Feeds

Spending cuts force police IT merger

Five forces to share services

The Power of One Brief: Top reasons to choose HP BladeSystem

Cash-strapped police in the East Midlands will merge IT services in an effort to protect front line spending.

Five forces - Derbyshire, Leicestershire, Lincolnshire, Nottinghamshire, and Northamptonshire - have agreed to work together to see what savings can be made.

Each force currently runs its own staff administration system, for example.

A spokeswoman for the East Midlands Police Collaboration Programme, which is overseeing the project, said it was at an early stage and that no decisions had been taken on how radical the reforms will be or how many jobs will be lost. The region is likely to be among the first to take such a step however, she said.

Deputy Chief Constable Peter Goodman, of Derbyshire Polce, said: "The economic climate is changing considerably which means how we operate as a police service will be significantly affected.

"Whilst there are efficiencies to be made within forces, these probably will not be enough to bridge the gap so all available options need to be considered."

The work is being led by Dean Elliott, Head of Information Services at Nottinghamshire Police, sources said.

"The five East Midlands forces have commissioned research regarding the creation of a collaborative Information Communication Technology (ICT) function," a statement from the five forces said.

"The Heads of ICT in the region are leading the work under the direction of an ACPO rank Senior Responsible Officer. The project will initially look at developing a shared and common infrastructure with a longer term view to the integration of services."

The coalition's Spending Review last month announced cuts of four per cent per year for four years in central government police funding.

A merger scheme drawn up under the previous government, which significantly cut the number of police forces nationally, and merged front line operations as well as back office functions, was scrapped in 2006 amid fears over the potential initial costs. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
Adam Afriyie MP: Smart meters are NOT so smart
Mega-costly gas 'n' 'leccy totting-up tech not worth it - Tory MP
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.