FREQUENTLY ASKED QUESTIONS

Size: px
Start display at page:

Download "FREQUENTLY ASKED QUESTIONS"

Transcription

1 Glossary of Terms National Business Crime Solution To share is to participate - To participate is to drive change. FREQUENTLY ASKED QUESTIONS ABCP Association of Business Crime Partnerships ACPO Association of Chief Police Officers BCIB Business Crime Intelligence Bureau GAIN Government Agency Intelligence Network ICO Information Commissioners Office ISA Information Sharing Agreement NBCF National Business Crime Forum NBCS National Business Crime Solution NERCP North East Retail Crime Partnership POC Proof of Concept RIU Regional Intelligence Unit SOCA Serious and Organised Crime Agency NFIB National Fraud Intelligence Bureau W: How many retail member participants are there? To date we have 20 retail participants with a further 5 to finally confirm participation. To date only 9 retailers have contributed data for bulk upload into the solution. However, live investigations are being fed into the National Data Hub through the BCIB on a weekly basis. A number of alerts have already been sent out to participants. Please refer to document: Project outputs to date. Who is responsible for the data within the NBCS POC? ORIS Integrated Ltd - a division of The Cardinal Group are the Data Processors responsible for translating and transferring incidents into the NBCS. The BCIB is responsible for delivering the Managed Service to the participants and will be the Data Owners. For the purposes of the trial the BCIB are acting as the National Data Hub and will be working in conjunction with the NERCP and ABCP to assist in proving the concept of Regional Hubs to deliver support at a local level, improving collaboration to more effectively target level 1 offenders and raise awareness of local issues through a more holistic approach. How is Data Protection compliance assured? Discussions have taken place with the ICO and they are being continuously updated with the details of the POC. They have confirmed that they are happy that ORIS Integrated Ltd are the Data Processors and the BCIB the Data Owners. As such, ISA s will be in place between each participant and the BCIB. The BCIB has a national agreement in place with the RIU s within the UK which provides a formal gateway into the Police. This national agreement has been endorsed by the ACPO Lead for Serious and Organised Crime. In addition to this, there is a framework of contacts

2 with each Force Intelligence Bureau and other units such as robbery squads. Formal relationships also exist with SOCA and the NFIB. The BCIB is also part of the GAIN. How secure is the solution? 128 bit encryption is used for the data provided to us. This high level of encryption ensures that no data can be passed to unauthorised users. The data is stored on secure servers which are housed in UK sites with ISO27001 accreditation. Further details can be made available on request. How do I know that the data is current and reliable? It is the responsibility of the participating retailer to provide information which is as accurate as possible and the responsibility of the BCIB, NERCP and other participating regional crime partnerships to provide verification where possible as and when required. This may be with the assistance of other participant s information or that received by other sources such as the Police. What incidents will be entered into the solution? All incidents reported by retailers will be entered, including suspicious incidents which can prove to be a good source of intelligence. During the evaluation process, the types of incidents submitted will be reviewed. All incidents will be categorised according to the Home Office/Police definitions to ensure conformity so that comparisons, trends, sharing and benchmarking can occur. Who enters the incidents onto the solution? The data is provided by the retailer either directly into the solution via the interface capability or using the bespoke import tool for bulk uploads. What type of reports and documents can the solution automatically produce from the data held? The NBCS will assist us with producing bulletins, galleries and alerts at local and regional level. In addition, each participant will have access to their own dashboard. In the POC this will only show their own data but a key benefit of the proposed solution will be the ability to benchmark data and show clusters across participants in any given region. In addition, value added, evidence based intelligence packages involving prolific, persistent offenders, will be produced by the Intelligence Analysts working within the BCIB in conjunction with regional and national law enforcement agencies. How will alerts be distributed to participants? Alerts will be sent via in the first instance prior to Head Office access being given to the solution. This is anticipated to commence at the end of June. What will the participants be able to access within the solution? Along with the alerts discussed above, participants will be able to use the constellation tool to identify where their incidents are linked to those relating to other participants. They will also have full access to all their own incidents and be able to open these individually or use the following dashboard reports: Breakdown of incidents by Incident Type, Sub-Type and Description

