Search - National Standard Microsite
National Standards can be classified based on whether they are conceptual, rule based or value based:
- Principles - The defining characteristic of a principle document is that it is conceptual. It describes a target state or end goal without specifying how it will be achieved.
- Guidance/Policies/Standards - The defining characteristic of guidance, policies and standards are that they are rule based. The document specifies the rules to be applied to achieve a particular state.
- Technical Reference Templates - The defining characteristic of a template is that it is value based. It specifies exactly the values that must be used.
National Standards graded 4Pol are standards which meet the below criteria and should be considered first, before any other standard in that category, as they fit the National Policing Digital Strategy allowing forces and suppliers to converge on a single set of standards.
4Pol Criteria:
- Support minimum legal requirements where they exist
- Align with the National Policing Digital Strategy to ensure strategic alignment and design
- Align with the TechUK Justice & Emergency Services Interoperability Charter to deliver better data sharing, exchanging and exploitation
- Direct relevance and applicability to policing
- Represent best practice
- Able to be measured and achieved within the unique landscape of policing
National Standards graded MLR stem directly from legislative requirements, such as the General Data Protection Regulation (GDPR) standards. These are National Standards which represent the minimum requirements to ensure that data and technology in use is operated in a lawfully compliant manner. These should be considered the baseline in applicable categories.
National Standards are divided into broad categories based on their focus. To recognise there is no clear dividing line, some National Standards may possess two categories, but the selected category reflects the primary focus of the National Standard:
- Analytics - Digital systems capable of creating actionable information from structured or unstructured data
- Asset Management - The way in which IT assets are acquired, used and disposed of
- Incident, Crime and Records Management Systems
- Digital systems used to manage policing and corporate records
- Cloud - Remote, off-premises computer system resources which host a range of functions across a potentially wide range of distributed sites
- Data - Information held in a structured or unstructured digital format
- Devices - Physical devices capable of viewing, changing, creating, distributing or storing digital information
- Digital Media - Media stored in an electronic format from any source
- Enterprise Resource Planning - Enterprise resource planning (ERP) is the management of integrated business processes via a software solution
- Forensics - The use of investigative technology and methodology to gather intelligence and admissible evidence
- Intelligence Systems - Digital system used to view, change, create, distribute or store sensitive digital information
- Justice - Systems, technologies and methodologies used within the Criminal Justice System
- Mobility - Software specifically designed to run on a mobile device such as a phone, tablet or watch
- Office Productivity & Collaboration Systems - Software specifically designed to address specific business needs such as communication, collaboration, document creation and content management
- Operational Policing - Specialist operational policing functions
- Security - The technology and methodology used in the protection of digital assets and services
Tags are assigned to National Standards to help users find grouped / related documentation
Data Protection Manual
This manual has been produced by the NPCC Data Protection, Freedom of Information, information Sharing and Disclosure Portfolio Group on behalf of the NPCC. It is updated and adapted to reflect decisions made by the NPCC, views of the Information Commissioner’s Office (ICO) (where appropriate) and the evolution of the legislation as it is interpreted, challenged or reviewed.
Note that this manual has not yet been updated to reflect the legislative changes arising from The Data Protection, Privacy and Electronic Communications (Amendments etc)(EU Exit) Regulations 2019 as amended by The Data Protection, Privacy and Electronic Communications (Amendments etc)(EU Exit) Regulations 2020.
The manual should be regarded as a document that both helps to create an environment across the police service in which compliance can be achieved, and as a means of providing guidance in areas of police business where the Act is regularly applied.
