Mobile Finger Print Mobile ID
|
|
- Deborah Foster
- 5 years ago
- Views:
Transcription
1 Mobile Finger Print Mobile ID Manual of Policy and Guidance Mobile Fingerprint Identification Devices Document Information Document Status & Version Version 1.2 Version Date 28 th February 2011 Author(s) Paul Palmer Owner Ch Supt Leeney
2 Document Control Document Information Document Location Quality Reviewers Name Role Sections Reviewed Version History Version Date Requestor of Change Summary of Change(s) Distribution List Name Department / Organisation Project Role Document Name: Mobile ID Document Status: V1 Page ii
3 Mobile ID Program Board Chief Supt Leaney Operations working group Chair Supt Greenhalgh Hardware Controller Paul Palmer Project manager Mike Jenkins Operational staff users TBA Technical group ICT lead TBA Hardware controller Paul Palmer Project manager Mike Jenkins ICT and networks staff Document Name: Mobile ID Document Status: V1 Page iii
4 Table of Contents 1 INTRODUCTION DEVICES IN USE IDENTIFICATION WORK-FLOW FINGERPRINT IDENTIFICATION LEGALITY Section 61 PACE and Code D Use of Force Taking Fingerprints by Consent Taking Fingerprints without consent or Power European Convention of Human Rights General Conduct PROCEDURAL RECORD KEEPING Pre Sample Post sample File Deletion Evidential Documentation and Court Reports SECURITY CONSIDERATIONS Data Security Device Password Personal Password Display of Data Unauthorised Connections Physical Security Security Compromise Incidents...8 Document Name: Mobile ID Manual of Guidance Page iv
5 7 MAINTENANCE AND ASSET MANAGEMENT Daily Checks Mains Charging In-Car Charging After Use Asset Management Fault Reporting Users Account Problems New users SUPERVISION STRATEGY AND DEPLOYMENT MobileID High Level Force strategy Operational Strategy Deployment and Use HEALTH AND SAFETY Potential Weapon Unsecured Projectile Body Fluids and Contagious Disease Contamination Suspected Improvised Explosive Devices (IEDs) Display Screen Equipment Regulations (DSE) Distractions to the Driver Electromagnetic Emissions LEGAL CONSIDERATIONS AND REQUIREMENTS Data Protection Act Computer Misuse Act The Representation of the People (England and Wales) (Amendment) Regulations Section 3 of the Road Traffic Act Document Name: Mobile ID Manual of Guidance Page v
6 10.5 Regulation 104 of the Road Vehicles (Construction and Use) Regulations Force Policy and Procedures (FPPs)...18 Document Name: Mobile ID Manual of Guidance Page vi
7 1 INTRODUCTION This document is presented as an operational Manual of Guidance regarding the use of Mobile Fingerprint Identification Devices (Referred to under the generic title of MobileID) Developments in information technology within the policing sector have provided numerous opportunities to enhance and improve the quality of information tools that the frontline police officer has at their disposal for the prevention and detection of crime. The introduction of the Mobile ID Device, through trials conducted by the National Policing Improvement Agency (NPIA) has reached a stage where widespread deployments of such devices have now become a reality. Due to the high usage of the previous mobile finger print technology (Project Lantern) Surrey Police were selected by the NPIA to be an early adopter force along with Greater Manchester Police to trial the new technology. 2 DEVICES IN USE Second generation (and current phase) devices are provided for Surrey Police by Cogent Systems, and the devices themselves are referred to as MI2 and MI3 (Mobile Information 2 or 3) and the Blackberry/Blue Check device. The MI3 device and the Blackberry/Blue check are ready for delivery to Surrey Police, where as the MI2 is still in its post-development phase and at the time of presenting this document, is not commercially ready for delivery. Through out this document, all such units, regardless of their design and brand names, will be referred to simply as the device Document Name: Mobile ID Manual of Guidance Page 1
8 All the devices in use work by taking an electronic scan of the index fingers of the right and left hand of the subject, and then comparing them to a database of known persons. This database is referred to as the Ident1 database. Ident1 contains fingerprint details of any person whose details appear on the National Criminal Records Office database (CRO). Typically, these will only be people that have been arrested for and subsequently convicted (which includes cautions and penalty notices) of an offence and therefore allocated a CRO number. This differs from a PNC ID number which is allocated to a person upon their first arrest. 3 IDENTIFICATION WORK-FLOW The following is an example typical of the processes undertaken during a street encounter involving a Mobile ID Device. Subject stopped/encountered after committing offence Subject provides personal identification details Officer invokes PACE Code D power or obtains consent to take fingerprints Mobile ID Device powered on Fingerprint scan data sent by secure mobile link to Ident1 Database for comparison Comparison result returned to Officer Officers suspects details to be false or inaccurate Officers make reasonable efforts to establish correct details AND Provide subject opportunity to declare correct details Device Password entered Officer ID and Password entered Initial Subject Details entered Scan taken of left and right index fingers Officer records Transaction Reference Number If positive result returned, officer conducts PNC check via Control Room or MDT Final resolution of incident (Arrest/PND/verbal warning/report for summons/nfa etc) Document Name: Mobile ID Manual of Guidance Page 2
9 4 FINGERPRINT IDENTIFICATION LEGALITY As of 7 th March 2011, an amendment to Section 61 of the Police and Criminal Evidence Act 1984 and it associated Code D, granted powers specifically for the use of MobileID devices Prior to this, there is no legal power to require a person to provide a fingerprint for the purposes of identification other than consent. 4.1 Section 61 PACE and Code D The full and detailed wording of the amendment to Section 61 of PACE can be found in both the Police National Legal Database (PNLD) and in the NPIA circular dated 24 th February However, the amendment provides the power: 6a) A constable may take a person s fingerprints without the appropriate consent if: a) the constable reasonably suspects that the person is committing or attempting to commit an offence, or has committed or attempted to commit an offence; and b) either of the two conditions mentioned in subsection 6b is met: 6b) The conditions are that: a) The name of the person is unknown to, or cannot be readily ascertained by, the constable. b) The constable has reasonable grounds for doubting whether a name furnished by the person as his name is his real name The change to Code D PACE reinforces the requirement of officers to ensure that they record their actions appropriately and fully at all times. It is also a requirement that before exercising any power under this legislation, officers must: Inform the person of the nature of the suspected offence, and why they are suspected of committing it. Give the person a reasonable opportunity to establish their real name before deciding: o Their name is unknown and can not be readily ascertained or Document Name: Mobile ID Manual of Guidance Page 3
10 o That there are reasonable grounds to doubt that a name given is their real name. Inform them of the reason why; o Their name is unknown and cant be readily ascertained o Of the grounds for doubting that name given is the real name o Including, for example, why a document provided is insufficient In short, persons that are likely to be subject of fingerprint identification must first be given all reasonable opportunities to establish their real identity. 4.2 Use of Force The legislation provides the power to take fingerprints by force if required, providing that the legal requirements stated in Section 61 PACE and Code D have been fulfilled. Any force used must only be as much as is reasonable, proportionate and justifiable. If force is used to obtain fingerprints, a record of this must be made in line with the local arrangements for Use of Force Recording Procedures. 4.3 Taking Fingerprints by Consent Prior to the acceptance in law of the amendments to PACE, the only power to take fingerprints for identification purposes was by consent. With effect from 7 th March 2011, consent will no longer be obtained for the purposes of a MobileID procedure, and such procedures will only be undertaken where the criteria specified in section 4.1 above is fully met and there is a clear operational need to conduct the procedure. 4.4 Taking Fingerprints without consent or Power There are 2 types of circumstance where it is deemed acceptable to take a person fingerprints without a lawful power or their express consent. Unconscious Persons the police duty of care to such a person justifies the use of MobileID to be able to identify that person in order to ensure that they are provided with the best level of care possible (such as a person found unconscious and then identified, with a marker shown on PNC to state that the person suffers with diabetes this information can be passed to health care professionals in charge of that persons welfare) Document Name: Mobile ID Manual of Guidance Page 4
