FREQUENTLY ASKED QUESTIONS
|
|
- Joella Lee
- 6 years ago
- Views:
Transcription
1 Glossary of Terms National Business Crime Solution To share is to participate - To participate is to drive change. FREQUENTLY ASKED QUESTIONS ABCP Association of Business Crime Partnerships ACPO Association of Chief Police Officers BCIB Business Crime Intelligence Bureau GAIN Government Agency Intelligence Network ICO Information Commissioners Office ISA Information Sharing Agreement NBCF National Business Crime Forum NBCS National Business Crime Solution NERCP North East Retail Crime Partnership POC Proof of Concept RIU Regional Intelligence Unit SOCA Serious and Organised Crime Agency NFIB National Fraud Intelligence Bureau W: How many retail member participants are there? To date we have 20 retail participants with a further 5 to finally confirm participation. To date only 9 retailers have contributed data for bulk upload into the solution. However, live investigations are being fed into the National Data Hub through the BCIB on a weekly basis. A number of alerts have already been sent out to participants. Please refer to document: Project outputs to date. Who is responsible for the data within the NBCS POC? ORIS Integrated Ltd - a division of The Cardinal Group are the Data Processors responsible for translating and transferring incidents into the NBCS. The BCIB is responsible for delivering the Managed Service to the participants and will be the Data Owners. For the purposes of the trial the BCIB are acting as the National Data Hub and will be working in conjunction with the NERCP and ABCP to assist in proving the concept of Regional Hubs to deliver support at a local level, improving collaboration to more effectively target level 1 offenders and raise awareness of local issues through a more holistic approach. How is Data Protection compliance assured? Discussions have taken place with the ICO and they are being continuously updated with the details of the POC. They have confirmed that they are happy that ORIS Integrated Ltd are the Data Processors and the BCIB the Data Owners. As such, ISA s will be in place between each participant and the BCIB. The BCIB has a national agreement in place with the RIU s within the UK which provides a formal gateway into the Police. This national agreement has been endorsed by the ACPO Lead for Serious and Organised Crime. In addition to this, there is a framework of contacts
2 with each Force Intelligence Bureau and other units such as robbery squads. Formal relationships also exist with SOCA and the NFIB. The BCIB is also part of the GAIN. How secure is the solution? 128 bit encryption is used for the data provided to us. This high level of encryption ensures that no data can be passed to unauthorised users. The data is stored on secure servers which are housed in UK sites with ISO27001 accreditation. Further details can be made available on request. How do I know that the data is current and reliable? It is the responsibility of the participating retailer to provide information which is as accurate as possible and the responsibility of the BCIB, NERCP and other participating regional crime partnerships to provide verification where possible as and when required. This may be with the assistance of other participant s information or that received by other sources such as the Police. What incidents will be entered into the solution? All incidents reported by retailers will be entered, including suspicious incidents which can prove to be a good source of intelligence. During the evaluation process, the types of incidents submitted will be reviewed. All incidents will be categorised according to the Home Office/Police definitions to ensure conformity so that comparisons, trends, sharing and benchmarking can occur. Who enters the incidents onto the solution? The data is provided by the retailer either directly into the solution via the interface capability or using the bespoke import tool for bulk uploads. What type of reports and documents can the solution automatically produce from the data held? The NBCS will assist us with producing bulletins, galleries and alerts at local and regional level. In addition, each participant will have access to their own dashboard. In the POC this will only show their own data but a key benefit of the proposed solution will be the ability to benchmark data and show clusters across participants in any given region. In addition, value added, evidence based intelligence packages involving prolific, persistent offenders, will be produced by the Intelligence Analysts working within the BCIB in conjunction with regional and national law enforcement agencies. How will alerts be distributed to participants? Alerts will be sent via in the first instance prior to Head Office access being given to the solution. This is anticipated to commence at the end of June. What will the participants be able to access within the solution? Along with the alerts discussed above, participants will be able to use the constellation tool to identify where their incidents are linked to those relating to other participants. They will also have full access to all their own incidents and be able to open these individually or use the following dashboard reports: Breakdown of incidents by Incident Type, Sub-Type and Description
3 Breakdown of incidents by company, region, area and store W: Breakdown of incidents by ACPO region, Police Force, Force Area and Neighbourhood Policing Team Comparison of incidents in relation to other retailers and specific industry segment (e.g. fashion, beauty etc.) All dashboard functionality will be phased in during the POC project life cycle. How is the dashboard solution accessed? Access will be provided via a Secure URL. This will be provided during the solution access training, anticipated to commence at the end of June/early July. What do participants do with information regarding links that they identify? The BCIB analysts will be working to identify links between offences across participants; however, should this be identified by individual participants using the constellation tool. The BCIB should be contacted on or via at intel@bcib.org.uk to report any issues identified. How will BCIB communicate with the members? As the solution develops, it is intended that as many outputs as possible will be distributed via the solution. It is important however, that all participants feel free to communicate with the BCIB directly via telephone or regarding linked offences, investigations and/or specific incidents. What times of day can contact be made? The BCIB office is manned on Monday to Friday 08:00-17:00hrs, but calls and s are monitored outside of these working hours. In what format and manner are photographs uploaded? Photographs can be uploaded in a variety of the most common formats and sizes. No formatting will be required. Photographs can be uploaded in the following file formats:.jpg (aka.jpeg),.bmp,.png. With most image software you will be able to select the format to save or upload the file. Please choose any of the above file formats for best results. If you use different file formats please contact our IT Support team: support@nationalbusinesscrimesolution.com who will advise accordingly. What are the benefits to the members participating in the NBCS? It allows individual participants to report, share and analyse their retail crime and critical incident data. It incorporates the provision of a managed service (through the BCIB) to produce galleries and alerts in addition to identifying individuals and organised crime groups (OCGs) that are offending nationally.
