Not Protectively Marked POLICY IDENTIFICATION PAGE POLICY Security Classification: Not Protectively Marked Disclosable under Freedom of Information Act 2000 Yes / No: POLICY TITLE: PND Audit Strategy and Plan POLICY REFERENCE NUMBER: 2564555 Yes POLICY OWNERSHIP Business Area: Department Responsible: Post-holder: Enabling Services Directorate Corporate Services Superintendent Tedds (Title and name) POLICY IMPLEMENTATION DATE: 2011 POLICY REVIEW DATE: June 2014 Warwickshire Police welcomes comments and suggestions from the public and staff about the contents and implementation of this policy. Please write to the Force Policy Manager, Corporate Services Department, at Leek Wootton, Warwick, CV35 7QB or complete the feedback form located on our website (http://www.warwickshire.police.uk/contactingthepolice/ccf) Not Protectively Marked Not Protectively Marked 1.0 POLICY OUTLINE 1.1 The Police National Database (PND) is a CONFIDENTIAL system, which houses a vast amount of sensitive information. It is vital that a structured and robust audit regime is in place both centrally and locally in Forces. The PND has massive benefits for Forces and assists investigations and operations across the country. By placing all our information into one ‘pot’ the service is taking a risk to ensure there is better ‘policing’ across the UK. 1.2 The Deputy Chief Constable of Warwickshire Police as the Senior Information Risk Officer (SIRO) for the PND is responsible for ensuring that: • • • • The Warwickshire Police records on the PND achieve acceptable levels of data quality The PND records are only accessed for a policing purpose Only authorised personnel who have received the necessary security clearance are allowed to access the PND system The computers used to access the system are located in appropriate environments restricted to authorised personnel 2.0 PURPOSE OF POLICY 2.1 The purpose of this policy is to ensure that the responsibilities described in paragraph 1.2 above are enforced. 2.2 This policy has been guided by: ACPO Data Protection Manual of Guidance (Part II Audit) (ACPO) ACPO/ACPOS Community Information Security Policy (ACPO/ACPOS) NPIA Minimum NSS Supervision and Audit Standards (NSS Governance Authority) NPIA Audit and Inspection (Graham Cox) ACPO Guidance on the Management of Police Information (second edition) 3.0 IMPLICATIONS of the POLICY 3.1 Consider the below implications of the policy and make comment only in those areas of significance. The following are examples: • • • • The financial implications of this policy are restricted to the need to employ skilled staff in order to conduct the audit plan No training implications are anticipated No Health and Safety risks are anticipated as a result of this policy This policy will comply with Human Rights / Equality / Data Protection / Freedom of Information / Health and Safety legislation? 4.0 CONSULTATION 4.1 See Appendix C for the Equality Analysis (EA) for this policy. 4.2 This policy has been prepared in consultation with the SIRO, Force Security Officer, Force Data Protection Officer, Force Information Assurance Manager and the PNC Bureau Manager. Not Protectively Marked Not Protectively Marked 5.0 DOCUMENT HISTORY 5.1 The policy will be subject of regular review once ratified by the Monthly Alliance Chief Officer Group (MACOG). 5.2 The history of the policy will be recorded using the below chart: Version & Date V1.0 Author / Reviewer Paul Hoskins V1.1 Jackie Whordley Amendment(s) New Policy Addition of process for Non Standard Services Approval / Adoption JNCC 3/3/2011 FEB 22/3/2011 MACOG 12.07.2012 6.0 PROCEDURE 6.1 Procedure is the method by which the ‘strategic intent’ of this policy is realised please see appendix A for a description of the procedure. 6.2 Appendix B relates to the audit framework for the Non Standard Services (NSS) of the Police National database. Not Protectively Marked Not Protectively Marked APPENDICES Appendix A PND Audit Procedure 1. 2. 3. 4. 5. 6. 7. 8. Appendix B Non Standard Services (NSS) Audit Framework 1. 2. 3. 4. 5. 6. 7. 8. 9. Appendix C Data Quality Audits Local Data Security Audits Transaction Audits Transaction Audit Sample Size Retention of Transaction Audit Records PND Reporting Output Audit Security of Environment Check User Access Audit PND Overview Personnel Security Security Breach and Incident Reporting Audit Process Introduction Risk Assessments NSS Audit Objectives Transaction Validation Retention Conclusion Equality Analysis Not Protectively Marked Not Protectively Marked Back to Index Appendix A PND Audit Procedure 1. Data Quality Audits 1.1 The PND contains data uploaded from the 43 Police Forces of England and Wales, as well as other agencies such as CEOP (Child Exploitation and Online Protection Centre) and the Civil Nuclear Constabulary. The data is made up of records from forces’ Intelligence, Child Protection, Domestic Abuse, Crime and Custody systems. The Warwickshire Police records held on the PND system are not created or modified on the PND system, but are copies of the records held on the source systems within the Force. The Warwickshire Police PND implementation team ensure that the quality of the data upload is acceptable by monitoring data quality and providing feedback to each source system owner. The data quality of the records on the system depends upon the local data quality audits carried out on each of the source data systems. This policy is not concerned with the local data quality audits, but with the audits that are required to ensure the security of data and security of access to data for PND within Warwickshire Police. The local data quality audits are described elsewhere (see Warwickshire Audit and Inspection Policy). 