11 Dead Bodies the Coroner s Rules permit the use of fingerprints to assist in the identification of unknown corpses. Furthermore, it can assist in reducing the trauma to a deceased person s next of kin if an early identification can be made without them being present. 4.5 European Convention of Human Rights The ECHR is intended to protect the rights of all persons, regardless of their suspected involvement in the commission of a crime. All operational officers should have received training in the application of this legislation in an operational policing role, and so it will not be quoted in full here. However, officers are reminded that the following articles of the ECHR need to be considered when conducting a Mobile ID procedure. Article 5 The right to Liberty and Security Article 6 The right to a Fair Trial Article 7 No Punishment without Law Article 8 The right to Respect for Private and Family Life 4.6 General Conduct All policing activities, including Mobile ID procedures, should follow the JAPAN principle: J Justified A Appropriate P Proportionate A Authorised (in law, by instruction, or consent) N Necessary 5 PROCEDURAL RECORD KEEPING Regardless of whether a legal power is exercised, or consent is provided, it is necessary for a record to be kept of the fact that a fingerprint identification using a device has been completed. 5.1 Pre Sample Before the fingerprints are obtained, the circumstances relating to the encounter should be recorded in the officer s personal Pocket Note Book. PACE makes it a requirement that the officer must record in full their reasons for conducting the procedure, including the reasons why the name provided (if any) is suspected of being false, and what steps they have taken to allow the person to provide their correct identity, as per section above. Document Name: Mobile ID Manual of Guidance Page 5
12 5.2 Post sample Once a fingerprint sample has been obtained and compared to the Ident1 database, the device will return a Transaction Reference Number (TRN) - this number will be returned regardless of whether it is a positive identification or not. This TRN must be recorded by the officer for auditing purposes. If a positive identification has been returned, then the details held for the subject (CRO Number, Name, Date of Birth and Gender) should be recorded also. 5.3 File Deletion As previously stated, there is no power at present in law to require a person to provide a fingerprint for identification purposes. The proposed amendment to PACE Code D, will provide a power to obtain a fingerprint for identification purposes, but not for recording purposes. Therefore, it will be a requirement, and is considered best practice now, to delete any files on the Device pertaining to a subject test. The exact method of deletion will be provided during training for the specific device. To prevent the risk of allegations being made at a later stage by a subject, officers should delete the subject files after the test has been completed, in the presence and witness of the subject. Officers may also wish to consider recording this deletion process in their Pocket Note Books and inviting the subject to sign. This process still needs to be completed even in the event of a positive identification which results in a subject s arrest. 5.4 Evidential Documentation and Court Reports When referring to the use of a MobileID device in official documentation such as Statements ad other court papers, officers are required to insert text stating Aided by MobileID Mobile Fingerprinting - officers should refrain from attempting to provide technical details about how the system works. If this is required by the CPS the evidence will be provided by the hardware controller. Likewise, if the encounter that caused the procedure to be completed was finalised by way of issuing a Fixed Penalty Notice, or a Penalty Notice for Disorder, the notice should be suitably endorsed with the text, Identification aided by MobileID Mobile Fingerprinting Document Name: Mobile ID Manual of Guidance Page 6
13 6 SECURITY CONSIDERATIONS 6.1 Data Security The service provided by Cogent Systems is referred to as an end-toend solution, meaning that there is no reliance upon the Surrey Police information networks to complete identification. All data regarding the fingerprint scan and the subject is transmitted from the device, via secure means, to the Cogent back-office facility where comparisons are made to the Ident1 database and the results transmitted back along the same secure path. However, to achieve the security required for handling such data, each device will require two passwords. 6.2 Device Password 6.3 Personal Password 6.4 Display of Data In operational use, all efforts must be made by the officer responsible for the device, that no information on the device is displayed to any unauthorised persons. See Legal Requirements at section 10 below. Document Name: Mobile ID Manual of Guidance Page 7
14 6.5 Unauthorised Connections The devices are equipped with external USB and COM ports. These are exclusively for the loading of software by the manufacturer and for maintenance purposes, and for the charging of the internal batteries. Under no circumstances will a user connect, or allow to be connected, any unauthorised device, which includes, but is not limited to, USB Memory Drives, personal music players, mobile phones, personal organisers or any other digital device. Such connections could compromise the data security of not only the individual device, but also of the data network service. Only authorised persons such as the hardware controller will have access to the administration codes and nominated deputies. Under no circumstances will these passwords be passed onto to non authorised administration personnel. 6.6 Physical Security After the completion of the early adopter stages the devices allocated to Surrey Police through ACPO funding will be distributed to the trained proactive teams that currently use the pilot devices under Operation Lantern. The devices will be distributed between these teams pro rata to the use, ANPR teams core functions relate to stop checking known targets through ANPR technology. The devices will be pooled and deployed at the discretion of the duty sergeant. Some devices will be deployed to Roads Policing units and Uniformed Proactive teams. As such, the individual officer to whom the device has been issued will be expected to assume full responsibility for it whilst on patrol. At no time should the device be left unattended in a vulnerable location or in an unlocked insecure vehicle or location. At no point should the device be left in the possession of any person (police or otherwise) that is not an authorised user. Suspects or other members of the public should never be left unattended in a police vehicle with an unsecured device. When not in use, devices should be stowed out of sight. 6.7 Security Compromise Incidents If at any point, the security of a device should be compromised, action must be taken as a matter of urgency. Document Name: Mobile ID Manual of Guidance Page 8