3 Breakdown of incidents by company, region, area and store W: Breakdown of incidents by ACPO region, Police Force, Force Area and Neighbourhood Policing Team Comparison of incidents in relation to other retailers and specific industry segment (e.g. fashion, beauty etc.) All dashboard functionality will be phased in during the POC project life cycle. How is the dashboard solution accessed? Access will be provided via a Secure URL. This will be provided during the solution access training, anticipated to commence at the end of June/early July. What do participants do with information regarding links that they identify? The BCIB analysts will be working to identify links between offences across participants; however, should this be identified by individual participants using the constellation tool. The BCIB should be contacted on or via at intel@bcib.org.uk to report any issues identified. How will BCIB communicate with the members? As the solution develops, it is intended that as many outputs as possible will be distributed via the solution. It is important however, that all participants feel free to communicate with the BCIB directly via telephone or regarding linked offences, investigations and/or specific incidents. What times of day can contact be made? The BCIB office is manned on Monday to Friday 08:00-17:00hrs, but calls and s are monitored outside of these working hours. In what format and manner are photographs uploaded? Photographs can be uploaded in a variety of the most common formats and sizes. No formatting will be required. Photographs can be uploaded in the following file formats:.jpg (aka.jpeg),.bmp,.png. With most image software you will be able to select the format to save or upload the file. Please choose any of the above file formats for best results. If you use different file formats please contact our IT Support team: support@nationalbusinesscrimesolution.com who will advise accordingly. What are the benefits to the members participating in the NBCS? It allows individual participants to report, share and analyse their retail crime and critical incident data. It incorporates the provision of a managed service (through the BCIB) to produce galleries and alerts in addition to identifying individuals and organised crime groups (OCGs) that are offending nationally.

4 The managed service provides a process by which intelligence packages can be created in accordance with the National Intelligence Model, in order to co-ordinate and escalate individuals for prioritisation in the tasking process with the Police Force. Do the police have access to the incidents? Not directly, but the BCIB has a relationship with each RIU and Force so that they can work together to identify offenders across the country and produce evidence based intelligence packages to disrupt and detect criminal networks. How does the BCIB work with participant s investigation teams? The BCIB does not aim to replace investigation teams, but be in a position to help and assist them by providing additional information from sources such as Police and/or other participants. Where a case is being developed by the BCIB, this will be communicated to all affected participants so that they are able to work with the BCIB or retain ownership of the investigation, if better placed to do so. Regular, direct communication between participants and the BCIB is encouraged and welcomed. Who do participants communicate with for different aspects of the trial? Project Manager - Dawn Robinson Implementation, Mobilisation, Retail Account Manager dawn.robinson@nationalbusinesscrimesolution.com General enquiries: info@nationalbusinesscrimesolution.com IT Support: support@nationalbusinesscrimesolution.com Operational enquiries: intel@bcib.org.uk BCIB National Data Hub Operational Delivery, Managed Service Managing Director - Amanda Oliver amanda.oliver@bcib.org.uk or Police Liaison - Colin Davies colin.davies@bcib.org.uk Intelligence Analyst - Paul Szortowski paul.szortowski@bcib.org.uk Retail Intelligence Analyst - Sam Owen sam.owen@bcib.org.uk

5 Regular Communication It is intended that bi-weekly updates will form part of the ongoing communication to participating members. What type of issues will be covered during the evaluation process? The evaluation process is likely to consider the following issues: How can the collection of data from retailers be improved? How can the quality of the incident data be improved? How can the process of producing and disseminating local alerts, bulletins and galleries be improved? How can the identification of national offenders be improved? How can tools and dashboard reports be improved? Automation of Data input Ensuring valuable benchmarking data is provided so that retailers can get realistic assessments of how they should perform in key areas of crime. Enhancing mapping tools How close to real time can we get? What is the sensible balance? How will the NBCS support regional business crime partnerships Building the final business case for NBCS Please feedback any questions, concerns or general enquiries to

Sussex Police Business Crime Strategy

Sussex Police Business Crime Strategy Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential

More information

Our history & where we are going together

Our history & where we are going together Our history & where we are going together Dan Hardy, Managing Director January 2018 Our vision The National Business Crime Solution (NBCS) enables the effective sharing of appropriate data between the

More information

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

NOT PROTECTIVELY MARKED ACPO Migration and Associated Matters Portfolio Operation Eagle Strategic Plan 04/04/2013

NOT PROTECTIVELY MARKED ACPO Migration and Associated Matters Portfolio Operation Eagle Strategic Plan 04/04/2013 The ACPO provides a template for forces nationally to implement procedures to improve the Police response in tackling Organised Immigration Crime (OIC) and Human Trafficking (HT). The aim of implementing

More information

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration

More information

This procedure sets out the usage of mobile CCTV units within Arhag.