The manual contains a wide variety of information including:
- Breakdown of governance and responsibilities
- Definitions
- General processing (GDPR & DPA Part 2)
- Comparison between General Processing and Law Enforcement obligations
- Law Enforcement processing (Part 3 of DPA)
- Intelligence Service processing (Part 4 of DPA)
- Assessing data protection compliance
- The Commisioner, enforcement & offences
- Case studies
- Wide variety of appendices including
- Template DPIA
- Template National data processing contract
- Template information sharing agreement
- Template Data Protection policy
Digital Investigation & Intelligence APP
The digital policing learning programme was created to for officers and staff to update their knowledge regarding digital intelligence and investigation. The programme helps explains the use and misuse of devices and applications and how they appear in the policing world.
The programme’s aim is to ensure that all staff are:
-
confident facing situations where there is a digital element
-
competent in identifying and carrying out the actions required by those circumstances
-
able to ensure they are compliant in their actions.
The Digital Intelligence and Investigation project will deliver learning and knowledge resources that will ensure that all new and serving officers acquire the digital skills they need to undertake investigations effectively.
Mobilisation APP
With the Police responding to critical and complex incidents, sometimes these incidents may require resources that go beyond the capacity and capability of the Police force. Some of these incidents may require the need of other partner agencies, other specialist skillsets and equipment and thus would need to be effectively managed and coordinated. Mobilisation is the process which supports mutual aid, at the local, regional or national level.
The National Police Coordination Centre (NPoCC) is responsible for the mobilisation of police assets, including general policing, operations and crime business areas. A lead force will be responsible for resourcing nationally-led crime enquiries. NPoCC should be the initial point of contact for any mobilisation requirements as it can provide advice and national coordination.
It is important to note that this a challenging area of work, particularly when the length of the investigation is unknown and mobilising crime assets is a new and emerging business field (mutual aid) for the Police service.
ISS4PS Annexes Volume 2
This document was retired in July 2021
The Information Systems Strategy for the Police Service (ISS4PS) is an overarching strategy for Information and Communications Technology (ICT) and Information Systems (IS) for the Police service across the whole of England and Wales. Volume 2 Annexes helps to define and establish a list of standards and should be used a requirements for new developments within the Police Service.
Annex contains guidelines and actions points for:
1. Establishing ISS4PS standards information base (SIB)
2. Actions and guidance for IT Directors
3. ISS4PS compliance to the architectural principles
4. Guidelines for National Programmes focusing on 3 critical ISS4PS policies (Establishing Foundations, Delivering Joined-up Services and Delivering National Initiatives)
5. Criteria's for corporate and national solutions developed or procured by the Police Force
6. Summary of Principles and actions defined in 'Implementing ISS4PS Volume 2'
ISO/IEC 27003:2017 Information Technology — Security techniques — Information Security Management Systems — Guidance
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organisation to deal with particular fields of technical activity. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
This document was created to provide guidance on the requirements for an information security management system (ISMS) and provides recommendations, possibilities and permissions.
The following areas are very important for ISMS:
-
understanding the organisation’s needs and the necessity for establishing information security policy and information security objectives;
-
assessing the organisation's risks related to information security;
-
monitoring and reviewing the performance and effectiveness of the ISMS
-
practising continual improvement
The ISMS also has key components such as policies, defined responsibilities, documentation and management processes pertaining to policy establishment, planning, implementation, operation, performance assessment, management review and improvement.
ISO 90011:2018 Guidelines for Auditing Management Systems
This document informs the creation of auditing systems.
With many organisations now wanting to combine a number of management systems into one, there has been awareness to also combine auditing capabilities into one for these management systems. As a result the international standard BS EN ISO: 19011:2011 has created this standard to provide organisations the knowledge for auditing modern management systems, the principles and guidance to ensuring they deliver a high standard of auditing capabilities and that organisations do not fail which could have damaging effects such as losing out on contracts, certifications, and operational efficiency.
Organisations can save vast amount of time, money and resources, by applying a single approach to multiple management systems by streamlining their auditing processes and removing duplication of effort.
This document shed insights into planning, decision-making and evaluating audits.