15 A security compromise will be regarded as any loss, theft or physical misplacing of the device, as well as any suspected breach or disclosure of either a device password or personal password to an unauthorised person. In the event of a compromise, the user must inform their supervisor immediately. A report must then be submitted to the Information Security Officer) containing the following details: Device type and serial number (if known) Type of compromise (Loss, stolen, password breach etc) State of device at time of incident (had the password been entered and therefore the device was unlocked?) Location at time of incident Any suspects if stolen Actions already taken to re-locate the device. In office ours, contact should be made with the Shared Business Service Centre, who will be able to contact Cogent and have the SIM card for the individual device disassociated from the host network. Out of ours a message must be left with the Shared Business Service Centre and the Hardware controller, Mr Paul Palmer to expedite the process above. 7 MAINTENANCE AND ASSET MANAGEMENT 7.1 Daily Checks There are no moving parts on any of the devices available, but prior to commencing a tour of duty with the device; officers will check to make sure that there is no obvious damage to the outer casing, that the device is charged, and that any issued accessories are present in the carry case. Additionally the scan screen should be wiped clean using the cleaning cloth provided with the device 7.2 Mains Charging Each device will be provided with a standard 240 volt mains charging adapter. The device should be left on charge when not in use, with a typical battery life expected to be approximately 12 hours, depending on usage. Document Name: Mobile ID Manual of Guidance Page 9
16 At the end of each tour of duty, the user will replace the device back in the agreed location at the station and ensure it is placed back on charge. Battery management is the responsibility of all users, when returning to base station they must be put on charge, particularly if they are to be handed over to an on coming shift. In car chargers are being looked into for approval also. Battery management is critical to devices,spares will be sourced. 7.3 In-Car Charging There will be a small number of in-car chargers made available to various units, and where available, these should be utilised. When available, more in car chargers will be procured to assist battery management. 7.4 After Use At the end of an operational tour of duty where the device has been deployed, it should be removed from the police vehicle and returned to the designated storage area in the station, and placed on charge. 7.5 Asset Management A central record of the disposition of each device will be held, detailing which unit or office has been allocated a device and an asset number will be issued. Local supervisors are requested not to transfer devices between units without first consulting the asset management team at the airwave office, so that the records can be updated accordingly. 7.6 Fault Reporting If the device is not user serviceable or should a fault develop, contact should be made in the first instance with the Shared Business Service Centre. In turn, they will forward the fault details direct to the equipment supplier, who will then be responsible for arranging any repair or running diagnostic checks with the hardware controller to resolve problems that do not require a device swap out. In the first instance the device will be returned to the hardware controller for diagnostic evaluation. If the hardware controller determines the device is faulty he will, through the Shared Business Service Centre arrange for a replacement device to be delivered to the airwave office for asset management, and deliver the faulty device for collection to the same office so that the faulty device is returned to the supplier Cogent. 7.7 Users Account Problems Document Name: Mobile ID Manual of Guidance Page 10
17 7.8 New users 8 SUPERVISION STRATEGY AND DEPLOYMENT MobileID will deliver a national service which aids the identification of an individual irrespective of which force s area they reside in and where they are stopped. Those who travel to commit crime can no longer rely on practiced personal histories and misleading documentation to avoid identification and are as a result inhibited and exposed to the risk of discovery if stopped. MobileID will help officers save time, not only by avoiding making unnecessary identification arrests but also by making routine identifications more swiftly. 8.1 MobileID High Level Force strategy Document Name: Mobile ID Manual of Guidance Page 11
18 To ensure compliance with the Manual of guidance and force user guides for the safe and appropriate use of MobileID The use of MobileID directly supports policing priorities The use of Mobile ID will support increased visibility and provide live time access to the national identification database Maximise our opportunity to improve data quality and timeliness of submissions To deliver improvements to staff efficiency and effectiveness Bring more offenders to justice who would otherwise avoid prosecution This is seen as an extension to the Surrey Police mobile strategy for the force, and will sit with Ch Supt Leeney and as such the strategic program board will look after the development needs technically, and the use of the devices operationally will sit under this umbrella. The following infrastructure will be implemented to effectively manage the implementation of the Mobile ID project. Chief Supt Leeney Operations working group Chair Supt Greenhalgh Hardware Controller Paul Palmer Project manager Mike Jenkins Operational staff users TBA Technical group ICT lead TBA Hardware controller Paul Palmer Project manager Mike Jenkins ICT and networks staff 8.2 Operational Strategy To support force objectives of Identifying the transient high crime offenders To support force objectives in denying the criminal the use of the road To support force objectives for counter terrorism operations To support and enhance the capability of other mobile technology deployed with our frontline officers To allow officers to make accurate identifications during a street encounter Avoid unnecessary detentions and arrests Improve detection and judicial street disposal process Improve the efficiency of the police custody process Document Name: Mobile ID Manual of Guidance Page 12
19 8.3 Deployment and Use Overall responsibility for the distribution and strategic deployment of MobileID Devices will rest with the Mobile Data Project team. It is anticipated that the devices will predominantly be distributed to ANPR Intercept Team, Roads Policing Teams and other specialist operational units. In order to achieve the Force and Operational Strategy Aims: All trained officers will utilise the device on ALL occasions that the criteria specified in law is met Before concluding any policing encounter with a person that has committed, or is suspected of having committed an offence, officers must be completely satisfied that the identity of the person is fully and accurately established Supervisors are expected to be intrusive and robust in their supervision of staff using MobileID Devices The process will be summarised as Stop - Identify Document or SID 9 HEALTH AND SAFETY As with any policing activity, officers are expected to conduct dynamic risk assessments before embarking upon action. This principle must be extended to the use of Mobile ID Devices. 9.1 Potential Weapon. The Mobile ID Devices are relatively bulky in their design. There is a slim possibility that an aggressive subject may attempt to use the device as a potential weapon to strike an officer. For this reason, the device should not be given to a subject to hold at any point during an ID Procedure. 9.2 Unsecured Projectile The device and its carry case and accessories must not be left insecure on the seats, floor or parcel shelf of a vehicle whilst in motion. In the event of a collision, the device could become a projectile and poses an impact risk to occupants of the vehicle. Document Name: Mobile ID Manual of Guidance Page 13