This procedure sets out the usage of mobile CCTV units within Arhag. CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Securing Cost Savings for Scottish Police

Securing Cost Savings for Scottish Police Securing Cost Savings for Scottish Police Single communications infrastructure improves inter-force collaboration and supports CESG security standards Executive Summary Customer Name Scottish Police Services

More information

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime Serious Organised Crime Agency Background Established under the Serious Organised Crime and Police Act 2005 NDPB

More information

ATHLETICS WORLD CUP PRIVACY NOTICE

ATHLETICS WORLD CUP PRIVACY NOTICE ATHLETICS WORLD CUP PRIVACY NOTICE This Privacy Notice explains how Athletics World Cup ("AWC") collects, uses and shares the personal information that you provide to us either when using this website

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

LINCOLNSHIRE POLICE CYBER CRIME STRATEGY. Professionalism Respect Integrity Dedication Empathy

LINCOLNSHIRE POLICE CYBER CRIME STRATEGY. Professionalism Respect Integrity Dedication Empathy LINCOLNSHIRE POLICE CYBER CRIME STRATEGY Professionalism Respect Integrity Dedication Empathy CONTENTS Introduction...1 What is Cyber Crime?...2 What are our aims and objectives?...3 Prevent...4 Prepare...5

More information

DATA PROTECTION ACT 1998

DATA PROTECTION ACT 1998 DP7(12/12) DATA PROTECTION ACT 1998 Application for access to your personal data held by Warwickshire Police Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

NOT PROTECTIVELY MARKED NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED NOT PROTECTIVELY MARKED AGENDA ITEM NO: 5 Meeting SPA Authority Meeting Date and Time 21 August 2013 Location Ayr Title of Paper Police Scotland - Domestic Abuse Item Number 5 Presented By Chief Constable / Lesley Bain, Head

More information

For our services, the data controller (the company that s responsible for your privacy), is Rent a Van 365 Limited. Registered address:

For our services, the data controller (the company that s responsible for your privacy), is Rent a Van 365 Limited. Registered address: Web Privacy Policy Rent a Van 365 Ltd is committed to protecting your personal information. This policy aims to help you to understand what information we may collect about you and how we use it. We are

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY

Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

Service Improvement Review of Guarding:

Service Improvement Review of Guarding: Appendix 1 Service Improvement Review of Guarding: Management Summary August 2005 Not Protectively Marked Protective Marking Not Protectively Marked Publication Scheme Y/N Title N SIR - PO4/251b Version

More information

Stopsley Community Primary School. Data Breach Policy

Stopsley Community Primary School. Data Breach Policy Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk

More information

TransLink Video Surveillance & Audio Recording Privacy Statement

TransLink Video Surveillance & Audio Recording Privacy Statement TransLink Video Surveillance & Audio Recording Privacy Statement Last Update: August 4, 2015 Previous version: July 22, 2008 TransLink is committed to achieving a balance between an individual s right

More information

National Business Crime Partnership Association

National Business Crime Partnership Association National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one

More information

Staff and Recruitment Privacy Notice Your personal information

Staff and Recruitment Privacy Notice Your personal information Staff and Recruitment Privacy Notice Your personal information The University of Lincoln Students Union collects personal information about you when you submit a recruitment application and during your

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan

Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Human Trafficking & Modern Day Slavery Northumbria Police Action Plan Prepare Reduce the harm caused by Modern Slavery, improved victim confidence and enhanced support Improve Force cohesion Development

More information

Guernsey Police Business Plan

Guernsey Police Business Plan Guernsey Police Business Plan 2013 2016 Contents 1. Introduction 2. Our Vision & Values 3. Achievements for the period 2011-12 4. Priorities for the period 2013-16 Appendices Appendix A Force structure

More information

Sacramento Regional Crime Analysis Program

Sacramento Regional Crime Analysis Program Sacramento Regional Crime Analysis Program Progress Report 2017 Ruth M. Padilla Regional Crime Analyst Embedded at Sacramento Police Department Introduction The Community Corrections Partnership (CCP)