The standard includes (but not limited to:
-
Scope
-
Principles of Auditing
-
Managing an audit programme
-
Establishing the Audit programme
-
Implementing the audit programme
-
Monitoring an audit programme
-
Reviewing and improving the audit programme
-
Conducting audit activities
-
Preparing audit report
-
Conducting audit evaluation
-
And much more
Fee applies of £254.00 (members price: £127.00) for accessing the standard.
ISO/IEC 27003:2017 Preview
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organisation to deal with particular fields of technical activity. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
This document provides guidance on the requirements for an information security management system (ISMS) as specified in ISO/IEC 27001 and provides recommendations (‘should’), possibilities (‘can’) and permissions (‘may’) in relation to them. It is not the intention of this document to provide general guidance on all aspects of information security.
Clauses 4 to 10 of this document mirror the structure of ISO/IEC 27001:2013.
This document does not add any new requirements for an ISMS and its related terms and definitions. Organisations should refer to ISO/IEC 27001 and ISO/IEC 27000 for requirements and definitions. Organisations implementing an ISMS are under no obligation to observe the guidance in this document.
An ISMS emphasises the importance of the following phases:
-
understanding the organisation’s needs and the necessity for establishing information security policy and information security objectives;
-
assessing the organisation's risks related to information security;
-
implementing and operating information security processes, controls and other measures to treat risks;
-
monitoring and reviewing the performance and effectiveness of the ISMS; and
-
practising continual improvement.
Encoding Characters
UTF-8, an encoding form for Unicode character sets, for government digital services and technology encodes all Unicode characters without changing the ASCII code.
Unicode is based on the American Standard Code for Information Interchange (ASCII) character set.
UTF-8 is an international standard used by, data scientists, data analysts and developers. It allows you to read, write, store and exchange text that remains stable over time and across different systems. It also have accurately translated languages moving between systems and prevent accidental or unanticipated corruption of text as it transfers between systems.
This makes UTF-8 flexible for a wide range of uses.
The government chooses standards using the open standards approval process and the Open Standards Board has final approval. Read more about the approval process for cross-platform character encoding.
All vehicles (VEH01)
All vehicles (VEH01) is a dataset of all licensed and registered vehicles in Great Britain and the UK, produced by Department for Transport.
It contains licensed vehicles, registered vehicles for the first time, vehicles by numbers of keepers, Statutory Off Road Notification (SORN) and the Ultra-low emissions vehicles (ULEVs).
For more information please contact Vehicles statistics
Emailvehicles.stats@dft.gov.uk
Public enquiries: 020 7944 3077
ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organisation to deal with particular fields of technical activity. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The Cyberspace is a complex environment resulting from the interaction of people, software and services on the Internet, supported by worldwide distributed physical information and communications technology (ICT) devices and connected networks. However there are numerous security gaps not covered by current information security, Internet security, network security and ICT security. The aim of this international standard is to address Cyberspace security issues and bridge the gap between different security domains in the cyberspace.
International Standard provides technical guidance for addressing common cybersecurity risks such as social engineering, hacking, spyware and proliferation of malicious software.
It also provides guidelines for addressing risk such as preparing for attacks, detecting and monitoring attacks and responding to attacks.
The International Standard also provides a framework for information sharing, coordination, and incident handling.
Domain-based Message Authentication, Reporting & Conformance (DMARC)
The Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email standard that used in email transactional activity. It helps validates a senders identity using Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). The receiving email service uses SPF and DKIM to confirm the sender’s identity. If the receiving email service confirms the sender’s identity it will forward the email to the receiver’s inbox. If the receiving email service cannot confirm the sender’s identity it will mark the email as spam.
Using DMARC has its benefits such as helps to protect the users, employees from cybercrime, reduce customer support costs relating to email fraud and improve trust in the emails organisation sends and receives.
