to add a new content
Forensic Science Regulator Information Legal Obligations (Issue 5)

This document was retired in June 2021.

The role of the forensic science regulator is to advise the Government and the criminal justice system on quality standards in the provision of forensic science. Recommend new requirements for new and improved standards and providing advice and guidance so that providers will be able to demonstrate compliance with common standards, in procurement and in courts 

A key requirement of any standards framework in forensic science is that the output meets the requirements of the Criminal Justice System (CJS). 
 This document sets out the view of the Regulator as to the legal landscape within which forensic scientists operate within the CJS. 

There are legal obligations placed on expert witnesses as sources in the Criminal Justice System in England and Wales as Expert evidence is admissible “to furnish the court with scientific information which is likely to be outside the experience and the knowledge of a judge or jury”. This places the expert witness in a privileged position.

It is important to note that expert evidence can only be given by a person who is an expert in the relevant field. An expert witness must provide the court with objective, unbiased opinion on 
matters within his expertise 
Witnesses must act with honesty and good faith. 

Published 01/01/2017
Authoring body: Forensic Science Regulator (FSR)
Command & Control (C&C) Version 0.1

This document was retired in June 2021.

The Command and Control (C&C) solution is the incident management and deployment solution for police officers responding to incidents reports by the public.

Incidents are usually graded based on severity of the incident and officers have Service Level Agreements (SLA’s) target in responding to incidents especially serious/critical incidents. SLA’s may differ from police force.

The Data types included in C&C are:

  • Action Status

  • Application Function Code

  • Application Function Title

  • Bus Info Class

  • Calendar Entry Class

  • Calendar Entry Status

  • Competency Class

  • Date Type

  • Duty Class

  • DVLA M/V Manufacturer Code

  • Event Plan Status

  • Incident Class

  • Location Status

  • Message Priority

  • Message Status

  • Message Template Type

  • Method of Reporting Origin

  • Motor Vehicle Body Type  Description

  • Organisation Class

  • Person Build

  • Person skin colour

  • PNC Access Reason

  • Person Shoe Type

  • Person Nationality

  • Person Eye Colour

  • Police EQP Avail Status

  • Police Officer Rank

  • Record Data Protection Status

  • Response Grade

  • Role

  • Sex

  • Special Constable Rank

  • Traffic Warden Rank

  • User Class ID

  • Plus many more.

Published 01/01/2019
Authoring body: Reference data service platform
Reference Data / Templates
Sender Policy Framework (SPF)

This document was retired in June 2021.

Sender Policy Framework (SPF) lets you publish a DNS record of all the domains or IP addresses you use to send email. Receiving email services check the record and know to treat email from anywhere else as spam.

Using a Sender Policy Framework (SPF) in an organisation lets you publish a Domain Name System (DNS) record of all the domains or (Internet Protocol) IP addresses you use to send email. Receiving email services check the record and know to treat email from anywhere else as spam.

You can include more than one sending service in your SPF record. For example, your corporate email service and an email marketing service.

Your SPF record also contains a qualifier option, which lets you:

- tell recipients to ignore your record while you test it

- mark, but not reject, email from an unknown source

Published 01/01/2016
Authoring body: Government Digital Service (GDS)
UKAS Guidance on the Application of ISO/IEC 17025 Dealing with Expressions of Opinions and Interpretations

This document was retired in March 2021.

Laboratories within the UK who wish to demonstrate that they operate to a quality system, are technically competent and are able to generate technically valid results must now meet the ISO/IEC 17025 requirements. This replaced the ISO/IEC Guide 25 and EN 45001, and has now become the standard that UKAS now to assess a laboratory’s competence for the purposes of accreditation instead of UKAS publication M10.

The purpose of this document is to set down United Kingdom Accreditation Service (UKAS) policy, process and guidance on assessment and accreditation of laboratories 

The difference in this policy set out is that laboratories UKAS policy that laboratory accreditation to ISO/IEC 17025 can now include the expression of opinions and interpretation of test/calibration results in reports as it is considered to be an inherent part of testing. Whereas before this was not permitted.

The laboratory’s documented quality system must reflect whether it is expressing opinions and interpretations and if so, for which activities. The process of interpreting test/calibration results for the purpose of expressing opinions and interpretations must be documented. 


Published 01/01/2001
Authoring body: United Kingdom Accreditation Service (UKAS)
Intelligence Management Research & Analysis APP

This document was retired in July 2021. This was replaced by the wider Intelligence Management APP

Research and analysis are very important tools used in policing for intelligence purposes to understand crime and investigate criminal activity. It is a way of processing and analysing material and information presented to support decision-making. With this comes the intelligence cycle where a sequential process is undertaken to allow the information presented to be developed into intelligence. This involves the roles of the analyst, researcher, data sources, analytical techniques used, reports etc.