More information

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES

INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DISASTER RECOVERY POLICY AND PROCEDURES Document Control Panel File Reference Number File Name Owner Approver ICT Disaster Recovery-PP-01 ICT Disaster Recovery

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Information you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for:

Information you give us when you sign up to the World Merit Hub. In addition, when you sign up to the World Merit Hub, we will usually ask for: World Merit Website Privacy Policy Last updated: 17th July 2018 Introduction World Merit ( we, our, us ) are committed to protecting and respecting your privacy. We are a Charity established in England

More information

Co-operation against cybercrime CSIRTs LE private sector

Co-operation against cybercrime CSIRTs LE private sector Co-operation against cybercrime CSIRTs LE private sector Octopus Interface 2010 Kauto Huopio Sr. Infosec Advisor Finnish Communications Regulatory Authority CERT-FI Finnish national CSIRT authority { National

More information

National Policing Community Security Policy

National Policing Community Security Policy Document Name File Name National Policing Community Security Policy Community_Security_Policy_FINAL v4_3.doc Authorisation Information Management Business Area Signed version held by National Police Information

More information

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version

Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations

More information

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

Mystery Shopping BBC Trust Conclusions

Mystery Shopping BBC Trust Conclusions Mystery Shopping BBC Trust Conclusions February 2014 Getting the best out of the BBC for licence fee payers Contents Mystery Shopping / BBC Trust Conclusions Introduction 1 Mystery Shopping Research 1

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

DATA PROTECTION & PRIVACY POLICY

DATA PROTECTION & PRIVACY POLICY East Midlands Central Station (EMCS) Limited (hereinafter known as the Company) is committed to protecting and respecting your privacy. This Policy has been written in for compliance with the General Data

More information

NORTH YORKSHIRE POLICE

NORTH YORKSHIRE POLICE NORTH YORKSHIRE POLICE Data Protection Act 2018 & General Data Protection Regulation These notes explain how you can find out what information, if any, is held about you on Police Computers. Your Rights

More information

Privacy Policy Statement Last update 25 th May 2018.

Privacy Policy Statement Last update 25 th May 2018. Privacy Policy Statement Last update 25 th May 2018. Introduction We want our customers to receive a prompt, efficient and courteous service that is delivered in a positive and transparent manner. The

More information

2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison

2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison 2CENTRE A collaborative model for capacity building against cybercrime Cormac Callanan 2CENTRE Industry Liaison cormac.callanan@2centre.eu What is 2CENTRE? An embryonic network of National Cybercrime Centres

More information

Louisiana - State Analytical & Fusion Exchange (LA-SAFE)

Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,

More information

Contents. International collaboration and networking. 1. Example 2. Formal networks 3. Informal networks

Contents. International collaboration and networking. 1. Example 2. Formal networks 3. Informal networks International collaboration and networking Name E-waste training workshop Date, Location, Country Contents 1. Example 2. Formal networks 3. Informal networks 2 1 Case: Mixture of expired chemicals 29 containers

More information

PORTICO PRIVACY NOTICE

PORTICO PRIVACY NOTICE PORTICO PRIVACY NOTICE Portico is committed to protecting and respecting your privacy. We take your privacy very seriously and we ask that you read this Privacy Notice carefully as it contains important

More information

A quick guide to getting the most from your Idox Information Service membership

A quick guide to getting the most from your Idox Information Service membership A quick guide to getting the most from your Idox Information Service membership The Idox Information Service The Idox Information Service is the most complete and accessible source of public sector knowledge

More information

Automatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development

Automatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft

More information

Policy. Business Resilience MB2010.P.119

Policy. Business Resilience MB2010.P.119 MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

CCTV Privacy Impact Assessment

CCTV Privacy Impact Assessment CCTV Privacy Impact Assessment Camera No. DW_84 Date of Review: April 2019 Camera No.: DW_84 County: Powys Town: Welshpool Location: On the junction of Church Street and Severn Street Primary View Purpose:

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

GENERAL PRIVACY POLICY

GENERAL PRIVACY POLICY GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy

More information

DATA PROTECTION ACT 2018 RIGHT OF ACCESS SUBJECT ACCESS REQUEST FORM

DATA PROTECTION ACT 2018 RIGHT OF ACCESS SUBJECT ACCESS REQUEST FORM DATA PROTECTION ACT 2018 RIGHT OF ACCESS SUBJECT ACCESS REQUEST FORM This form is not mandatory however, it captures information that will assist us in processing and locating information to provide you