Using Open Document Formats (ODF) in your organisation
Open Document Formats (ODF) 1.2 standard was selected by the Open Standards Board for use across the UK government. ODF works on most operating systems (including desktops, laptops, mobiles and tablets). This is because it is an open standards that allows suppliers to create interoperable office productivity solutions, can lower IT costs as ODF is low cost or free to use, allows government staff to share and edit documents, allows stricter security checks therefore helping it to prevent common cyber-attack scenarios, can add digital signatures to a document.
ODF standard works with several software tools as Mac, Windows, Linux, and Android operating systems as well as many others. User needs are very important when selecting an ODF complaint solution, therefore the research and analysis is critical.
The standard also includes the following information:
-
Buying ODF compliant solutions
-
Migrating to ODF compliant solutions
-
Securing ODF compliant solutions
-
Integrating ODF compliant solutions
-
Setting up ODF complaint solutions
Cybersecurity Framework NIST (Version 1.1)
National Institute of Standards and Technology (NIST), covers a wide range of topics including Bioscience, Chemistry, Advanced Communications, Cybersecurity, Energy, Materials, Nanotechnology, Neutron research, Physics, Health, Infrastructure, Public Safety, Standards, Transportation and many more.
NIST also cover a wide range of publications, laboratories and programs, Research projects, Services and Resources Software, Data, Computer Security Resource Center, and News and Events.
Under Cybersecurity, there is a framework developed to help organisations to better understand and improve their management of cybersecurity risk.
The Cybersecurity framework consists of standards, guidance, and best practices.
It stages of the framework:
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
The cyber security framework help organisations prioritise, become flexible and cost-effective in promoting and dealing with protection and resilience of critical infrastructure and other parts critical to the national security and economy.
For further information and/or questions about the Cybersecurity Framework please contact: cyberframework@nist.gov
Technology Code of Practice
The Technology Code of Practice is a set of criteria to help government design, build and buy technology. Technology Code of Practice should be used for all technology projects and programmes and should be aligned to the mandatory code and as much as possible align the organisation’s technology and business strategies to the Technology Code of Practice.
Following the Technology Code of Practice will help introduce or update technology so that it:
-
meets user needs, based on research with your users
-
is easier to share across government
-
is easy to maintain
-
scales for future use
-
is less dependent on single third-party suppliers
-
provides better value for money
-
makes use of open standards
Organisations must consider all points of the Technology Code of Practice as part of the Cabinet Office spend control process as it’s used as a cross-government agreed standard in the spend controls process. Where legacy technology limits your ability to adhere to the standard, you must explain this to the GDS Standards Assurance team.
Defence Industry Security Notices
Industry Security Notices (ISNs)
A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating to security.
Information from Ministry of Defence, that provides updates.
-
‘ISN 2014/04 Farnborough International Air Show 2014: exhibition clearances’ has been removed
-
‘ISN 2014/01: Government Security Classification Scheme’ updated April 2014
-
‘ISN 2011/05 Defence & Security Equipment International (DSEi) 2011: exhibition clearances’ has been removed
-
‘ISN 2011/02: incident report’ has been superseded by ‘2011/07: incident reporting’
-
‘ISN 2011/03: Nato personnel security clearances’ has been superseded by ‘2014/03: Procedure for UK contractors to obtain Nato personnel security clearances’
Recruitment Guidance - Candidate Management
Ensuring that the right candidates are selected for policing roles is essential. Employing the right selection process is essential to make the most efficient use of money, time and resources and can have the following benefits:
-
Reduce the probability of selecting individuals who will not perform at their jobs effectively.
-
Better value at the national Assessment process
-
Minimises disproportionality in outcomes for underrepresented groups
-
Maximise candidates potential by supporting, them and ensuring a positive candidate experience.
It is known that not all forces handle their recruitment process in the same way in the early process and therefore causes discrepancies in the way people are recruited in the police force. A sifting solution is being undertaken that aims to help effectively mange candidates. Whilst this is still on-going, this document aims to help police forces consider some key principles for an effective end-to-end recruitment process.