4 The managed service provides a process by which intelligence packages can be created in accordance with the National Intelligence Model, in order to co-ordinate and escalate individuals for prioritisation in the tasking process with the Police Force. Do the police have access to the incidents? Not directly, but the BCIB has a relationship with each RIU and Force so that they can work together to identify offenders across the country and produce evidence based intelligence packages to disrupt and detect criminal networks. How does the BCIB work with participant s investigation teams? The BCIB does not aim to replace investigation teams, but be in a position to help and assist them by providing additional information from sources such as Police and/or other participants. Where a case is being developed by the BCIB, this will be communicated to all affected participants so that they are able to work with the BCIB or retain ownership of the investigation, if better placed to do so. Regular, direct communication between participants and the BCIB is encouraged and welcomed. Who do participants communicate with for different aspects of the trial? Project Manager - Dawn Robinson Implementation, Mobilisation, Retail Account Manager dawn.robinson@nationalbusinesscrimesolution.com General enquiries: info@nationalbusinesscrimesolution.com IT Support: support@nationalbusinesscrimesolution.com Operational enquiries: intel@bcib.org.uk BCIB National Data Hub Operational Delivery, Managed Service Managing Director - Amanda Oliver amanda.oliver@bcib.org.uk or Police Liaison - Colin Davies colin.davies@bcib.org.uk Intelligence Analyst - Paul Szortowski paul.szortowski@bcib.org.uk Retail Intelligence Analyst - Sam Owen sam.owen@bcib.org.uk
5 Regular Communication It is intended that bi-weekly updates will form part of the ongoing communication to participating members. What type of issues will be covered during the evaluation process? The evaluation process is likely to consider the following issues: How can the collection of data from retailers be improved? How can the quality of the incident data be improved? How can the process of producing and disseminating local alerts, bulletins and galleries be improved? How can the identification of national offenders be improved? How can tools and dashboard reports be improved? Automation of Data input Ensuring valuable benchmarking data is provided so that retailers can get realistic assessments of how they should perform in key areas of crime. Enhancing mapping tools How close to real time can we get? What is the sensible balance? How will the NBCS support regional business crime partnerships Building the final business case for NBCS Please feedback any questions, concerns or general enquiries to
Sussex Police Business Crime Strategy
Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential
More informationOur history & where we are going together
Our history & where we are going together Dan Hardy, Managing Director January 2018 Our vision The National Business Crime Solution (NBCS) enables the effective sharing of appropriate data between the
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationPasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:
CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationNOT PROTECTIVELY MARKED ACPO Migration and Associated Matters Portfolio Operation Eagle Strategic Plan 04/04/2013
The ACPO provides a template for forces nationally to implement procedures to improve the Police response in tackling Organised Immigration Crime (OIC) and Human Trafficking (HT). The aim of implementing
More informationBlue Alligator Company Privacy Notice (Last updated 21 May 2018)
Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationSecuring Cost Savings for Scottish Police
Securing Cost Savings for Scottish Police Single communications infrastructure improves inter-force collaboration and supports CESG security standards Executive Summary Customer Name Scottish Police Services
More informationSerious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime
Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Background Established under the Serious Organised Crime and Police Act 2005 NDPB
More informationATHLETICS WORLD CUP PRIVACY NOTICE
ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationG8 Lyon-Roma Group High Tech Crime Subgroup
G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies
More informationLINCOLNSHIRE POLICE CYBER CRIME STRATEGY. Professionalism Respect Integrity Dedication Empathy
LINCOLNSHIRE POLICE CYBER CRIME STRATEGY Professionalism Respect Integrity Dedication Empathy CONTENTS Introduction...1 What is Cyber Crime?...2 What are our aims and objectives?...3 Prevent...4 Prepare...5
More informationDATA PROTECTION ACT 1998
DP7(12/12) DATA PROTECTION ACT 1998 Application for access to your personal data held by Warwickshire Police Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationNOT PROTECTIVELY MARKED NOT PROTECTIVELY MARKED