2. Local Data Security Audits 2.1 Warwickshire Police local data security audits encompass the bulk of the auditing function with regard to end user activities within the PND. These cover the following: • • • • • • 3. Searching – incorrect justifications, incorrect search template, non-policing purpose search, inappropriate disclosure of data Ensuring the correct Management Information reports are in place Extraction – incorrect justification, inappropriate use of information, excessive extraction Ensuring that access to PND desktop computers is controlled and that the computers are located within a secure environment appropriate for a Confidential system Ensuring that users of the PND system are authorised and have the necessary level of security clearance required to access the system Ensuring that the PND access levels granted to users are appropriate to their role within the Force and that user access is managed correctly when users change their role or leave the Force Transaction Audits 3.1 The security of any database depends, to a large extent, on being able to retrospectively account for each transaction. The audit procedure tests this capability. 3.2 Transaction audits are conducted on a regular basis to: • • • • 3.3 Deter and detect inappropriate use of the PND system Deter and detect unauthorised access to the PND system Raise staff awareness of data protection issues, and maintain public confidence Ensure that all relevant transaction fields are completed to provide an adequate audit trial for retrospective investigations into transactions that have been carried out When examining transactions, the following areas are examined: • • Transaction fields are examined for quality Is there sufficient detail to be able to trace the inquiry back to the originator? Not Protectively Marked • Not Protectively Marked The legitimacy of the check is confirmed by questioning the originator or by checking any references provided to source documents 3.4 Any errors found as a result of the transaction checks are categorized and noted. The collation of results enables recurrent errors, error trends and the individuals involved to be identified and permit corrective action. 3.5 The business processes for running a query on the PND within Warwickshire Police are: • • Centralised input by a dedicated data bureau (e.g. 24/7 Intel) Individual input by Police Officers or Police Staff who are working on a case 3.6 Given the small number of licences available to Warwickshire for the PND, and the need to keep the computers used to access the PND in a secure environment, running queries through a centralised bureau is the most secure and efficient option. Some Departments will have their own direct access to PND. Officers or Police Staff who do not have direct access are required to fill in a request form to be submitted to the bureau. 3.7 The bureau business process has the advantage that it reduces the level of risk because specialist data input staff run the queries. This minimises the number of errors such as data transcription, spelling and incorrect completion of fields. The bureau approach provides a greater degree of confidence in the data quality of the queries submitted. 3.8 When a transaction is selected as part of an audit, a form is sent to its originator. The originator is requested to supply the reason for the enquiry . Any originating source records also need to be identified. 3.9 Whilst the Data Protection Officer (DPO) is not necessarily involved directly in the audit process, it is essential that the DPO should have input into the planning and consultation of the process, and be provided with details of the results of the checks annually. 3.10 Any misuse of the PND system or patterns of behaviour, which are indicative of misuse, are reported to the Force Professional Standards Department with supporting evidence. Professional Standards then carry out an impartial investigation to establish if there has been any misuse. 4. Transaction Audit Sample Size 4.1 The number of transactions checked is proportionate to the total number of transactions carried out. The proportion is determined by the Audit Inspection Unit. 4.2 Where appropriate, the formula recommended in the ACPO Data Protection Manual of Guidance (Part II Audit) will be used to establish a more proportionate sample size. 4.3 The sample of PND queries selected for audit is made randomly and transaction audit forms are sent to those Officers selected for sample regardless of Age, Disability, Gender, Race, Religion/Belief or Sexual Orientation. 5. Retention of Transaction Audit Records 5.1 Transaction audit records will be maintained for 6 years in line with the Management of Police Information System (MOPI) and DPA guidelines. Back to Index Not Protectively Marked Not Protectively Marked 6. PND Reporting Output Audit 6.1 Annually the Departments who have access to the PND system will be audited to check that the outputs from the system are being processed in a correct manner. 