20 9.3 Body Fluids and Contagious Disease Contamination In routine use, it should not be necessary for the officer using the device to have any direct physical contact with a subject in order to complete a Mobile ID Procedure. Unlike the livescan devices at custody centres, there is no requirement for the subject to have to roll or rotate their fingers to obtain a capture. Subjects should be given clear verbal instructions on how and where to place their index fingers on the scan screen, thereby reducing the need for the officer to make physical contact. However, officers are reminded to adopt safe working practices when dealing with any member of the public who poses a risk from infectious disease. If the subject has any kind of injury that has resulted in bleeding, or if they should their hands be contaminated with any other body fluids, the use of first-aid alcohol wipes should be considered for the subject prior to providing their fingerprints. Furthermore, after providing fingerprints, the scan screen should also be cleaned with an anti-bacterial wipe or similar hard surface cleaner. 9.4 Suspected Improvised Explosive Devices (IEDs) The Device transmits using a 3G mobile phone signal and therefore, like all transmitting devices, poses a potential risk if the vehicle is used to attend an incident involving suspected IED s. Logging off the system is not sufficient, as the system will still attempt to make connections to the mobile network unless it is powered off. For this reason, the Device must be powered off completely and not brought any closer than 50 metres of a suspected device. 9.5 Display Screen Equipment Regulations (DSE) These regulations are intended for fixed workstations in police buildings, but DSE good practice should be considered when using MobileID Devices Avoid extended use of the device. Interaction should be limited to 15 minutes at a time. Document Name: Mobile ID Manual of Guidance Page 14
21 9.5.2 Where fitted, adjust screen brightness to suit ambient lighting conditions Users should report adverse effects of use of the device to their supervisor immediately Users that require to wear spectacles specifically for display screen work should wear these for use with Mobile ID Devices. 9.6 Distractions to the Driver Drivers of police vehicles are bound by individual responsibilities to comply with road traffic legislation, force policy and procedure for the safe use of vehicles. This will include that the use of any ancillary equipment fitted to the vehicle does not distract that officer from the primary responsibility of maintaining full and proper control of that vehicle. 9.7 Electromagnetic Emissions As the device utilises mobile phone transmission technology, it emits electromagnetic radiation whilst in use. Independent testing has been conducted that ensures that the level of these emissions are within recommended limits, and does not pose a risk to the health of the users. However, due to the signals being transmitted, there is a risk of these signals causing interference with sensitive equipment. Such equipment includes but is not limited to: Speed Enforcement devices Medical care equipment (Hospital Heart Monitors etc) Roadside and station substantive breath test devices Fuel Filling station pumps. The device should be powered off when in the proximity of these or similar items of equipment. Document Name: Mobile ID Manual of Guidance Page 15
22 10 LEGAL CONSIDERATIONS AND REQUIREMENTS Outside of the legal procedures governed by PACE as laid out in section 4.1 above, all MobileID Device users must be aware of their responsibilities in law in relation to the use of the devices. These include, but are not limited to, the following items: 10.1 Data Protection Act 1988 The Data Protection Act 1988 (DPA) has eight Principles with which a user must comply: 1. Personal Data shall be processed fairly and lawfully and shall not be processed unless scheduled conditions are met; 2. Personal Data shall be held for a specified, lawful, notified purpose(s) and not further processed in a manner incompatible with the notified purpose(s); 3. Personal Data shall be adequate, relevant and kept up to date; 4. Personal Data shall be accurate and kept up to date; 5. Personal Data shall be kept no longer than is necessary; 6. Personal Data shall be processed in accordance with the Data Subject s rights; 7. Personal Data shall be kept secure and have declared security and procedural measures against unauthorised access, accidental or deliberate loss, damage or alteration; 8. Personal Data shall not be transferred outside the EU unless the destination is approved by the Information Commissioner. Section 55 of the DPA states that it is an offence to unlawfully obtain or disclose personal data, or to procure the disclosure of it to another person, without the consent of the organization responsible for that information. It is also an offence to sell, or offer to sell, personal data after it has been unlawfully obtained, disclosed, or procured. (Therefore, it is an offence to obtain data or to obtain and disclose data without authority, and it is an offence to offer to sell or to actually sell data). Document Name: Mobile ID Manual of Guidance Page 16
23 10.2 Computer Misuse Act From 1st September 1990, three offences were created under the Computer Misuse Act: Unauthorised access to computer material Unauthorised access with intent to commit or facilitate commission of further offences Unauthorised modification of computer material These offences cater for instances where users allow other persons to use their log in details, or where users access Mobile ID Devices that have been logged on previously by someone else The Representation of the People (England and Wales) (Amendment) Regulations 2002 Regulation 109(1) in relation to the full and un-edited information contained within the Electoral Roll (or Voters Index) applies to the following: (a) any police force in Great Britain; (b) the Police Service of Northern Ireland and the Police Service of Northern Ireland (Reserve); (c) the National Criminal Intelligence Service; (d) the National Crime Squad; (e) the National Policing Improvement Agency; and (f) any body of constables established under an Act of Parliament. (2) For the purposes of regulation 102(1) above the relevant part of the documents listed in that provision is the whole of them. (3) No person serving whether as a constable, officer or employee in any of the forces and organisations to which this regulation applies may - (a) supply a copy of the full register to any person, (b) disclose any information contained in it (that is not contained in the edited register), or (c) make use of any such information, otherwise than for the purpose of the prevention and detection of crime and the enforcement of the criminal law (whether in England and Wales or elsewhere) Section 3 of the Road Traffic Act 1988 This creates offences of driving without due care and attention and driving without reasonable consideration on a road or public place. Also be aware of other useful offences in such circumstances, referred to at the end of this document. Document Name: Mobile ID Manual of Guidance Page 17
24 If a person drives a mechanically propelled vehicle on a road or other public place without due care and attention, or without reasonable consideration for other persons using the road or public place, he is guilty of an offence 10.5 Regulation 104 of the Road Vehicles (Construction and Use) Regulations 1986 This regulation creates an offence of the driver of a motor vehicle not being in a position to have proper control of the vehicle or a full view of the road and traffic ahead. No person shall drive or cause or permit any other person to drive, a motor vehicle on a road if he is in such a position that he cannot have proper control of the vehicle or have a full view of the road and traffic ahead 10.6 Force Policy and Procedures (FPPs) The following Policies (and their associated Procedures) are from the Surrey Force Policy and Procedure Library and have been identified as having a likely bearing on the use of Mobile ID Devices. It must be stressed that this Manual of Guidance is NOT a force policy document, but is intended to be used as a reference guide to the use of the equipment installed. Although careful attention has been paid to ensure that conflicts do not exist between this Manual and current Force Policies, in the event of a contradiction or difference being found, it must be held that the Force Policy will take primacy. If during routine use of the Device a conflict is found with the above policies, or if users should have any comments or suggestions for additional policies that are not shown here, they should forward any comments via to: Document Name: Mobile ID Manual of Guidance Page 18
Legislation, PACE & Consent Handout for MobileID
Legislation, PACE & Consent Handout for MobileID Introduction The MobileID service replaces the Lantern Mobile Fingerprinting Pilot and forces will migrate to in February / March 2011. Lantern was used
More information3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company
3M Cogent, Inc. Case Study in theuk a 3M Company case study: MobileID Service is now being delivered to the UK s Police Service through a contract with the National Policing Improvement Agency (NPIA).
