Search - National Standard Microsite
National Standards can be classified based on whether they are conceptual, rule based or value based:
- Principles - The defining characteristic of a principle document is that it is conceptual. It describes a target state or end goal without specifying how it will be achieved.
- Guidance/Policies/Standards - The defining characteristic of guidance, policies and standards are that they are rule based. The document specifies the rules to be applied to achieve a particular state.
- Technical Reference Templates - The defining characteristic of a template is that it is value based. It specifies exactly the values that must be used.
National Standards graded 4Pol are standards which meet the below criteria and should be considered first, before any other standard in that category, as they fit the National Policing Digital Strategy allowing forces and suppliers to converge on a single set of standards.
4Pol Criteria:
- Support minimum legal requirements where they exist
- Align with the National Policing Digital Strategy to ensure strategic alignment and design
- Align with the TechUK Justice & Emergency Services Interoperability Charter to deliver better data sharing, exchanging and exploitation
- Direct relevance and applicability to policing
- Represent best practice
- Able to be measured and achieved within the unique landscape of policing
National Standards graded MLR stem directly from legislative requirements, such as the General Data Protection Regulation (GDPR) standards. These are National Standards which represent the minimum requirements to ensure that data and technology in use is operated in a lawfully compliant manner. These should be considered the baseline in applicable categories.
National Standards are divided into broad categories based on their focus. To recognise there is no clear dividing line, some National Standards may possess two categories, but the selected category reflects the primary focus of the National Standard:
- Analytics - Digital systems capable of creating actionable information from structured or unstructured data
- Asset Management - The way in which IT assets are acquired, used and disposed of
- Incident, Crime and Records Management Systems
- Digital systems used to manage policing and corporate records
- Cloud - Remote, off-premises computer system resources which host a range of functions across a potentially wide range of distributed sites
- Data - Information held in a structured or unstructured digital format
- Devices - Physical devices capable of viewing, changing, creating, distributing or storing digital information
- Digital Media - Media stored in an electronic format from any source
- Enterprise Resource Planning - Enterprise resource planning (ERP) is the management of integrated business processes via a software solution
- Forensics - The use of investigative technology and methodology to gather intelligence and admissible evidence
- Intelligence Systems - Digital system used to view, change, create, distribute or store sensitive digital information
- Justice - Systems, technologies and methodologies used within the Criminal Justice System
- Mobility - Software specifically designed to run on a mobile device such as a phone, tablet or watch
- Office Productivity & Collaboration Systems - Software specifically designed to address specific business needs such as communication, collaboration, document creation and content management
- Operational Policing - Specialist operational policing functions
- Security - The technology and methodology used in the protection of digital assets and services
Tags are assigned to National Standards to help users find grouped / related documentation
Encoding Characters
UTF-8, an encoding form for Unicode character sets, for government digital services and technology encodes all Unicode characters without changing the ASCII code.
Unicode is based on the American Standard Code for Information Interchange (ASCII) character set.
UTF-8 is an international standard used by, data scientists, data analysts and developers. It allows you to read, write, store and exchange text that remains stable over time and across different systems. It also have accurately translated languages moving between systems and prevent accidental or unanticipated corruption of text as it transfers between systems.
This makes UTF-8 flexible for a wide range of uses.
The government chooses standards using the open standards approval process and the Open Standards Board has final approval. Read more about the approval process for cross-platform character encoding.
All vehicles (VEH01)
All vehicles (VEH01) is a dataset of all licensed and registered vehicles in Great Britain and the UK, produced by Department for Transport.
It contains licensed vehicles, registered vehicles for the first time, vehicles by numbers of keepers, Statutory Off Road Notification (SORN) and the Ultra-low emissions vehicles (ULEVs).
For more information please contact Vehicles statistics
Emailvehicles.stats@dft.gov.uk
Public enquiries: 020 7944 3077
ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organisation to deal with particular fields of technical activity. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The Cyberspace is a complex environment resulting from the interaction of people, software and services on the Internet, supported by worldwide distributed physical information and communications technology (ICT) devices and connected networks. However there are numerous security gaps not covered by current information security, Internet security, network security and ICT security. The aim of this international standard is to address Cyberspace security issues and bridge the gap between different security domains in the cyberspace.
International Standard provides technical guidance for addressing common cybersecurity risks such as social engineering, hacking, spyware and proliferation of malicious software.
It also provides guidelines for addressing risk such as preparing for attacks, detecting and monitoring attacks and responding to attacks.
The International Standard also provides a framework for information sharing, coordination, and incident handling.
Domain-based Message Authentication, Reporting & Conformance (DMARC)
The Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email standard that used in email transactional activity. It helps validates a senders identity using Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). The receiving email service uses SPF and DKIM to confirm the sender’s identity. If the receiving email service confirms the sender’s identity it will forward the email to the receiver’s inbox. If the receiving email service cannot confirm the sender’s identity it will mark the email as spam.
Using DMARC has its benefits such as helps to protect the users, employees from cybercrime, reduce customer support costs relating to email fraud and improve trust in the emails organisation sends and receives.