6.2 The PND system has been classified as a confidential system. Therefore any data extracted from the system must be handled according to the Government Protective Marking Scheme (GPMS). 6.3 The audit will examine departmental processes to ensure that extracted PND data is handled appropriately and in a secure manner. Data must not be transmitted over unsecured networks or copied to unsecured media in order to communicate the results of PND queries to the query originator. 6.4 A short report will be produced annually detailing the findings of this audit. The report will be circulated to the Force Security Officer (FSO) and the SIRO. 7. Security of Environment Check 7.1 Annually Departments will be checked for the location and security of the computers used to access the PND: • • • Computers used to access the PND must be located in a secure environment only accessible to security cleared staff at all times Computers used to access the PND must have the required secure-id card access All access to PND computers must be controlled by an “identity access management” (IAM) system with access levels controlled to only allow access to authorised personnel 7.2 These checks and any others specified by the FCO will be carried out for each department with access to the PND system. 7.3 A short report will be produced detailing the findings of this audit. The report will be circulated to the FCO and the SIRO. 8. User Access Audit 8.1 Annually an audit will be performed of the users who have accounts on the PND system. The accounts will be checked to ensure: • • • That users are still valid (that they have not left the Force, or moved to a role that no longer justifies access to the PND system) That the access level granted to the user is appropriate to their role in the organisation That users have received the necessary security clearance required to access data on a confidential system 8.2 A short report will be produced detailing the findings of this audit. The report will be circulated to the FCO and the SIRO. Not Protectively Marked Not Protectively Marked Back to Index Appendix B Non Standard Services (NSS) Audit Framework 1. PND Overview 1.1 This appendix provides an audit framework for the Non Standard Services (NSS) of the Police National Database, (PND) within Warwickshire. It provides a background to the auditing processes associated with the PND and it goes on to explain how the force will conduct its audit framework. It should be read in conjunction with the Warwickshire PND Code of Practice 2010 and the NPIA guidance on the Police National Database 2010. 1.2 It is aimed at all officers and staff who may seek to utilise the NSS functionality within PND in the course of their duties both as a requestor or user of PND information. 2. Personnel Security 2.1 All authorised users must be cleared to at least the ACPO Management Vetting level. All users of Information and Communication Technology (ICT) are to be aware of the Computer Misuse Act 1990 and the law covering the authorised access or modification of computer data. 2.2 All users of ICT have a part to play in ensuring the security and integrity of the systems they use. The authorised user is to sign as having read, understood and agree to comply with these SyOP’s. The PND System Administrator will arrange this. 2.3 The sharing of user accounts and associated passwords / authentication is prohibited. 3. Security Breach and Incident Reporting 3.1 In order to minimise risk, impact or embarrassment to Warwickshire Police, it is important that details of actual or suspected breaches of the above procedures and related security incidents are reported to the FISO as swiftly as possible as per the Force Information Security Policy. 3.2 Through the course of the investigation into any alleged breach of SyOP's or network misuse, all authorised users are advised that an audit of their network usage may be requested by the FISO or Professional Standards Department at any time. 4. Audit Processes Introduction 4.1 An audit is an evaluation of a person, organisation, system, process, enterprise, project or product against a defined standard. The purpose of the audit is to ensure that the NSS functionality of PND is being used in a manner that is secure and proportionate within the relevant legislation and agreed terms and standards. The audit should provide assurances to staff, stakeholders and 3rd parties that the information contained within the system is being treated with due care and attention. This is particularly important to Chief Constables who will be sharing information they own, with other Police Forces. Not Protectively Marked Not Protectively Marked 5. Risk Assessments Back to Index 5.1 The NPIA have advised that each Force must evaluate their own risks internally and formulate an audit plan based on this assessment. An assessment of each area will need to be completed using the risk assessment spreadsheet provided by the NPIA. The completed risk assessments will allow the auditor to identify those areas of the force that carry a higher risk and the audits will primarily focus on the higher risk areas. 