I/CAD TAGGING GUIDANCE
|
|
- Chad Cross
- 5 years ago
- Views:
Transcription
1 I/CAD TAGGING GUIDANCE Document Type: Guidance v1.3 Parent Policy: I/CAD Policy Document Owner: Head of JCC Department: OSS Document Writer: I/CAD Admin Effective Date: 05/04/2017 Review Date: 05/04/2019 Contents 1. Introduction 2. NSIR Tags 3. Local Tags 4. Tag Creation 5. Event Tagging Responsibility Appendix A NSIR Appendix B Local Tags Description 140/2.0 Page 1 of 8
2 1. Introduction 1.1. This document has been created to provide strict guidance on the use of the Intergraph Computer Assisted Dispatch (ICAD) system event tags during the resulting and closing of incidents ICAD is a command and control system used for recording events reported by members of the public and members of staff for North Wales Police Before ICAD events are closed they are assigned a result code, and this shows what was being reported In addition to result codes, qualifiers, locally known as tags, can be added to an event. Tags add value to a result code, and can assist in searching for, and providing statistics on information that would not otherwise be available with routine search tools There are two main categories of tagging, namely National Standards of Incident Recording (NSIR) and Local. These are described in section 2 and 3 below When a tag is added to an event it will also be stamped in the event chronology. 2. NSIR Tags 2.1. Guidance covering the use of NSIR tags can be found in the 2011 NSIR manual, the link to which can be found at appendix A NSIR tags are used in the preparation of Annual Data Returns (ADR) by North Wales Police. 3. Local Tags 3.1. Local tags are used by various departments throughout North Wales Police to quickly identify events of interest to them, and in the preparation of local statistics Local tags will only be created and added to ICAD following the submission of a Request for Change (RFC) form to ICAD Admin, consultation with the Force Crime and Incident Registrar, and subsequent authorisation by the Data Quality Board Every RFC for the addition of new tags must be accompanied by guidance on when and where the tag is to be used. 140/2.0 Page 2 of 8
3 3.4. If current tags are to be deleted, an RFC must be submitted requesting the same A list of current local tags along with guidance on when and where to use the tags can be found at appendix B 4. Tag Creation 4.1. Tags are created and maintained by the ICAD Administrators using the Computer Aided Dispatch Database Management (CADDBM) application New tags will be created or removed on ICAD by the ICAD Administrators following a successfully submitted RFC 4.3. Whenever new tags, either NSIR or Local are added or removed, then the information at appendix A or B will be updated by ICAD Admin, and notification circulated to users that have a responsibility for resulting and closing events as described in section Event Tagging Responsibility 5.1. Adding tags is done during the resulting or closing stage of an ICAD Event using the I/Dispatcher or I/Netdispatcher applications Users with supervisor level of access on the I/Dispatcher application can result, tag and close and ICAD event in one command Users with I/Netdispatcher access can result, tag and close and ICAD event Result Codes can be added by users with ICAD dispatcher or call taker access levels It is the responsibility of the user closing an event to check that all relevant tags have been selected in accordance with the guidance in appendix A or B 140/2.0 Page 3 of 8
4 Appendix A For guidance on when events should be tagged with an NSIR tag please refer to the National Standards of Incident Recording manual which can be found at the following location /count-nsir11.pdf 140/2.0 Page 4 of 8
5 Appendix B Local Tags Descriptions Tags used solely within North Wales Police should be marked in the circumstances as shown below. Action Fraud This tag is to be used when a member of the public contacts NWP to report a fraud, which after assessment is referred directly to Action Fraud rather than dealt with as a call for service by North Wales Police. Adverse Incident Used by control room staff only, to mark events as being a risk with regards to Ambulance non-attendance. ANPR ANPR- Any Events created following Alarm activations, where potentially the submission of a CID 56 Intelligence Report is required (only to be used by i24 staff) CBRN All events that involve the identification of a Chemical, Biological, Radiological or Nuclear threat. This can involve the presence of precursory materials and does not need to be a full CBRN incident. Examples are chemical suicides, presence of suspected dangerous materials etc. CID All events where staff resourced to them specifically request that CID is informed of the