AGENDA ITEM NO: 5 Meeting SPA Authority Meeting Date and Time 21 August 2013 Location Ayr Title of Paper Police Scotland - Domestic Abuse Item Number 5 Presented By Chief Constable / Lesley Bain, Head
More informationFor our services, the data controller (the company that s responsible for your privacy), is Rent a Van 365 Limited. Registered address:
Web Privacy Policy Rent a Van 365 Ltd is committed to protecting your personal information. This policy aims to help you to understand what information we may collect about you and how we use it. We are
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationSheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY
Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018
ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:
More informationService Improvement Review of Guarding:
Appendix 1 Service Improvement Review of Guarding: Management Summary August 2005 Not Protectively Marked Protective Marking Not Protectively Marked Publication Scheme Y/N Title N SIR - PO4/251b Version
More informationStopsley Community Primary School. Data Breach Policy
Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk
More informationTransLink Video Surveillance & Audio Recording Privacy Statement
TransLink Video Surveillance & Audio Recording Privacy Statement Last Update: August 4, 2015 Previous version: July 22, 2008 TransLink is committed to achieving a balance between an individual s right
More informationNational Business Crime Partnership Association
National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one
More informationStaff and Recruitment Privacy Notice Your personal information
Staff and Recruitment Privacy Notice Your personal information The University of Lincoln Students Union collects personal information about you when you submit a recruitment application and during your
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More informationHuman Trafficking & Modern Day Slavery Northumbria Police Action Plan
Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development
More informationGuernsey Police Business Plan
Guernsey Police Business Plan 2013 2016 Contents 1. Introduction 2. Our Vision & Values 3. Achievements for the period 2011-12 4. Priorities for the period 2013-16 Appendices Appendix A Force structure
More informationSacramento Regional Crime Analysis Program
Sacramento Regional Crime Analysis Program Progress Report 2017 Ruth M. Padilla Regional Crime Analyst Embedded at Sacramento Police Department Introduction The Community Corrections Partnership (CCP)
More informationTRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate
TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationINFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES
INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES Document Control Panel File Reference Number File Name Owner Approver ICT Disaster Recovery-PP-01 ICT Disaster Recovery
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationInformation you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for:
World Merit Website Privacy Policy Last updated: 17th July 2018 Introduction World Merit ( we, our, us ) are committed to protecting and respecting your privacy. We are a Charity established in England
More informationCo-operation against cybercrime CSIRTs LE private sector
Co-operation against cybercrime CSIRTs LE private sector Octopus Interface 2010 Kauto Huopio Sr. Infosec Advisor Finnish Communications Regulatory Authority CERT-FI Finnish national CSIRT authority { National
More informationNational Policing Community Security Policy
Document Name File Name National Policing Community Security Policy Community_Security_Policy_FINAL v4_3.doc Authorisation Information Management Business Area Signed version held by National Police Information
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationProject Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH
PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationInformation Security Incident
Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body
More informationMystery Shopping BBC Trust Conclusions
Mystery Shopping BBC Trust Conclusions February 2014 Getting the best out of the BBC for licence fee payers Contents Mystery Shopping / BBC Trust Conclusions Introduction 1 Mystery Shopping Research 1
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationDATA PROTECTION & PRIVACY POLICY
East Midlands Central Station (EMCS) Limited (hereinafter known as the Company) is committed to protecting and respecting your privacy. This Policy has been written in for compliance with the General Data
More informationNORTH YORKSHIRE POLICE
NORTH YORKSHIRE POLICE Data Protection Act 2018 & General Data Protection Regulation These notes explain how you can find out what information, if any, is held about you on Police Computers. Your Rights
More informationPrivacy Policy Statement Last update 25 th May 2018.