More information

EMR Company Registration and User Management

EMR Company Registration and User Management EMR Company Registration and User Management Guidance document for EMR participants User Support Guide for EMR Company Registration and User Management 24 th January 2017 National Grid Electricity Transmission

More information

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006 New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director

More information

Police & Crime Commissioner Performance Monitoring Group. 18th December 2015 OPEN AGENDA

Police & Crime Commissioner Performance Monitoring Group. 18th December 2015 OPEN AGENDA Police & Crime Commissioner Performance Monitoring Group 18th December 2015 OPEN AGENDA 1 3. HMIC Programme of Work 2 HMIC and Joint Inspection Activity Reports Recently Received: Targeting the Risk :

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

PANORAMA Data Security & Access Protocol

PANORAMA Data Security & Access Protocol PANORAMA Data Security & Access Protocol ALL DATA Security Any data provided to the PANORAMA Data Management Facility by external data guardians will be stored securely on the Flinders Medical Centre Y

More information

The Metropolitan Police Service Approach to Corporate Resiliency

The Metropolitan Police Service Approach to Corporate Resiliency The Metropolitan Police Service Approach to Corporate Resiliency Chief Inspector Tim Marjason Metropolitan Police Service Emergency Preparedness OCU CO3 - Central Operations New Scotland Yard, London Central

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

Adopter s Site Support Guide

Adopter s Site Support Guide Adopter s Site Support Guide Provincial Client Registry Services Version: 1.0 Copyright Notice Copyright 2016, ehealth Ontario All rights reserved No part of this document may be reproduced in any form,

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 Page 1 of 5 PURPOSE OF THE ALERT The information contained within this alert is based on the reports received by Action Fraud and the National Fraud

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice 1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN

GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN 1st July 2019 to 30 June 2020 1. ADMINISTRATIVE ACTION STEPS RESPONSIBLE DURATION IN MONTHS ACTION 1. Appointment of staff CEO / CID Board / Chairman

More information

Operational Services Procurement. Vendor Engagement Event 28 th March 2018

Operational Services Procurement. Vendor Engagement Event 28 th March 2018 Operational Services Procurement Vendor Engagement Event 28 th March 2018 Agenda Introductions from the Chair Alt HAN Company Technology Services Update Operational Services Procurement Process Scope and

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website

More information

Policing our Roads Together

Policing our Roads Together Policing our Roads Together A 3 year strategy 2018 2021 Our Vision Policing Together for, Secure and Efficient roads Our Objectives Working together to achieve: roads, free from harm Secure roads free

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Last updated: 25 May 2018

Last updated: 25 May 2018 Privacy Policy Last updated: 25 May 2018 1. Introduction 1.1 St Saviour s Church ( we, our, us ) is committed to protecting and respecting your privacy. St Saviour s Church is a registered charity, and

More information

Application for access to your personal data held by the City of London Police (CoLP)

Application for access to your personal data held by the City of London Police (CoLP) Application for access to your personal data held by the City of London Police (CoLP) Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your Subject Access Rights

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

FEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy

FEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

DATA PROTECTION ACT 2018 SUBJECT ACCESS APPLICATION

DATA PROTECTION ACT 2018 SUBJECT ACCESS APPLICATION DATA PROTECTION ACT 2018 SUBJECT ACCESS APPLICATION Please read the following information carefully before completing the application This guidance is for the use and completion of applications for information

More information

PRINCIPLES AND FUNCTIONAL REQUIREMENTS

PRINCIPLES AND FUNCTIONAL REQUIREMENTS INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

To be an active partner, always ready to improve by working with others

To be an active partner, always ready to improve by working with others Title of Report: Prepared By: Sponsor: Action Required: Statement of Assurance/Readiness Preparedness to Major Incidents Ben Cockerill, Emergency Planning Officer Kevin O Leary, Deputy Director of Operations

More information

DLB Privacy Policy. Why we require your information

DLB Privacy Policy. Why we require your information At Etive Technologies Limited (Etive) which operates Digital Log Book, (DLB). We are committed to protecting the privacy of our customers and the responsible management of personal information in accordance

More information