Each area should be considered:
-
Recruitment strategy
-
Attraction campaign and positive action
-
Registration
-
Force selection
-
National Assessment Process
-
Post-assessment process activity
-
Appointment
Monitoring of each area and collaborating with other learning providers are critical to the improvement, maximisation and best practise of the selection process.
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data.
Data sanitisation has to do with the safe removal, treatments and disposal of sensitive information from storage media devices to guarantee that retrieval and reconstruction of data is not possible or may be very difficult to reproduce as some forms of sanitisation will allow you to re-use the media, while others are destructive in nature and render the media unusable.
There could be many reasons why an organisation may want to sanitise its data:
-
Re-use purposes – new user device allocation, re-purpose or resell device.
-
Repair purposes - return or repair faulty device
-
Disposal purposes – dispose of device
-
Destruction purposes – destroy information held on device or the device itself.
There are risks associated with improper sanitisation as key data may still remain on the device, such as:
-
Sensitive data may end up with the wrong people who can expose the sensitive data
-
Loss of control over information assets
-
Private or personal data could be leaked and used to commit fraud or identity theft.
-
Intellectual property could be used leading to reputational loss
Whilst this may not be entirely a sanitisation issue, it is part of it and one way to combat these risks is using encryption.
Securing Technology at OFFICIAL
Guidance on how organisations should secure their technology and services to protect UK government information classified as OFFICIAL.
The vast majority of UK government public services are conducted at the Official classification. Business operations and services include information routinely used that can have damaging consequences if lost or stolen.
Security at Official is achieved through following good commercial practices and understanding security needs and matching these requirements to the latest available technology availabilities.
End User Device (EUD) Security Guidance 2
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution.
Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and include security technologies to help protect information and as such this security guidance document is general to all end user devices (EUD) and their deployments to help harness its security capabilities without hindering its functioning ability by ensuring device configuration are set up correctly.
This guidance is to help optimise security functions, allow for greater user responsibility to reduce security complexity, maintaining user experience, logging and audit information and enable greater interoperability of IT systems.
Intelligence Management APP
Intelligence is information collected and gathered for the purpose of taking action. This process is continuous and critical to effective policing operations that allow for tactical options and prioritisation. Such intelligence can sometimes be classified as confidential or sensitive.
A Code of Practice has been issued by the secretary of state to develop a national intelligence model (NIM), which sets out principles and standards for chief officer and police and crime commissioners to adhere. Ensures the results of the standards are systematic for continuous progress and also helps promote compatibility of procedures and terminology for the (NIM) as well as monitor and evaluate the promulgation of good practice.
The code of the practice came into effect in January 2005.
Setup Government Email Services Securely
All public services sending emails out on behalf of government organisations must follow all protocols, processes and guidelines to ensure that they secure their email service. This includes:
-
the service providing users with mailbox access
-
internal relays and gateways
-
email filtering services
-
third party services that send email on your behalf, like transactional email services
Key configurations are needed to ensure you email services run smoothly:
-
Transport Layer Security (TLS)
-
DomainKeys Identified Mail (DKIM)
-
Domain-based Message Authentication, Reporting & Conformance (DMARC)
-
Public Domain Name System (DNS)
-
Ability to make administrative changes
If there are any changes made to your email security, ensure that you communicate such changes to all staff in your organisation.
Securing Government Email
This guidance applies to all email domains that public sector organisations run on the internet. It also helps ensures that public sector organisations exchanges email securely with other public sector organisations. Protecting emails in transit makes it difficult for domains to be spoofed.
All public sector emails must be kept secure by:
-
encrypting and authenticating email in transit by supporting Transport Layer Security (TLS) and Domain-based Message Authentication, Reporting and Conformance (DMARC) as a minimum
-
making sure the recipient protects the data you send to them
-
making email security invisible to end users as far as practically possible
Encryption and authentication only work if both the sender and the recipient use them.