This guidance document helps to explain what the intelligence cycle is, the direction, collection and collation of relevant information, evaluation and analysis of the data. It goes into detail explaining the roles highlighted above as well crime theories and approaches, terms of reference, data sources, using statistics, and analytical techniques, output reports, dissemination of output report and on-going reviews.

Published 01/01/2014
Authoring body: College of Policing (CoP)
National Firearms License Management System (NFLMS) Version 0.1

This document was retired in June 2021.

The National Firearms Licensing Management System provides a method for managing the licensing of firearms, shotguns and explosives. It records all individuals, companies and dealers who have applied for, or have been granted, a certificate.

The dataset consists of:

  • Action

  • Addresstype

  • Alarmtype

  • Applicationstatus

  • Approvaltype

  • Calibre

  • Capacitytype

  • Certificatestatus

  • Certificatetype

  • Clubstatus

  • Colour

  • Condition

  • Constructiontype

  • Enquirytype

  • Ethnicity

  • Logeventtype

  • Manufacturer

  • Measurement

  • Nationality

  • Occupation

  • Personmarkertype

  • Sex

  • Weaponcategory

  • Weaponclass

  • Weapondisposalcode

  • Weaponstatus

  • Weapontype

Published 01/01/2019
Authoring body: Reference data service platform
Reference Data / Templates
Corporate Data Model (CorDM) Version 7.3

This document was retired in July 2021.


Aligned to PND Context v3.2.2. CorDM 7.3 uses the same versions of CV lists (where common) as PND Context v3.2.


Reference dataset consists of:






































Plus many more

Published 01/01/2018
Authoring body: Reference data service platform
Reference Data / Templates
Authentication and Credentials for use with HMG Online Services (Good Practice Guide No. 44) (Issue 2)

This document was retired in July 2021.

This document is good practice guidance to Her Majesty’s Government (HMG) public service providers to describing how types of credentials supports support user authentications to HMG online services.

HMG online public services can be a high target for many sources of threats and as such may pose a significant level of risk. As a result Public service providers must be aware of the credential choices of authentication levels that relate to HMG online services. There are three high-levels of authentication:

  1. Authentication demonstrates that authentication requestor possesses the credential for a legitimate account.

  2. Authentication provides confidence that the credentials is being used/or with explicit consent by a legitimate account holder and might support civil proceedings.

  3. Authentication provides confidence that the credentials is being used/or with explicit consent by a legitimate account holder and might support criminal proceedings.

The level of assurance assigned to an authentication credential has many factors incorporated into and is considered against the threat levels associated with the Government service provider.

Some of the factors considered are the type of credential required, the on-going management of the credential by the identity Provider (IDP), the quality and extent of monitoring and reactions by the IDP, the Information Assurance (IA) maturity of the authentication provider and much more.

The CESG Information Assurance Standards and Guidance welcomes feedback. To leave feedback and review please email


Published 01/01/2014
Authoring body: CESG National Technical Authority for Information Assurance
National security Strategy & Strategic Defence & Security Review 2015

This document was retired in July 2021

National Security and economic security are dependent on each other, and if any wants to thrive, both have to thrive. The security of the nation is dependent upon a strong economy, and a strong economy is dependent upon strong security. Therefore the Defence budget is seen as critical to the government to maintain strong national security.

With the threat to the UK ever increasing, from the rise of ISIS and greater instability in the Middle East, risk of pandemics such as COVID 19, threat of Cyber attacks, the world is more dangerous and uncertain than ever before and as such investing in our security is of upmost importance.

This document sets out our National Security Strategy and how we will implement it within the UK. The UK’s priorities are to deter state-based threats, tackle terrorism, remain a world leader in cyber security and ensure we have the capability to respond rapidly to crises as they emerge. Therefore the vision can be determined as to promote a secure and prosperous United Kingdom, with global reach and influence using strategic enablers such as the Armed Forces, Security & Intelligence Agencies, Diplomatic service overseas and our Allies.


Published 01/01/2015
Authoring body: Cabinet Office
Digital Case File Data Requirements 1.0.0

This document was retired in July 2021

The purpose of this document and standard is to detail the information requirements for the content of the digital case file to be transferred by forces to the Crown Prosecution Service (CPS).

The Digital Case File (DCF) Data requirements document help to define the structured case information and case summary required by the CPS for a first hearing, including that which must be served on to the court, defence and self-represented defendant as Initial Details of the Prosecution Case (IDPC). It also to define the content and data structure of the DCF, as required by the CPS and provided by the police for a case summary listed for a first hearing in the Magistrates Court.

This includes:

  • For all offences listed for a first hearing in the Magistrates Court by way of a charge sheet, summons or requisition.

  • To be used post-charge following either a police charge or cps pre-charge advice decision.

  • To be used for cases containing multiple defendants and offences.

  • For both anticipated guilty and not-guilty pleas.

  • For breach of bail (BoB) hearings.

Published 01/01/2015
Authoring body: Criminal Justice System (CJS)