event details must be tagged with CID. Criminal Intel All events that contain any form of intelligence, and where no resources have been dispatched that could potentially submit a CID56 Intelligence Report. Drone This will be applied to all requests to deploy police drone whether actually deployed or not; public complaints or challenges about drones, whether police flown or public flown, or any related incidents where drones are an issue or required to be advised upon Declined To Assist This Tag is to be utilised when police decide that it is not appropriate for them to attend, that it is better that another, more appropriate agency attends. It is required to enable an accurate picture of the true demand placed on the police service. Fire 140/2.0 Page 5 of 8
6 All events involving circumstances of fire non-criminal must be tagged i.e. Does not amount to a crime and exported to RMS. Fire Service Attended All events where a North Wales Fire and Rescue Service (NWFRS) appliance attended at the event along with a North Wales Police Resource. MIT This tag will be added when a specific request is made that an event is brought to the attention of the Major Incident Team (MIT) or auto-tagged when any of the following result codes are used at closure: Abduction Attempted Murder Child Abduction Social Welfare Kidnap/Hijack/False Imprisonment Missing Person High Risk Murder Rape Sudden/Suspicious Death RTC Death Wounding Mtn/Cave Rescue All events where a mountain rescue team was involved in an event will be tagged. This will include actual attendance at an event or contacted for advice. NPCC Any event that will be subject of the North Wales Police NPCC Daily Situation Report will be tagged. OSD Intel All events that contain any form of intelligence relating to road traffic offences should be tagged, where no resources have been dispatched that could potentially submit a CID56 Intelligence Report. OWL (Online Watch Link) If any event is created as a result of a call from OWL, then this tag must be added. Personal Attack Alarm This tag is required for administration of the personal attack alarms which export to an external application managed by the North Wales Police alarms manager. The tag is automatically added to events when PSW FALSE_ALARM_PERSONAL_ATTACK is assigned as a result code. There is no need to manually select this tag for any other reason. Police Pursuit 140/2.0 Page 6 of 8
7 All events involving a police pursuit must be tagged. Press Office All events that require or may be subject of media attention must be tagged. Protecting Vulnerable Persons Unit (PVPU) All events where specific requests are made for the Protecting Vulnerable Person Unit to be informed must be tagged. The following result types will also cause the following to be auto-tagged: Domestic Concern For Safety Domestic Involving Adults Domestic Involving Juveniles Rural Crime Team This tag is to be used to notify the Rural Crime Team of events that the team are seeking to address such as: Improving crime prevention and security. Thefts from rural areas of equipment, diesel, scrap metal and vehicles. Theft of livestock. Wildlife and environmental crime. Having a presence at Farmers Markets and agricultural events. Reducing arson. Communicating effectively with rural communities using texts and s. Dealing with emerging issues to maintain public safety. The tag is also to be used for general 'Lamping' and 'Wildlife' type events. Special Branch Events that contain any information relating to the below subjects should be tagged for Special Branch: Events Involving International Terrorism Irish Related Terrorism Domestic extremism such as extreme left or right wing groups. Examples being The Defence Leagues, Animal Rights/Pro or Anti-Hunting, Proposed Badger Cull, Environmental groups State Related threats involving Espionage Any other event specific to North Wales Cymdeithas Yr Iaith People Against Wylfa EDL Shotton and Wrexham Tension Surrounding Mosques Drone Production at Llanbedr Op Lightning Op Camion Op Trammel 140/2.0 Page 7 of 8
8 Op Submarine Op Driver School Liaison All events occurring on or near school property or relating to any other aspect of school life must be tagged for the attention of the school liaison officers. 140/2.0 Page 8 of 8
Demand management Policy
Demand management Policy Policy summary This policy provides guidance on all aspects of demand management from taking of the initial call to the completion of tasks following attendance at incidents. Aim
More informationkeeping executives safe
keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations
More informationDo the police code information in any way to indicate a mental health crisis? Or submit notifications/referrals to mental health services?