More informationData Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING
POLICY Security Classification Disclosable under Freedom of Information Act 2000 Yes POLICY TITLE Data Protection REFERENCE NUMBER A031 Version 1.1 POLICY OWNERSHIP DIRECTORATE BUSINESS AREA CHIEF OFFICERS
More informationData Protection Policy and Procedure
Data Protection Policy and Procedure Reference No. P09:2007 Implementation date 12022008 Version Number Version 2.0 Reference No: Name. Linked documents Policy Section Procedure Section Yes Yes Suitable
More informationINVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE
INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication
More informationAPPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:
APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence
More informationGuidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff
RM Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff The Association of Chief Police Officers has agreed to these guidelines being circulated to, and adopted
More informationJustice Sub-Committee on Policing. Police Body Worn Video. Written submission from Police Scotland
Justice Sub-Committee on Policing Police Body Worn Video Written submission from Police Scotland I am writing to provide you with the relevant information relating to Body Worn Video (BWV) to assist with
More informationPOLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE) CODE B
POLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE) CODE CODE OF PRACTICE FOR SEARCHES OF PREMISES Y POLICE OFFICERS AND THE SEIZURE OF PROPERTY FOUND Y POLICE OFFICERS ON PERSONS OR PREMISES Commencement - Transitional
More informationIdentity Cards Bill EXPLANATORY NOTES. Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN.
Identity Cards Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 9 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary Clarke has made
More informationPROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016
1.0 Summary of Changes 1.1 This procedure/sop has had an additional paragraph added at 3.8.6 relating to data processing of information by direct access to Athena. 2.0 What this Procedure/SOP is About
More informationOfficial Freedom of Information Classification Open. To update members on the progress of the Dorset Police Body Worn Video Policy and Pilot
Official Freedom of Information Classification Open AGENDA NO: 06 ETHICS AND APPEALS SUB COMMITTEE 20 DECEMBER 2016 BODY WORN VIDEO POLICY REPORT BY THE CHIEF CONSTABLE PURPOSE OF THE REPORT To update
More informationDerbyshire Constabulary SIMPLE CAUTIONING OF ADULT OFFENDERS POLICY POLICY REFERENCE 06/122. This policy is suitable for Public Disclosure
Derbyshire Constabulary SIMPLE CAUTIONING OF ADULT OFFENDERS POLICY POLICY REFERENCE 06/122 This policy is suitable for Public Disclosure Owner of Doc: Head of Department, Criminal Justice Date Approved:
More informationOPERATIONAL GUIDANCE WHEN AND HOW TO MANAGE DISCRETIONARY DISPOSAL 1. AIM OF THIS GUIDANCE
Title & Version FOIA exempt? Author Organisation Summary Effective from date: Review date: Draft PSNI guidance on when and how to dispose of a crime by use of discretion, v4 (24/9/12) No C/Insp Michael
More informationDURHAM CONSTABULARY POLICY
DURHAM CONSTABULARY POLICY Durham Constabulary Freedom of Information Act Publication Scheme Name of Policy Body Worn Video Devices Registry Reference No. DCP 166 Policy Owner Head of Neighbourhood & Partnership
More information1. The Law Reform Committee of the Bar Council and the Criminal Bar Association
RESPONSE OF THE LAW REFORM COMMITTEE OF THE BAR COUNCIL AND THE CRIMINAL BAR ASSOCIATION TO THE CONSULTATION ON REVISIONS TO THE PACE 1984 CODE OF PRACTICE 1. The Law Reform Committee of the Bar Council
More informationDATA SHARING AND PROCESSING
DATA SHARING AND PROCESSING Capita Business Services Limited March 2016 Version 1.3 TABLE OF CONTENTS: Item Heading Page 1 Data Processing Agreement 2 2 Data Protection Act 1998 2 3 Data Protection Act
More informationCounter-Terrorism Bill
EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 6 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following
More informationLPG Models, Methods and Processes
LPG1.7.04 Models, Methods and Processes Street Identification Student Notes Version 1.09 The NPIA is operating as the Central Authority for the design and implementation of Initial Police Learning for
More informationCCTV CODE OF PRACTICE
EDINBURGH NAPIER UNIVERSITY CCTV CODE OF PRACTICE Introduction The monitoring, recording, holding and processing of images of identifiable individuals constitutes personal data as defined by the Data Protection
More informationEuropean College of Business and Management Data Protection Policy
European College of Business and Management Data Protection Policy 1. INTRODUCTION 1.1 The European College of Business and Management (ECBM) is committed to full compliance with the Data Protection Act
More informationProtection of Freedoms Act 2012
Protection of Freedoms Act 2012 Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data March 2013 Issued Pursuant to Section 22
More informationData Protection. Policy & Procedure. Greater Manchester Police
Data Protection Policy & Procedure Greater Manchester Police October 2014 Table of Contents 1. Policy Statement... 1 1.1 Aims... 1 2. Scope... 1 3. Roles & Responsibilities... 2 4. Terms and Definitions...
More informationCode of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002
Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Presented to Parliament under section 377A(4) of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A
More informationDISCLOSURE & BARRING SERVICE (DBS) PROCEDURE
DISCLOSURE & BARRING SERVICE (DBS) PROCEDURE Authorised Professional Practice (APP) APP is developed and owned by the College of Policing (the professional body for policing) and can be accessed online.
More informationNATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES
NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES TABLE OF CONTENTS CHAPTER 1: CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER
More informationPOLICE AND CRIMINAL EVIDENCE ACT 1984 CODE G CODE OF PRACTICE FOR THE STATUTORY POWER OF ARREST BY POLICE OFFICERS
POLICE AND CRIMINAL EVIDENCE ACT 1984 CODE CODE OF PRACTICE FOR THE STATUTORY POWER OF ARREST BY POLICE OFFICERS Commencement This Code applies to any arrest made by a police officer after midnight on
More informationGWENT POLICE VEHICLE DEFECT RECTIFICATION PROCEDURE
GWENT POLICE VEHICLE DEFECT RECTIFICATION PROCEDURE 1.1 Introduction Aim 1.1.1 The aim of this procedure is to provide drivers with the opportunity to avoid prosecution, by ensuring vehicle defects are
More informationPurpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2
Document Information Summary Partners ISA Ref: As Part 1 An agreement to formalise the information sharing arrangements for the purpose of specific Information sharing pursuant to Crime and Disorder reduction
More informationDATA PROTECTION POLICY STATUTORY
DATA PROTECTION POLICY MAIDEN ERLEGH TRUST STATUTORY INITIAL APPROVAL July 2017 REVIEW FREQUENCY At least every two years REVIEWED CONTENTS PART ONE: POLICY STATEMENT & OBJECTIVES PART TWO: STATUS OF THE
More informationRegulation of Interception of Act 18 Communications Act 2010
ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception
More informationCode of Ethics. policing with PRIDE. Professionalism Respect Integrity Dedication Empathy
Code of Ethics policing with PRIDE Professionalism Respect Integrity Dedication Empathy Principles and Standards of Professional Behaviour for the Policing Profession of England and Wales Contents Foreword
More informationTelecommunications Information Privacy Code 2003
Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8
More informationWILTSHIRE POLICE POLICY
Template v5 WILTSHIRE POLICE POLICY STOP and SEARCH Effective from: February 2016 Last Review Date: April 2017 Version: 5.0 Next Review Date: April 2018 POLICY STATEMENT Wiltshire Police has undertaken
More informationAUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT
AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT Introduction 1. This Memorandum has been prepared for the Delegated Powers and Regulatory Reform Committee
More informationLaw Enforcement Legislation Amendment (Public Safety) Act 2005 No 119
New South Wales Law Enforcement Legislation Amendment (Public Safety) Act 2005 No 119 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of Law Enforcement (Powers and Responsibilities) Act 2002
More informationCriminal Justice (Scotland) Act 2016
Police Service of Scotland Police Notebook Form 099-001 (Content) Procedure Under Section 1 (Arrest) (*) (*) (Arrests made under Section 41 of the Terrorism Act 2000 and Sections 6D or 7(5) of the Road
More informationAN GARDA SÍOCHÁNA POLICING PLAN 2014
AN GARDA SÍOCHÁNA POLICING PLAN 2014 Table of Contents An Garda Síochána s Mission, Vision and Values 2 s Foreword 3 Minister s Policing Priorities 4 Strategic Goals Goal One Securing Our Nation 6 Goal
More informationThe installation of CCTV can provide information on activities at the Water,
ST CHAD S WATER LNR CCTV CODE OF PRACTICE St Chad s Fishing Club A closed circuit television system is used at St Chad s Water LNR, Church Wilne (known in the Code as the Water) by the St Chad s Fishing
More informationA closed circuit television system is used at the Memorial Hall by the Parish Council.
BREADSALL PARISH COUNCIL CCTV CODE OF PRACTICE A closed circuit television system is used at the Memorial Hall by the Parish Council. The safety of residents using the car park and visitors to the buildings
More informationPublic Health etc. (Scotland) Act 2008
Public Health etc. (Scotland) Act 2008 (asp 5) Section Public Health etc. (Scotland) Act 2008 2008 asp 5 CONTENTS PART 1 PUBLIC HEALTH RESPONSIBILITIES The Scottish Ministers 1 Duty of Scottish Ministers
More informationProtection of Freedoms Bill. Delegated Powers - Memorandum by the Home Office. Introduction
Protection of Freedoms Bill Delegated Powers - Memorandum by the Home Office Introduction 1. This Memorandum identifies the provisions of the Protection of Freedoms Bill which confer powers to make delegated
More informationPNC Inspections: National overview report
PNC Inspections: National overview report 4 August 2010 1 Contents Introduction Background National themes Conclusion Annex A Leadership and strategic direction Partnerships Preventing system abuse Performance
More informationINFORMATION SHARING AGREEMENT This document is NOT PROTECTIVELY MARKED
PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies
More information25101 PROCEDURE VIDEO IDENTIFICATION
Version 4.3 Last updated 03/10/2017 Review date 03/10/2018 Equality Impact Assessment High Owning department Custody 1. About this Procedure 1.1. This Procedure provides instruction to Hampshire Constabulary
More informationNOT PROTECTIVELY MARKED FORCE PROCEDURES. Victim Personal Statement Scheme
FORCE PROCEDURES Victim Personal Statement Scheme Procedure Reference Number: 2009.11 Procedure Author: DS Chris Davies, Administration of Justice Procedure Review Date: January 2011 At the time of ratifying
More informationThe Correctional Services Administration, Discipline and Security Regulations, 2003
CORRECTIONAL SERVICES, ADMINISTRATION, 1 DISCIPLINE AND SECURITY, 2003 C-39.1 REG 3 The Correctional Services Administration, Discipline and Security Regulations, 2003 Repealed by Chapter C-39.2 Reg 1
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationVersion No. Date Amendments made Authorised by N/A ACC Hamilton (PSNI)
PURPOSE PARTNERS The purpose of this Information Sharing Agreement is to facilitate the lawful exchange of data in order to comply with the statutory duty on Chief Police Officers and relevant agencies
More informationWe are however able to disclose the relevant lesson outcomes for your information.
