Feeds

Police National Database will have audit trail

Tabs to be kept

Remote control for virtualized desktops

A code of practice for the forthcoming Police National Database says that an audit trail will be created to tackle abuse.

Chief police officers will be responsible for auditing the activity of their own officers and no user should audit their own activities, says the document, presented to Parliament on 17 March 2010 by the National Policing Improvement Agency (NPIA).

It says that each chief police officer is a data controller and responsible for the personal information held on the system.

Decisions about what information to place on the system, what information to withhold from the system, and what restrictions to apply on access to and use of the information will be taken by chief officers. They will be monitored by HM Inspectors of Constabulary.

To guard against data breaches, the code says that exported information should be anonymised by the removal of information which could be used to identify individuals.

The PND, due to be opened later this year, will for the first time allow forces across England, Wales, Scotland and Northern Ireland to share, access and search existing local intelligence and operational information on a national basis.

It aims to deliver the primary recommendation of Sir Michael Bichard's inquiry into the murders of schoolgirls Holly Wells and Jessica Chapman in Soham in 2002.

The main aims of the code are to ensure that use of the code complies with data protection and human rights legislation, that data is used effectively and that it is not used to discriminate against any particular social group.

As the PND develops, the code will be updated by the NPIA.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.