The Government Digital Service recommends protecting email by:
-
forcing TLS when sending to .gov.uk
-
forcing TLS when sending to any other domains that supports it if the local risk profile requires it
-
using extra encryption services if needs be
DomainKeys Identified Mail (DKIM)
DomainKeys Identified Mail (DKIM) verifies an email’s domain and ensures it has not been tampered with in transit. The receiving email service can then filter or reject email that fails the DKIM check. In order for DKIM to verify an emails domain it uses public key encryption to check email by creating a hash using the content of each outbound email. The sending service then encrypts the hash with its private key and adds it to the email header. This is the DKIM signature.
The receiving email service looks up the public key in the sender’s DKIM DNS (DOMAIN NAME SYSTEM) record then uses the public key to decrypt the DKIM signature on the email. It also generates a hash of the email in the same way the sending email service did. If the hash matches the decrypted DKIM signature then the email passes the DKIM check. This means the email came from where it says it came from and has not changed in transit.
Criminal Justice System: Data Standards Forum Guidance
An agreed and designed common data standards are used by the Criminal Justice System, ICT suppliers to support ICT communications between systems used by Criminal Justice Organisations (CJO) to support CJS operations. They are also used with open data standards as defined in the government’s Open Standards Principles. These common standards are also used to support data analytics, bidding for CJS contracts etc.
The selection of the CJS data standards is made by the CJS Data Standards Forum. This is a technical forum which has representatives from the principal CJOs.
There is a Data Standard Catalogue used to support the exchange of criminal justice information between different CJOs.
There are three different types of data standard reflected in the catalogued:
-
formatting standards
-
organisational structure standards
-
reference data standard
The Data Standard catalogue is constantly reviewed by the Data Standards Forum to ensure a set of standards is produced that is as small as possible while still being fit for purpose.
End User Device (EUD) Security Principles (Version 1.0)
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve principles are as follows:
1. Data-in-transit Protection: Data should be protected as it transits from the EUD to any services the EUD uses.
2. Data-at-rest Protection: Data stored on the device should be satisfactorily encrypted when the device is in its “rest” state.
3. Authentication:
- User to device: the user is only granted access to the device after successfully authenticating to the device.
- User to service: The user is only able to access enterprise services after successfully authenticating to the service, via their device.
- Device to service: Only devices which can authenticate to the enterprise are granted access.
4. Secure Boot: An unauthorised entity should not be able to modify the boot process of a device, and any attempt to do so should be detected.
5. Platform Integrity and Application Sandboxing: The device can continue to operate securely despite potential compromise of an application or component within the platform,
6. Application allow Listing: The enterprise can define which applications are able to execute on the device, and these policies are robustly enforced on the device.
7. Malicious code detection and prevention: The device can detect, isolate and defeat malicious code which is present on the device.
8. Security policy enforcement: Security policies set by your organisation are robustly implemented across the platform.
9. External interface protection: The device is able to constrain the set of ports (physical and logical) and services exposed to untrusted networks and devices.
10. Device Update Policy: You are able to issue security updates and can remotely validate the patch level of your entire device estate.
11. Event Collection for Enterprise Analysis: The device reports security-critical events to your audit and monitoring service.
12. Incident Response: Your organisation has a plan in place to respond to and understand the impact of security incidents.
All of these principles must be considered when securing and deploying devices.
End User Device (EUD) Security Guidance
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve principles are as follows:
-
Data-in-transit Protection
-
Data-at-rest Protection
-
Authentication
-
Secure Boot
-
Platform Integrity and Application Sandboxing
-
Application allow Listing
-
Malicious Code Detection and Prevention
-
Security policy Enforcement
-
External Interface Protection
-
Device Update Policy
-
Event Collection for Enterprise Analysis
-
Incident Response
All of these principles must be considered when securing and deploying devices.