Investigator's role The role of an investigator is to gather all relevant evidence which either proves or disproves a person s involvement in an alleged offence. Under CPIA our role is define as all police
More informationDerbyshire Constabulary GUIDANCE ON THE ISSUE OF TRAFFIC OFFENCE REPORTS AND VEHICLE DEFECT RECTIFICATION SCHEME POLICY REFERENCE 05/035
Derbyshire Constabulary GUIDANCE ON THE ISSUE OF TRAFFIC OFFENCE REPORTS AND VEHICLE DEFECT RECTIFICATION SCHEME POLICY REFERENCE 05/035 This guidance is suitable for Public Disclosure Owner of Doc: Head
More informationPOLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE) CODE F CODE OF PRACTICE ON VISUAL RECORDING WITH SOUND OF INTERVIEWS WITH SUSPECTS
POLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE) CODE CODE O PRACTICE ON VISUAL RECORDING WITH SOUND O INTERVIEWS WITH SUSPECTS Commencement Transitional Arrangements The contents of this code should be considered
More informationPROCEDURE Simple Cautions. Number: F 0102 Date Published: 9 September 2015
1.0 Summary of Changes This procedure has been updated on its yearly review as follows: Included on the new Force procedure template; Amended throughout to reflect Athena; Updated in section 3.8 for OIC
More informationStop & Search (Policy & Procedure)
Stop & Search (Policy & Procedure) Publication Scheme Y/N Policy Holder Author Related Documents Can be published on Force Website Chief Supt Strategic Lead Chief Inspector Operations Authorised Professional
More informationStop and Search. Standard Operating Procedure
Stop and Search Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as
More informationFirst Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010
First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition
More information518 Defending suspects at police stations / appendix 1
518 Defending suspects at police stations / appendix 1 POLICE AND CRIMINAL EVIDENCE ACT 1984 PART I: POWERS TO STOP AND SEARCH 1 Power of constable to stop and search persons, vehicles etc (1) A constable
More informationQUARTERLY REPORT: COMPLAINTS, MISCONDUCT & OTHER MATTERS
QUARTERLY REPORT: COMPLAINTS, MISCONDUCT & OTHER MATTERS Report of the Chief Constable Contact: Detective Superintendent Dean Chapple 1. Purpose of Report 1.2 This report outlines the data and background
More informationHealth Information Privacy Code 1994
Health Information Privacy Code 1994 Incorporating amendments Privacy Commissioner Te Mana Matapono Matatapu New Zealand The Code of Practice comprises clauses 1-7 and rules 1-12. To assist with the use
More informationNot Protectively Marked POLICY AND STANDARD OPERATING PROCEDURES
POLICY AND STANDARD OPERATING PROCEDURES Title CCTV in Custody Suites Standard Operating Procedure Policy Ref. No A007 Corporate Custody Policy SOP(s) Ref. No A010 Version No. 1.1 Senior Officer Lead ACC
More informationData Protection. Standard Operating Procedure
Data Protection Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as
More informationagainst Members of Staff
Procedural Guidance Security Marking: Police Misconduct and Complaints against Members of Staff Not Protectively Marked Please click on the hyperlink for related Policy Statements 1. Introduction 1.1 This
More informationPrevention of Terrorism Act 2005
Prevention of Terrorism Act 2005 2005 Chapter 2 CONTENTS Control orders Section 1 Power to make control orders 2 Making of non-derogating control orders 3 Supervision by court of making of non-derogating
More informationRegulation of Investigatory Powers Act 2000
ch2300a00a 01-08-00 22:01:07 ACTA Unit: paga RA Proof 20.7.2000 Regulation of Investigatory Powers Act 2000 CHAPTER 23 ARRANGEMENT OF SECTIONS Part I Communications Chapter I Interception Unlawful and
More informationPOLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE) CODE E CODE OF PRACTICE ON AUDIO RECORDING INTERVIEWS WITH SUSPECTS
POLIC AND CRIMINAL VIDNC ACT 1984 (PAC) COD COD OF PRACTIC ON AUDIO RCORDING INTRVIWS WITH SUSPCTS Commencement - Transitional Arrangements This code applies to interviews carried out after midnight on
More informationPOLICE AMENDMENT ACT 2003 BERMUDA 2003 : 7 POLICE AMENDMENT ACT 2003
BERMUDA 2003 : 7 POLICE AMENDMENT ACT 2003 [Date of Assent: 22 April 2003] [Operative Date: Notice in Gazette] WHEREAS it is expedient to amend the Police Act 1974 to establish procedures for the treatment
More informationOfficial Journal of the European Union
13.3.2015 L 68/9 DIRECTIVE (EU) 2015/413 OF THE EUROPEAN PARLIAT AND OF THE COUNCIL of 11 arch 2015 facilitating cross-border exchange of information on road-safety-related traffic offences (Text with
More informationThe Open Rights Group
The Open Rights Group Response to Forensic Use of bioinformation: ethical issues, Consultation Paper of the Nuffield Council on Bioethics from The Open Rights Group 1. The interpretation of bioinformation
More informationBlackstone s Police Manuals
Blackstone s Police Manuals Update January 2006 Serious Organised Crime and Police Act 2005 PACE Codes of Practice Fraser Sampson David Johnston & Glenn Hutton [Updated to reflect the Centrex OSPRE Part
More informationTHE STATUTES OF THE REPUBLIC OF SINGAPORE ENERGY CONSERVATION ACT (CHAPTER 92C)
THE STATUTES OF THE REPUBLIC OF SINGAPORE ENERGY CONSERVATION ACT (CHAPTER 92C) (Original Enactment: Act 11 of 2012) REVISED EDITION 2014 (31st May 2014) Prepared and Published by THE LAW REVISION COMMISSION
More informationProposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 18.7.2014 COM(2014) 476 final 2014/0218 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL facilitating cross-border exchange of information on road
More informationMEMORANDUM OF UNDERSTANDING. Association of Chief Police Officers England & Wales
MEMORANDUM OF UNDERSTANDING Association of Chief Police Officers England & Wales and The Financial Services Authority 1. Definition of terms used in this Memorandum of Understanding ACPO The Association
More informationData Protection Act 1998 Policy
Data Protection Act 1998 Policy Responsibility for Policy: Relevant to: University Secretary All Staff, Students and Academic Partnerships Approved by: SMT in September 2016 Responsibility for Document
More informationPolice stations. What happens when you are arrested
Police stations What happens when you are arrested This factsheet looks at what happens at the police station when the police think you have committed a crime. This factsheet may help you if you, or someone
More informationA GUIDE TO CIVIL ACTIONS AGAINST THE POLICE
A GUIDE TO CIVIL ACTIONS AGAINST THE POLICE A GUIDE TO CIVIL ACTIONS AGAINST THE POLICE THE AIM OF THIS BOOKLET IS TO PROVIDE SOME ASSISTANCE IN THE FIELD OF CIVIL ACTIONS AGAINST THE POLICE CONTENTS 02
More informationELECTION OFFENCES ACT
LAWS OF KENYA ELECTION OFFENCES ACT NO. 37 OF 2016 Revised Edition 2017 Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev. 2017] No.
