Feeds

Police National Database will have audit trail

Tabs to be kept

Beginner's guide to SSL certificates

A code of practice for the forthcoming Police National Database says that an audit trail will be created to tackle abuse.

Chief police officers will be responsible for auditing the activity of their own officers and no user should audit their own activities, says the document, presented to Parliament on 17 March 2010 by the National Policing Improvement Agency (NPIA).

It says that each chief police officer is a data controller and responsible for the personal information held on the system.

Decisions about what information to place on the system, what information to withhold from the system, and what restrictions to apply on access to and use of the information will be taken by chief officers. They will be monitored by HM Inspectors of Constabulary.

To guard against data breaches, the code says that exported information should be anonymised by the removal of information which could be used to identify individuals.

The PND, due to be opened later this year, will for the first time allow forces across England, Wales, Scotland and Northern Ireland to share, access and search existing local intelligence and operational information on a national basis.

It aims to deliver the primary recommendation of Sir Michael Bichard's inquiry into the murders of schoolgirls Holly Wells and Jessica Chapman in Soham in 2002.

The main aims of the code are to ensure that use of the code complies with data protection and human rights legislation, that data is used effectively and that it is not used to discriminate against any particular social group.

As the PND develops, the code will be updated by the NPIA.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Intelligent flash storage arrays

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.