6. NSS Audit Objectives 6.1 In order to comply with the minimum audit standards of the NSS that have been set by the NPIA, it is necessary to complete transaction validations for searches made in the NSS PND. 6.2 Local supervision is necessary to validate that the use of NSS for the transaction is proportionate to the requirements and that there is no obvious improper use of either the covert facility or the information available on the system. 6.3 This responsibility will fall to the line manager in units where there are NSS users as this person will be best placed to understand: • The level of access allocated to staff • The appropriate volume of transactions • That the use of NSS is in accordance with the PND covert searching principles. 6.4 It is anticipated that the line manager will not need access to the audit capabilities in NSS to fulfil this responsibility and that there will be sufficient detail available in the NSS MI reports to identify if NSS user activity is proportionate to the needs of the unit. If a supervisor needs to look deeper into any of the transactions examined during dip sampling, then Transaction Validation will be used. 6.5 It has been recommended that daily dip samples should take place, but as a minimum requirement these audits should be undertaken on a monthly basis. 6.6 There should be a minimum dip sample of 5% of all covert transactions. 7. Transaction Validation 7.1 Transaction validation will take place to validate that a transaction carried out by an NSS user on PND is in compliance with National and Local Policy. 7.2 This will be the responsibility of the local NSS auditor and will involve an in-depth investigation into the transaction to verify all aspects of the activity that was undertaken by the user. 7.3 The local NSS auditors should carry out sufficient in-depth transaction validation checks per month that will satisfy them that NSS functionality is being used correctly by the force NSS users. As a minimum, at least 3 transaction validation checks will be carried out per month. 7.4 Transactions will be randomly selected by the local NSS auditor for validation, and verified by a local supervisor to ensure compliance with the law and guidance on use of the PND. Equally the activity of transaction validation may be triggered by the results a line manager finds during local supervision activities. 7.5 The transaction validation procedure can be undertaken jointly by the line manager of the user and the local NSS auditor. The fundamental aim of this process is to be in a position to correctly validate the transaction. Not Protectively Marked Not Protectively Marked Back to Index 7.6 As an example, a transaction validation activity should include some or all aspects of the following, as appropriate: • Examine the audit log entry for the NSS transaction selected: o o o o o o o o Who conducted the PND search? The date and times of the session Was the user on duty at date / time? Does transaction match the usual area of work? Is the search justification sufficiently detailed? What was the likely result of the search, and does this cause any concern? If transaction ‘on behalf of’, examine above re the originator? Does the 'on behalf of' field contain a traceable individual? • o o • Validation: Ask user / originator for evidence of the need for the search – reference numbers / paperwork Establish if NSS was necessary for transaction Review: o o o Manager / auditor conducting validation reviews the evidence and determines if NSS transaction validated Record steps taken to validate transaction and result. Return to be logged by the local NSS Auditor or refer for further action It is essential that a sufficient number of transactions are selected and the procedure is carried out in a thorough manner to ensure the validity of transactions. 7.7 The audit results should be recorded in order to determine if there are any recurrent errors or individuals involved in the errors. 7.8 In all cases, a record of the Local Supervision Review and Transaction Validation Reviews will be maintained by the Independent Auditor in Professional Standards. Supervisors will ensure that the details of the reviews that they conduct are forwarded to the Independent Auditor in Professional Standards for recording. 7.9 The National NSS auditor will have responsibility for conducting reviews of force covert audit regimes. The level of NSS use in each force will be available to the National NSS auditor in order to establish if the minimum audit standards are being applied. 8. Retention 8.1 All audit documentation will need to be retained for external inspections this is to include: • • • • • Force audit plans including supporting risk assessments Schedules showing summary detail of work carried out. Papers to support the audit conclusions Copies of audit reports Management responses to audit reports Not Protectively Marked Not Protectively Marked 8.2 All audit documentation will be held in accordance with MOPI and retained for six years. 9. Conclusion 9.1 This audit document will need to be continually reviewed as the Police National Database develops and further functionality becomes available. 9.2 The version control will confirm that changes have been made. 9.3 In the event a PND user is subject to a Tribunal or Court proceedings, the National Auditor will need to be contacted in order to validate the findings of all audit activity undertaken. 