO)
Standards
Regulation of Investigatory Powers Act 2000 (RIPA)
The regulation of Investigatory Powers Act 2000 relates to the interception, acquisition and disclosure of data relating to communications, the carrying out of surveillance, the use of covert human...
Standard
|
Published:
01/01/2000
|
Authoring body:
Her Majesty’s Stationery Office (HMSO)
Principles
Data Protection
On the 25th May 2018 the Data Protection Act 2018 was implemented by the UK as the General Data Protection Regulation also known as GDPR. It controls how personal information is captured and used...
Standard
|
Published:
01/01/2018
|
Authoring body:
Information Commissioner's Office (ICO)
Principles
Criminal Justice System: Data Standards Forum Guidance
An agreed and designed common data standards are used by the Criminal Justice System, ICT suppliers to support ICT communications between systems used by Criminal Justice Organisations (CJO) to...
Standard
|
Published:
17/12/2020
|
Authoring body:
Ministry of Justice (MOJ)
Guidance
Security Policy Framework for HMG Organisations
This Framework describes the Cabinet Secretary and Official Committee on Security expectations of how HMG organisations and third parties handling HMG information and other assets will apply...
Standard
|
Published:
01/01/2018
|
Authoring body:
Government Digital Service (GDS)
Policy
Equality Act 2010: Guidance (2015)
The Equality Act 2010 replaced previous anti-discrimination laws with a single Act. It protected people from discrimination, age discrimination and public sector Equality Duty, sets out the...
Standard
|
Published:
01/01/2015
|
Authoring body:
Government Equalities Office
Policy
Domain-based Message Authentication, Reporting & Conformance (DMARC)
The Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email standard that used in email transactional activity. It helps validates a senders identity using Sender...
Standard
|
Published:
01/01/2016
|
Authoring body:
Government Digital Service (GDS)
Standards
Securing Government Email
This guidance applies to all email domains that public sector organisations run on the internet. It also helps ensures that public sector organisations exchanges email securely with other public...
Standard
|
Published:
01/01/2019
|
Authoring body:
Government Digital Service (GDS)
Guidance
DomainKeys Identified Mail (DKIM)
DomainKeys Identified Mail (DKIM) verifies an email’s domain and ensures it has not been tampered with in transit. The receiving email service can then filter or reject email that fails...
Standard
|
Published:
01/01/2016
|
Authoring body:
Government Digital Service (GDS)
Guidance
Encoding Characters
UTF-8, an encoding form for Unicode character sets, for government digital services and technology encodes all Unicode characters without changing the ASCII code. Unicode is based...
Standard
|
Published:
01/01/2020
|
Authoring body:
Government Digital Service (GDS)
Policy
Technology Code of Practice
The Technology Code of Practice is a set of criteria to help government design, build and buy technology. Technology Code of Practice should be used for all technology projects and programmes and...
Standard
|
Published:
01/01/2019
|
Authoring body:
Government Digital Service (GDS)
Guidance
Surveillance Camera Code of Practice
The purpose of the code will be to ensure that individuals and wider communities have confidence that surveillance cameras are deployed to protect and support them, rather than spy on them. ...
Standard
|
Published:
01/06/2013
|
Authoring body:
Home Office
Policy
Criminal Procedure & Investigations Act 1996 Code of Practice
The Criminal Procedure and Investigations Code of Practice applies in respect of criminal investigations conducted by police. A criminal investigation can be defined an investigation conducted by...
Standard
|
Published:
01/01/2015
|
Authoring body:
Ministry of Justice (MoJ)
Standards
Auditing Principles - Directive 2006/43/EC of the European Parliament and of the Council
Statutory auditors should adhere to the highest ethical standards and should be subject to professional ethics. This Directive aims at high-level to bring about harmonisation of statutory audit...
Standard
|
Published:
01/01/2006
|
Authoring body:
European Parliament
Principles
Criminal Intelligence Manual for Analysts
Intelligence is information (raw data) worked, evaluated in context to its source and reliability to create added value and meaning to its user (Information + Evaluation = Intelligence). Analysis...
Standard
|
Published:
01/01/2011
|
Authoring body:
United Nations Office on Drugs and Crime (UNODC)
Guidance
60 Entries
Per Page
4
Entries per Page
8
Entries per Page
20
Entries per Page
40
Entries per Page
60
Entries per Page
Showing 181 to 240 of 275 entries.
Page
1
Page
2
Page
3
Page
4
Page
5
Hidden