Privacy Policy Statement Last update 25 th May 2018. Introduction We want our customers to receive a prompt, efficient and courteous service that is delivered in a positive and transparent manner. The
More information2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison
2CENTRE A collaborative model for capacity building against cybercrime Cormac Callanan 2CENTRE Industry Liaison cormac.callanan@2centre.eu What is 2CENTRE? An embryonic network of National Cybercrime Centres
More informationLouisiana - State Analytical & Fusion Exchange (LA-SAFE)
Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,
More informationContents. International collaboration and networking. 1. Example 2. Formal networks 3. Informal networks
International collaboration and networking Name E-waste training workshop Date, Location, Country Contents 1. Example 2. Formal networks 3. Informal networks 2 1 Case: Mixture of expired chemicals 29 containers
More informationPORTICO PRIVACY NOTICE
PORTICO PRIVACY NOTICE Portico is committed to protecting and respecting your privacy. We take your privacy very seriously and we ask that you read this Privacy Notice carefully as it contains important
More informationA quick guide to getting the most from your Idox Information Service membership
A quick guide to getting the most from your Idox Information Service membership The Idox Information Service The Idox Information Service is the most complete and accessible source of public sector knowledge
More informationAutomatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development
Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft
More informationPolicy. Business Resilience MB2010.P.119
MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationCCTV Privacy Impact Assessment
CCTV Privacy Impact Assessment Camera No. DW_84 Date of Review: April 2019 Camera No.: DW_84 County: Powys Town: Welshpool Location: On the junction of Church Street and Severn Street Primary View Purpose:
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy
More informationDATA PROTECTION ACT 2018 RIGHT OF ACCESS SUBJECT ACCESS REQUEST FORM
DATA PROTECTION ACT 2018 RIGHT OF ACCESS SUBJECT ACCESS REQUEST FORM This form is not mandatory however, it captures information that will assist us in processing and locating information to provide you
More informationEMR Company Registration and User Management
EMR Company Registration and User Management Guidance document for EMR participants User Support Guide for EMR Company Registration and User Management 24 th January 2017 National Grid Electricity Transmission
More informationNew York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006
New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director
More informationPolice & Crime Commissioner Performance Monitoring Group. 18th December 2015 OPEN AGENDA
Police & Crime Commissioner Performance Monitoring Group 18th December 2015 OPEN AGENDA 1 3. HMIC Programme of Work 2 HMIC and Joint Inspection Activity Reports Recently Received: Targeting the Risk :
More informationPathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke
Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of
More informationPrivacy notice. Last updated: 25 May 2018
Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information
More informationPANORAMA Data Security & Access Protocol
PANORAMA Data Security & Access Protocol ALL DATA Security Any data provided to the PANORAMA Data Management Facility by external data guardians will be stored securely on the Flinders Medical Centre Y
More informationThe Metropolitan Police Service Approach to Corporate Resiliency
The Metropolitan Police Service Approach to Corporate Resiliency Chief Inspector Tim Marjason Metropolitan Police Service Emergency Preparedness OCU CO3 - Central Operations New Scotland Yard, London Central
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationAdopter s Site Support Guide
Adopter s Site Support Guide Provincial Client Registry Services Version: 1.0 Copyright Notice Copyright 2016, ehealth Ontario All rights reserved No part of this document may be reproduced in any form,
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationPHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016
PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 Page 1 of 5 PURPOSE OF THE ALERT The information contained within this alert is based on the reports received by Action Fraud and the National Fraud
More informationCyber Intel within European Cybercrime Center Ops
@EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3
More information1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice
1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationGREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN
GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN 1st July 2019 to 30 June 2020 1. ADMINISTRATIVE ACTION STEPS RESPONSIBLE DURATION IN MONTHS ACTION 1. Appointment of staff CEO / CID Board / Chairman
More informationOperational Services Procurement. Vendor Engagement Event 28 th March 2018
Operational Services Procurement Vendor Engagement Event 28 th March 2018 Agenda Introductions from the Chair Alt HAN Company Technology Services Update Operational Services Procurement Process Scope and
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationMBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).
MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website
More informationPolicing our Roads Together
Policing our Roads Together A 3 year strategy 2018 2021 Our Vision Policing Together for, Secure and Efficient roads Our Objectives Working together to achieve: roads, free from harm Secure roads free
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationLast updated: 25 May 2018
Privacy Policy Last updated: 25 May 2018 1. Introduction 1.1 St Saviour s Church ( we, our, us ) is committed to protecting and respecting your privacy. St Saviour s Church is a registered charity, and
More informationApplication for access to your personal data held by the City of London Police (CoLP)
Application for access to your personal data held by the City of London Police (CoLP) Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your Subject Access Rights
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationCURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk
CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationGDPR Compliance. Clauses
1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The
More informationFEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy
R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationDATA PROTECTION ACT 2018 SUBJECT ACCESS APPLICATION
DATA PROTECTION ACT 2018 SUBJECT ACCESS APPLICATION Please read the following information carefully before completing the application This guidance is for the use and completion of applications for information
More informationPRINCIPLES AND FUNCTIONAL REQUIREMENTS
INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationTo be an active partner, always ready to improve by working with others
Title of Report: Prepared By: Sponsor: Action Required: Statement of Assurance/Readiness Preparedness to Major Incidents Ben Cockerill, Emergency Planning Officer Kevin O Leary, Deputy Director of Operations
More informationDLB Privacy Policy. Why we require your information
At Etive Technologies Limited (Etive) which operates Digital Log Book, (DLB). We are committed to protecting the privacy of our customers and the responsible management of personal information in accordance
More information