More informationSTATUTORY INSTRUMENTS. S.I. No. 258 of 2014
STATUTORY INSTRUMENTS. S.I. No. 258 of 2014 EUROPEAN UNION (RAILWAY SAFETY) (REPORTING AND INVESTIGATION OF SERIOUS ACCIDENTS, ACCIDENTS AND INCIDENTS) REGULATIONS 2014 2 [258] S.I. No. 258 of 2014 EUROPEAN
More informationAttorney General Law Enforcement Directive No
Attorney General Law Enforcement Directive No. 2015-1 AG Directive No. 2015-1 was issued to provide guidance to police departments on the use and deployment of BWCs. The Directive is intended to establish
More informationForce File Plan - NOT PROTECTIVELY MARKED
Alarms Aliens-Commonwealth Citizens Briefings Canteens-Cleaning Chief Constable's Log Conferences-Meetings Contract Kennels Correspondence Crime Intelligence Circulations Crime Stoppers Partners Duties-Deployment
More informationTHIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA
THIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA DIPLOMA IN LAW DIPLOMA IN THE COMMON LAW LLB ALL SCHEMES AND ROUTES BSc DEGREES WITH LAW Common Law Reasoning and
More informationTerrorism Bill [AS AMENDED ON REPORT] CONTENTS PART 1 OFFENCES
[AS AMENDED ON REPORT] CONTENTS PART 1 OFFENCES Encouragement etc. of terrorism 1 Encouragement of terrorism 2 Dissemination of terrorist publications 3 Application of ss. 1 and 2 to internet activity
More informationNOT PROTECTIVELY MARKED
NOT PROTECTIVELY MARKED LINCOLNSHIRE POLICE Policy Document Code of Ethics All staff involved in carrying out functions under this policy and associated procedures and appendices will do so in accordance
More informationPRIVACY MANAGEMENT PLAN
PRIVACY MANAGEMENT PLAN September 2015 Contents 1. Introduction... 3 1.2 Purpose... 3 1.3 Scope... 3 1.3 Section 41 Directions... 3 1.4 Complaints... 4 2. Definitions... 4 2.1 Personal Information... 4
More informationSecurity and Investigation Agents Act 1995
Version: 28.4.2008 South Australia Security and Investigation Agents Act 1995 An Act to regulate security and investigation agents; to repeal the Commercial and Private Agents Act 1986; and for other purposes.
More informationVictoria Police Manual
General Category Operations Topic Searches Victoria Police Manual VPM Instruction 105-1 Searches of persons Originally Issued 11/07/03 Last Updated 08/01/07 Update History 1. Policy Police members have
More informationTranslation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland
Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)
More informationINFORMATION SHARING AGREEMENT WEST YORKSHIRE POLICE. and LEEDS AND YORK PARTNERSHIP NHS FOUNDATION TRUST
INFORMATION SHARING AGREEMENT WEST YORKSHIRE POLICE and LEEDS AND YORK PARTNERSHIP NHS FOUNDATION TRUST Version 4.0 1 of 14 CONTENTS SUMMARY SHEET 1. INTRODUCTION 2. PURPOSE 3. PARTNER(S) 4. POWER(S) 5.
More informationTELECOMMUNICATIONS AND POSTAL OFFENCES ACT
TELECOMMUNICATIONS AND POSTAL OFFENCES ACT ARRANGEMENT OF SECTIONS PART I Telecommunication offences 1. Tampering with wireless cables, etc. 2. Illegal operation of telephone call offices, etc. 3. Radio
More informationFreedom of Information Act 2000 (Section 50) Decision Notice
Freedom of Information Act 2000 (Section 50) Decision Notice Date: 6 September 2011 Public Authority: Address: The Chief Constable Kent Police Headquarters Sutton Road Maidstone Kent ME15 9BZ Summary The
More informationAnglo American Procurement Solutions Site
Anglo American Procurement Solutions Site Access Terms and Conditions Anglo American Services (UK) Ltd Anglo American Procurement Solutions Site Access Terms and Conditions ~*~ Access Terms and Conditions
More informationHAULAGE PERMITS AND TRAILER REGISTRATION BILL DELEGATED POWERS IN THE BILL MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT
HAULAGE PERMITS AND TRAILER REGISTRATION BILL DELEGATED POWERS IN THE BILL MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT INTRODUCTION 1. This Memorandum has been prepared for the Delegated Powers and Regulatory
More informationCovert Human Intelligence Sources Code of Practice
Covert Human Intelligence Sources Code of Practice Presented to Parliament pursuant to section 71(4) of the Regulation of Investigatory Powers Act 2000. 2 Covert Human Intelligence Sources Code of Practice
More informationNational Policing Improvement Agency Circular
National Policing Improvement Agency Circular NPIA 01/2011 This circular is about: From: Date for implementation: March 2011 For more information contact: This circular is addressed to: Copies are being
More informationSPEED ENFORCEMENT GUIDELINES
Security Classification: UNCLASSIFIED Accessible on the ACPO Intranet by: All Contents may be seen by: General Public subject to Copyright Author: Kenneth Williams Force/Organisation: Norfolk Constabulary
More informationStrategic Trade 1 STRATEGIC TRADE BILL 2010
Strategic Trade 1 STRATEGIC TRADE BILL 2010 ARRANGEMENT OF CLAUSES PART I PRELIMINARY Clause 1. Short title and commencement 2. Interpretation 3. Prevailing law 4. Extra-territorial application PART II
More informationGuidance Manual Finance Act 2015 Amendment of Chapter 4 (Powers of Officers)
Guidance Manual Finance Act 2015 Amendment of Chapter 4 (Powers of Officers) of Part 2, Finance Act 2001 This document should be read in conjunction with Chapter 4 of Part 2 of the Finance Act 2001 (Powers
More informationPolice and Fire Reform (Scotland) Bill [AS INTRODUCED]
Police and Fire Reform (Scotland) Bill [AS INTRODUCED] CONTENTS Section 1 The Scottish Police Authority 2 Functions of the Authority 3 Maintenance of the police 4 General powers of the Authority Directions
More informationGUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol
GUEST WIFI NETWORK Terms and Conditions and Acceptable Use Protocol PLEASE READ THESE TERMS AND CONDITIONS AND THE ACCEPTABLE USE PROTOCOL CAREFULLY BEFORE USING THE GUEST WIFI NETWORK SERVICE TERMS AND
More informationSimple Cautions for Adult Offenders
Simple Cautions for Adult Offenders Commencement date: 8 th April 2013 Contents Introduction... 4 Aims and purpose of the simple caution for adult offenders scheme... 4 Overview of the scheme... 4 SECTION
More informationTelecommunications (Interception Capability and Security) Bill
Government Bill Explanatory note General policy statement This Bill repeals and replaces the Capability) Act 2004. The main objectives of the Bill are to ensure that the interception obligations imposed
More information