Auditing Principles - Directive 2006/43/EC of the European Parliament and of the Council
Statutory auditors should adhere to the highest ethical standards and should be subject to professional ethics. This Directive aims at high-level to bring about harmonisation of statutory audit requirements as a result of lack of a harmonised approach to statutory auditing in the Community. This was the reason why the Commission proposed, in its 1998 Communication on the statutory audit in the European Union that a creation of a Committee on Auditing which could develop further action in close cooperation with the accounting profession and Member States be established.
The output/recommendation from the committee setup was a Recommendation was a set of Fundamental auditing Principles. The statutory audit requires adequate knowledge of matters such as company law, fiscal law and social law for Audit qualifications obtained by statutory auditors. In order to protect third parties, all approved auditors and audit firms should be entered in a register which is accessible to the public and which contains basic information concerning statutory auditors and audit firms.
It is important to note that good audit quality contributes to the orderly functioning of markets by enhancing the integrity and efficiency of financial statements.
Retrieval of Video Evidence and production of working copies from digital CCTV Systems (Version 2.0)
Digital CCTV installations vary greatly in terms of the recording methods as a result of varying solutions with different capabilities and functionality which are used to capture picture and video evidence with export facilities provided.
This document provides guidance on the retrieval of video from any digital CCTV system in its native file format and the methods for the production of working copies in non-native file formats, where this is necessary to facilitate further processing or replay in court.
The document contains a flowchart to help the user select the most appropriate retrieval method to use for any given CCTV system. Explanatory notes are also provided for each option and guidance
given for assessing the practicality and suitability of each technique to ensure that the right retrieval method is selected to uphold evidential integrity.
The guidance also covers the production of working copies, specifically where this involves a conversion between video formats.
Options have also been presented for final storage of the working copy. Information is given as to the suitability of each conversion technique and storage medium, so that appropriate choices can be made to best minimise the potential degradation in image quality.
A checklist of actions is provided when retrieving data to ensure that all relevant information is captured and evidential integrity is maintained.
National Intelligence Model
The National Intelligence Model (NIM) is a well-established model within the policing world that was established in 2000 by the National Criminal Intelligence service (NCIS) and adopted by Association of Chief Police Officers (ACPO) to help to mange the use of setting strategic direction, making prioritised resourcing decisions, intelligently allocating resources in the most efficient manner, developing and outlining tactical plans, coordinating activities and managing associated risks.
NIM has three levels which it operates on:
-
Level 1 – Local/Basic Command Unit (BCU)
-
Level 2 – Force and/or regional
-
Level 3 – Serious and organised crime that is usually national or international
NIM doesn’t just only help to serve crime and intelligence decision-making but is expansive in its dynamics and touches on the general policing business and decision-making. It also serves as a standardised approach for gathering, co coordinating and disseminating intelligence, which can be integrated across all forces and law enforcement agencies.
NIM allows for greater consistency of policing across the UK, operational strategies to focus on key priorities, ensures more officers are focused on solving priority problems and targeting the most active offender, achieves greater compliance with human rights legislation, improves direction and briefing of patrols, helps to reduce rates of persistent offenders through targeting the most prolific and helps to improves integration with partner agencies.
Code of practice for the deployment and use of Body Worn Video (BWV) BS 8593:2017
The use of Body worn video (BWV) includes video and microphone both audio and visual recording. The recording can also be stored and exported.
BWV has become extremely in the video surveillance sector and within the Police Force, as officers are able to use BWV and capture key important evidence whilst on operational duty. However have been some issues around privacy, data security technical capabilities.
To ensure that BWV, is used for its intended purpose this standard has been written to provide operational and technical guidance to help strike a balance between safety and the privacy of the individuals being recorded and foster public trust in where and when BWV can be used.
Some of the activities in which BWV can be used are in emergency responses, night-time economy operations/events, security guarding, parking enforcement, door supervision.
Intended readers are Police officers, security companies, entertainment venues, local authorities.
Fees to accessing the standard may apply.