Freedom of Information Request Reference N o : FOI 000709-18 I write in connection with your request for information received by Suffolk Constabulary on the xxx 2018 in which you sought access to the following
More informationGRAMPIAN SCG PUBLIC COMMUNICATIONS PLAN
Page 1 of 11 Page 1 of 11 Communications Plan GRAMPIAN SCG PUBLIC COMMUNICATIONS PLAN Version: Communications Liaison Group Approval Planned Review Chair SCG Plans Workstream Protective Marking: Planned
More informationGeoMedia Smart Client. Integration with CARD in New Zealand Police
GeoMedia Smart Client Integration with CARD in New Zealand Police The Environment Prevention First National Operating Strategy: Understanding and responding to the drivers of crime Deploying to beat demand
More informationAutomatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development
Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft
More informationVirginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations
Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Initial Panel Charge August 2009 To review existing policies and
More informationRevelstoke RCMP COMMUNITY POLICING TOWN HALL
Revelstoke RCMP COMMUNITY POLICING TOWN HALL 2018-02-27 Role of the RCMP The Revelstoke RCMP provide law enforcement, address social issues and provide public safety education. The Administration Staff
More informationPolicing our Roads Together
Policing our Roads Together A 3 year strategy 2018 2021 Our Vision Policing Together for, Secure and Efficient roads Our Objectives Working together to achieve: roads, free from harm Secure roads free
More informationHUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination
HUMANITARIAN COORDINATION TRAINING Safety & Security in Humanitarian Coordination Pre-Departure Security Considerations Make appointment for pre-departure security briefing with your organization Research
More informationReview of ANPR Infrastructure
Page 2 - A38 strategic corridor 2 sites Page 3 - A50 strategic corridor 2 sites Page 4 - Buxton and Matlock A6 Corridor - 3 sites on the A6 Page 5 - Chesterfield - 4 sites in the town centre and A617 Page
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationPolice Report Environmental Management. Reg. No. EMS
Police Report 2015 bsi. ISO 14001 Environmental Management 1 Reg. No. EMS 508823 Contents Foreword Belfast Harbour Police (BHP) Policing Plan Crime Statistics for 2015 Road Safety Road Traffic Statistics
More informationData Breach Notification Policy
Data Breach Notification Policy Policy Owner Department University College Secretary Professional Support Version Number Date drafted/date of review 1.0 25 May 2018 Date Equality Impact Assessed Has Prevent
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationUF CEMP Support Group Annex: Public Safety
UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management
More informationCOPYRIGHTED MATERIAL. Contents. xv xxi. Preface About the Web Site
Preface About the Web Site CHAPTER 1 Business Continuity Management Plan 1 Crisis Management 4 The Value 5 Common Failings 7 Business Continuity Goals 9 Defining a Crisis 10 Mapping Risks 11 Critical Dependencies
More informationBERGRIVIER MUNICIPALITY
BERGRIVIER MUNICIPALITY INCIDENT HANDLING POLICY APRIL 2012 C:\Users\HJanuarie\Desktop\New folder (6)\INFORMATION TECHNOLOGY\Incident Handling Policy.docx/cmd 1 INCIDENT HANDLING POLICY REVISION NUMBER
More informationStatutory Notifications
Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications
More informationSheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY
Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical
More informationBreach Notification Form
Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has
More informationStopsley Community Primary School. Data Breach Policy
Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk
More informationMobile Communication Policy
Mobile Communication Policy Document Type Author Owner (Dept) Mobile Communication Policy Chief Executive Health & Safety Date of Review June 2015 List of Contents Page No 1. Summary of Duties... 3 2.
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationThe Age of Heightened Security
The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationOregon Department of Justice
Oregon Department of Justice Created in response to the 9/11 Commission Report Currently 78 Fusion Centers in the US Fusion Centers are unique in design, but the operation mission is the same nationally
More informationSECTION 9 POLICY AND PROCEDURES
SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents
More informationTHE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT
THE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson
More informationGlobal Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.
Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,
More informationDETAILED POLICY STATEMENT
Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico
More informationExam Contingency Plan
Document Control - Document Details Document Name Exam Contingency Plan Purpose of Document The purpose of this plan is to examine potential risks and issues that could cause disruption to the management
More informationGuidance for Accident Reporting
Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationJoint ICTP-IAEA School of Nuclear Energy Management November 2012
2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,
More informationUNCLASSIFIED//FOR OFFICIAL USE ONLY. Prepare + Prevent + Respond + Recover + Mitigate START WITH PREVENTION
Current Partners UNCLASSIFIED//FOR OFFICIAL USE ONLY LA-SAFE Threat Groups Sectors Domestic Terrorism International Terrorism Gangs/Narcotics Violent/High Profile CI/KR Critical Infrastructure and Key
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationPROCEDURE Cryptographic Security. Number: G 0806 Date Published: 6 July 2010
1.0 About this procedure This procedure explains the specific requirements that staff handling cryptographic material must follow. Cryptographic material is the medium by which we will configure any computer
More informationBest Practices for Incident Communications: Simplifying the Mass Notification Process for Government
Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Introduction State and local governments and their supporting agencies encounter emergency situations
More informationSussex Police Business Crime Strategy
Sussex Police Business Crime Strategy 2014-2016 Sussex Police Serving Sussex www.sussex.police.uk Foreword Sussex Police recognise that businesses are a vital part of our local communities and are essential
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informationInformation Security Incident
Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body
More information2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM
2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM Recap of 1 st ARF Jeju (South Korea) Cyber Terrorism recently been brought
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationPresentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007
Presentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007 2 TEAM WORK LOWER MAINLAND DISTRICT One part of the police service relies on the other parts for a truly integrated
More informationAn Introduction To Security Planning
An Introduction To Security Planning A strategic planning consultancy designed to enhance the management and operational delivery of protective security services within any business and organisation 1
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationMetal Theft Focus Group
Metal Theft Focus Group 28 th February 2013 2011. UK Power Networks. All rights reserved Safety and Housekeeping No planned fire alarms Emergency exits Fire assembly points Toilets Mobile phones Disclosure
More informationFor more information: FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING
FONETRAC - FULL INTEGRATION WITH GLOBAL MONITORING For more information: http://fonetrac-go.com 1995-2018 IMG GlobalSecur, Inc. All Rights Reserved. GlobalSecur & FoneTrac are registered trademarks of
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationExpert support and Reach back activities
GICNT- Nuclear Detection Working Group Magic Maggiore Ispra 28 March 2017 Expert support and Reach back activities Thierry PELLETIER Nuclear Security Division Safety and Security department International
More informationHTE TO OSSI MIGRATION PROPOSAL. 50% Discount
HTE TO OSSI MIGRATION PROPOSAL 50% Discount Background Current CAD/RMS implemented FY87 Current CAD/RMS has no interoperability and does not adequately support field software solutions FY02-03 mobile data
More informationLocal Government Disaster Planning and what can be learned from it.