9.4 The [email protected] will need to be consulted for NSS audits. Not Protectively Marked Not Protectively Marked Appendix C Equality Analysis Policy/Function being assessed PND Audit Strategy and Plan 1. Identify all aims of the policy/function 1.1 Identify the aims and projected outcomes of the policy This policy describes the strategy and plan for the audits to be carried out on the Police National Database (PND) within Warwickshire Police. 1.2 Which individuals and organisations are likely to have an interest in, or likely to be affected by, the policy? All members of Warwickshire Police Force. Members of the public whose personal data is held on the database. 2. Consider the evidence 2.1 What relevant quantitative data has been considered? There is no relevant data for the purposes of this assessment. Age Disability Gender Reassignment Marriage and Civil Partnerships Pregnancy & Maternity Race Religion or Belief Sex Sexual Orientation 2.2 What relevant qualitative information has been considered? This policy is based on guidance from the National Policing Improvement Agency and ACPO. There is no qualitative information available to add to this assessment. Age Disability Gender Reassignment Marriage and Civil Partnerships Pregnancy & Maternity Race Religion or Belief Sex Sexual Orientation 2.3 None. What gaps in data / information were identified? 2.4 What consideration has been given to commissioning research? Research is not considered necessary to complete this assessment. Not Protectively Marked Not Protectively Marked 3. Assess likely impact 3.1 From the analysis of data and information has any potential for differential / adverse impact been identified? Age None. Disability None. Gender Reassignment None. Marriage and Civil None. Partnerships Pregnancy & Maternity None. Race None. Religion or Belief None. Sex None. Sexual Orientation None. 3.2 N/A If yes, explain any intentional impact. 3.3 If yes, explain what impact was discovered which you feel is justifiable in order to achieve the overall policy aims. Please provide examples. N/A 3.4 None. 4. Are there any other factors that might help to explain differential / adverse impact? Consider alternatives 4.1 Summarise what changes have been made to the policy to remove or reduce the potential for differential / adverse impact. N/A 4.2 Summarise changes to the policy to remove or reduce the potential for differential / adverse impact that were considered but not implemented, and explain why this was the case. N/A 4.3 If potential for differential / adverse impact remains, explain why implementation is justifiable in order to meet the wider policy aims. N/A 5. Consult formally 5.1 Has the policy been subject to consultation? If no, please state why not. If yes, state which individuals and organisations were consulted and what form the consultation took. Consultation has been carried out internally as per Force policy and procedure. This includes being subject of discussion at JNCC where representatives of senior management and all staff associations/networks are represented. Age As above. Disability As above. Gender Reassignment As above. Not Protectively Marked Not Protectively Marked Marriage and Civil Partnerships Pregnancy & Maternity Race Religion or Belief Sex Sexual Orientation 5.2 As above. As above. As above. As above. As above. As above. What was the outcome of the consultation? No issues were identified relevant to equality issues. 5.3 Has the policy been reviewed and / or amended in light of the outcomes of consultation? No – not required. 5.4 Have the results of the consultation been fed back to the consultees? N/A 6. Decide whether to adopt the policy 6.1. Provide a statement outlining the findings of the impact assessment process. If the policy has been identified as having a possibility to adversely impact upon diverse communities, the statement should include justification for the implementation. This assessment has not identified potential for adverse impact in relation to equality. The policy acts as a safeguard to ensure public data held on the PND database is being recorded, processed and used in accordance with national standards. The auditing strategy helps to ensure that national standards and requirements are being upheld. 7. Make Monitoring Arrangements 7.1. What consideration has been given to piloting the policy? This policy was not piloted because Warwickshire Police requires immediate implementation of a strategy and plan for PND auditing. This is a mandatory requirement for the implementation of the PND system 7.2. What monitoring will be implemented at a national level by the policy owning agency and / or other national agency? We anticipate that external inspection agencies such as the HMIC will inspect the force in the future to ensure that audit and security measures are in place for the PND 7.3. Is this policy intended to be implemented by local agencies that have a statutory duty to impact assess policies? If so, what monitoring requirements are you placing on that agency? No, this is a Warwickshire Police policy. Not Protectively Marked Not Protectively Marked 8. Publish Assessment Results 8.1. What form will the publication of the impact assessment take? As per Force policy – viz. on the force website. This impact assessment has been undertaken by: Date: 2nd February 2011 Reviewed 30th May 2012 Name: D P Hoskins Not Protectively Marked
© Copyright 2024 ExpyDoc