Using Open Document Formats (ODF) in your organisation
Open Document Formats (ODF) 1.2 standard was selected by the Open Standards Board for use across the UK government. ODF works on most operating systems (including desktops, laptops, mobiles and tablets). This is because it is an open standards that allows suppliers to create interoperable office productivity solutions, can lower IT costs as ODF is low cost or free to use, allows government staff to share and edit documents, allows stricter security checks therefore helping it to prevent common cyber-attack scenarios, can add digital signatures to a document.
ODF standard works with several software tools as Mac, Windows, Linux, and Android operating systems as well as many others. User needs are very important when selecting an ODF complaint solution, therefore the research and analysis is critical.
The standard also includes the following information:
-
Buying ODF compliant solutions
-
Migrating to ODF compliant solutions
-
Securing ODF compliant solutions
-
Integrating ODF compliant solutions
-
Setting up ODF complaint solutions
Cybersecurity Framework NIST (Version 1.1)
National Institute of Standards and Technology (NIST), covers a wide range of topics including Bioscience, Chemistry, Advanced Communications, Cybersecurity, Energy, Materials, Nanotechnology, Neutron research, Physics, Health, Infrastructure, Public Safety, Standards, Transportation and many more.
NIST also cover a wide range of publications, laboratories and programs, Research projects, Services and Resources Software, Data, Computer Security Resource Center, and News and Events.
Under Cybersecurity, there is a framework developed to help organisations to better understand and improve their management of cybersecurity risk.
The Cybersecurity framework consists of standards, guidance, and best practices.
It stages of the framework:
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
The cyber security framework help organisations prioritise, become flexible and cost-effective in promoting and dealing with protection and resilience of critical infrastructure and other parts critical to the national security and economy.
For further information and/or questions about the Cybersecurity Framework please contact: cyberframework@nist.gov
Technology Code of Practice
The Technology Code of Practice is a set of criteria to help government design, build and buy technology. Technology Code of Practice should be used for all technology projects and programmes and should be aligned to the mandatory code and as much as possible align the organisation’s technology and business strategies to the Technology Code of Practice.
Following the Technology Code of Practice will help introduce or update technology so that it:
-
meets user needs, based on research with your users
-
is easier to share across government
-
is easy to maintain
-
scales for future use
-
is less dependent on single third-party suppliers
-
provides better value for money
-
makes use of open standards
Organisations must consider all points of the Technology Code of Practice as part of the Cabinet Office spend control process as it’s used as a cross-government agreed standard in the spend controls process. Where legacy technology limits your ability to adhere to the standard, you must explain this to the GDS Standards Assurance team.
Defence Industry Security Notices
Industry Security Notices (ISNs)
A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating to security.
Information from Ministry of Defence, that provides updates.
-
‘ISN 2014/04 Farnborough International Air Show 2014: exhibition clearances’ has been removed
-
‘ISN 2014/01: Government Security Classification Scheme’ updated April 2014
-
‘ISN 2011/05 Defence & Security Equipment International (DSEi) 2011: exhibition clearances’ has been removed
-
‘ISN 2011/02: incident report’ has been superseded by ‘2011/07: incident reporting’
-
‘ISN 2011/03: Nato personnel security clearances’ has been superseded by ‘2014/03: Procedure for UK contractors to obtain Nato personnel security clearances’
Recruitment Guidance - Candidate Management
Ensuring that the right candidates are selected for policing roles is essential. Employing the right selection process is essential to make the most efficient use of money, time and resources and can have the following benefits:
-
Reduce the probability of selecting individuals who will not perform at their jobs effectively.
-
Better value at the national Assessment process
-
Minimises disproportionality in outcomes for underrepresented groups
-
Maximise candidates potential by supporting, them and ensuring a positive candidate experience.
It is known that not all forces handle their recruitment process in the same way in the early process and therefore causes discrepancies in the way people are recruited in the police force. A sifting solution is being undertaken that aims to help effectively mange candidates. Whilst this is still on-going, this document aims to help police forces consider some key principles for an effective end-to-end recruitment process.
Each area should be considered:
-
Recruitment strategy
-
Attraction campaign and positive action
-
Registration
-
Force selection
-
National Assessment Process
-
Post-assessment process activity
-
Appointment
Monitoring of each area and collaborating with other learning providers are critical to the improvement, maximisation and best practise of the selection process.
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data.
Data sanitisation has to do with the safe removal, treatments and disposal of sensitive information from storage media devices to guarantee that retrieval and reconstruction of data is not possible or may be very difficult to reproduce as some forms of sanitisation will allow you to re-use the media, while others are destructive in nature and render the media unusable.
There could be many reasons why an organisation may want to sanitise its data:
-
Re-use purposes – new user device allocation, re-purpose or resell device.
-
Repair purposes - return or repair faulty device
-
Disposal purposes – dispose of device
-
Destruction purposes – destroy information held on device or the device itself.
There are risks associated with improper sanitisation as key data may still remain on the device, such as:
-
Sensitive data may end up with the wrong people who can expose the sensitive data
-
Loss of control over information assets
-
Private or personal data could be leaked and used to commit fraud or identity theft.
-
Intellectual property could be used leading to reputational loss
Whilst this may not be entirely a sanitisation issue, it is part of it and one way to combat these risks is using encryption.
Showing 121 to 130 of 249 entries.