Local Government Disaster Planning and what can be learned from it. Emergency Operations Plans Emergency Support Functi0ns: ESF-1 ESF-2 ESF-3 ESF-4 ESF-5 ESF-6 ESF-7 Transportation Communications Public
More informationShavington Academy Exams Policy
Shavington Academy Exams Policy The purpose of this exams policy is: to ensure the planning and management of exams is conducted efficiently and in the best interests of candidates; to ensure the operation
More informationNorthamptonshire 2020 Protecting you from harm.
Northamptonshire 2020 Protecting you from harm The Background To review the current delivery model Gave an enhanced picture of current and emerging demands on the Force Enabled us to develop the most effective
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationPolicy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018
Policy Title; Business Continuity Management Policy Date Published/Reviewed; February 2018 Business Lead; Head of Strategic Governance CCMT sponsor; Deputy Chief Constable Thames Valley Police ensures
More informationKentucky Wireless Information Network Service (Ky-WINS)
2006 NASCIO Recognition Awards Nomination Category: Information Communications Technology (ICT) Innovations Kentucky Wireless Information Network Service (Ky-WINS) Kentucky State Police Kentucky has implemented
More informationThe Automatic Lamp Post/Pole Climbing Camera and Communications System
The Automatic Lamp Post/Pole Climbing Camera and Communications System The very presence of the cameras deters would-be offenders and sends a signal out to all that we are watching and protecting the area.
More informationGuelph Police Service
Guelph Police Service The Guelph Police Service provides policing services to the City of Guelph and has an authorized complement of 196.5 police officers and 89.42 civilians. We serve our community by
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationISC10D026. Report Control Information
ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationUniversity of North Texas System Administration Identity Theft Prevention Program
University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including
More informationCommunications Room Policy
Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationChemical Facility Anti- Terrorism Standards
SATA Presentation Regarding Chemical Facility Anti- Terrorism Standards Joe Hartline, CHMM Rindt-McDuff Associates Marietta, Georgia October 6, 2007 Presentation Outline Introduction Rule Requirements
More informationAn Garda Síochána. Annual Policing Plan Dublin Metropolitan Region West Division
An Garda Síochána Annual Policing Plan 2013 Dublin Metropolitan Region West Division 1 Working with Communities to Protect and Serve Foreword I am pleased to introduce An Garda Síochána Annual Policing
More informationenvironmental crime prosecution - the Netherlands -
environmental crime prosecution - the Netherlands - by PERRY C. QUAK, LL.M., MPA SOLICITOR-GENERAL PROGRAMME MANAGER Netherlands Forensic Institute (NFI) THE NETHERLANDS Contents Environmental crime pictures
More informationFY ICMA Benchmarking Results
FY 2010-11 ICMA Benchmarking Results DALLAS FIRE - RESCUE DEPARTMENT DALLAS POLICE DEPARTMENT Public Safety Committee Briefing ICMA Center for Performance Measurement History Center for Performance Measurement
More informationPolicies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors
Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More informationCrime Prevention Protecting our heritage for this and future generations
Crime Prevention Protecting our heritage for this and future generations Stephen Armson-Smith Essex Police Crime Prevention Tactical Advisor & Heritage Crime Prevention Lead Designing out Crime Officer
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationGarth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee:
Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY Policy Owner: Principal Amended: September 2017 Amended: March 2018 Ratified by Curriculum and Pupil Development Committee: 5-3-2015
More informationCardiff University Security & Portering Services (SECTY) CCTV Code of Practice
Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date
More informationNorth Vancouver RCMP A Snapshot
North Vancouver RCMP A Snapshot Supt. J.C. (Chris) Kennedy Officer in Charge Presentation to District of North Vancouver Council November 26, 2018 1 How the service looks: 145 FTE / 128. 53 FTE contracted
More informationInformation and Rules for Candidates taking IFE Examinations in October 2018
Information and Rules for Candidates taking IFE Examinations in October 2018 INTRODUCTION This document provides information and rules for candidates who have booked examinations in October 2018. Candidates
More informationGREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN
GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN 1st July 2019 to 30 June 2020 1. ADMINISTRATIVE ACTION STEPS RESPONSIBLE DURATION IN MONTHS ACTION 1. Appointment of staff CEO / CID Board / Chairman
More informationIntroduction to the National Response Plan and National Incident Management System
Introduction to the National Response Plan and National Incident Management System This presentation will cover: Homeland Security Presidential Directive (HSPD)-5 National Incident Management System (NIMS)
More informationPREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT
PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security
More informationOperational Case Study Backdraft at Marston Road, Stafford
CP No. OCSXXX Fire & Rescue Service Operational Guidance Operational Case Study Backdraft at Marston Road, Stafford Author Role [Click here] to add Name FRS Ref No. [Click here] to add FRS Ref. Originating
More informationKenneth Brown, Facilitator
Kenneth Brown, Facilitator 1 Our CERTs consist of individual residents, neighborhood watches and associations, churches and commercial employees. The idea is engage the entire community. 2 Memphis Metro
More informationJohn Port Spencer Academy. Exam Contingency Plan 2017/18
John Port Spencer Academy Exam Contingency Plan 2017/18 1 Contents Purpose of the plan... 3 Causes of potential disruption to the exam process... 3 1. Exam officer extended absence at key points in the
More informationPrepare your Emergency respons, continuity plan, recovery plan
Prepare your Emergency respons, continuity plan, recovery plan Panel Discussion with PortAventura,Europa Park, Disneyland Paris,Liseberg,the Safety Committee members with Q & A from attendees Septembre
More informationAppendix A: Risk Assessment for Divisions of DEM
Appendix A: Risk Assessment for Divisions of DEM Division Essential Services Vulnerability Needs for Maintaining/Restoring Services Administrative Adjudication Agriculture Air Resources Coastal Resources
More informationCoaldale RCMP Detachment. Public Information Session November 12 th 2014
Coaldale RCMP Detachment Public Information Session November 12 th 2014 Core Values: Integrity Honesty Professionalism Compassion Respect This presentation will cover RCMP K Division Structure Law Enforcement
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationCHAIR AND MEMBERS COMMUNITY AND PROTECTIVE SERVICES COMMITTEE MEETING ON JULY 22, 2013 DIVISION MANAGER, CORPORATE SECURITY AND EMERGENCY MANAGEMENT
Agenda Item # Page # Page 1 of 5 TO: CHAIR AND MEMBERS COMMUNITY AND PROTECTIVE SERVICES COMMITTEE MEETING ON JULY 22, 2013 FROM: SUBJECT: DAVE O BRIEN DIVISION MANAGER, CORPORATE SECURITY AND EMERGENCY
More informationMINUTES OF A MEETING OF THE POLICE COMMITTEE HELD ON MONDAY, OCTOBER 26, 2015, AT 11:15 AM IN THE CORPORATE BOARDROOM, CITY HALL
MINUTES OF A MEETING OF THE POLICE COMMITTEE HELD ON MONDAY, OCTOBER 26, 2015, AT 11:15 AM IN THE CORPORATE BOARDROOM, CITY HALL RECOMMENDATION: For Council information only. PRESENT: MEDIA: P. Milobar,
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationMULTI-AGENCY COORDINATION SYSTEM PUBLICATION RESOURCE DESIGNATION SYSTEM FORMS PACKET MACS 400-3
MULTI-AGENCY COORDINATION SYSTEM PUBLICATION RESOURCE DESIGNATION SYSTEM FORMS PACKET MACS 400-3 JULY 1, 2009 This document contains information relative to the Incident Command System (ICS) component
More informationActions Module in Datix Web
Actions Module in Datix Web Version Control Date Change(s) Version Oct 13 V1 Introduction In the Incidents, Risk and Complaints modules in Datix Web you have the ability to create action plans for yourself
More informationIT Security Standard Operating Procedure
IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance
More informationGlobal Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009
Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access
More informationLCU Privacy Breach Response Plan
LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard
More information