CJS Efficiency Programme

Size: px
Start display at page:

Download "CJS Efficiency Programme"

Transcription

1 CJS Efficiency Programme Background The CJS Efficiency Programme is modernising the CJS by reducing or removing the movement of paper, and people, around the system. Streamlined digital working is part of this programme, delivering an efficient process for the preparation and use of a single digital file that is jointly used and owned by the police, CPS, HMCTS and defence. The programme is led by the heads of the core CJS delivery agencies: Peter Lewis (CPS); Peter Handcock (HM Courts & Tribunals Service); and, Jim Barker-McCardle (ACPO). The programme team is in constant contact with the defence and other practitioners affected by digital working. This list of questions is regularly updated and contains the most up-to-date information. If your question is not covered, please contact the programme team at the CJS Efficiency Programme. Defence Practitioner Frequently Asked Questions 1. What does digital working mean for us? From April 2012, the CPS are producing a digital case file. A digital file can be used for all cases in which a defence practitioner has been identified. The cases are made available to the defence by CJSM Secure , and/or via a link to the Document Repository Service (DRS) when available later in While April was a key staging point change will be incremental, led by local planning and depending on local circumstances. 2. What happens if we decide not to adopt digital ways of working? It is a business decision as to how quickly a practitioner or firm adopts new ways of working. There are opportunities, savings and operational implications to be considered, In the short term, paper-based service will continue. However, as digital working becomes prevalent across all criminal justice agencies, use of paper will diminish and all parties will be expected to adapt to new ways of working. CJSM Secure 3. Does CJSM Secure cost anything? No it s free at the point of use. 4. How quickly can we sign up to CJSM Secure ? Version May 2012 Page 1 of 12

2 The whole registration process takes approximately 7 days to complete, please go to and click on Join Now. 5. Do the Terms of Use for CJSM Secure prohibit the use of WiFi? CJSM Secure may be accessed by secure WiFi but NOT by unsecured WiFi as the user login details could be intercepted. 6. How do I request the digital file? You can request the digital file Via CJSM Secure to the CPS office dealing with the case. Please make contact with your local CPS office for a list of contact addresses. We are ensuring that all CPS offices have their local group mailboxes listed on the CJSM Secure directory. If they are changed in the future, they will be updated. 7. At what point in the life of a case will the digital file be made available to us? Defence will have access to a digital file from the CPS as soon as possible after charge. The defence will be able to use the digital file for all their purposes, including presenting their case in court. 8. How will this work for unrepresented defendants, defendants in custody or those granted representation on the morning of a first hearing? A number of options are being considered, however, it is likely to remain paper-based until such time as other options are explored. This means the CPS will provide a paper file for unrepresented defendants and first time custody cases at court. Where representation is known and where the case is not completed at the first appearance, then the process will be digital from that point on. For bailed first appearances, there may be some interim paper based solutions to allow the defence sufficient time to access and consider the digital file. 9. Who can I contact using CJSM Secure ? You can any other user of CJSM Secure completely securely by using their Secure address, ending with the extension cjsm.net. You can also securely anyone within a CJS agency (normally addresses that include.gsi..pnn.gsx.gcsx and.nhs.net (NOT.nhs.uk) by adding the extension.cjsm.net to the end of the departmental address, for example john.smith@justice.gsi.gov.uk.cjsm.net. For defence firms who have the secure server to server (SMTP) connection to CJSM Secure , have to ensure that their users fully understand that they have to add.cjsm.net to the end of CJS Agency addresses as otherwise the will be treated as a normal non-secure and sent via the open internet to the recipient, even if it is a secure CJS address (i.e. containing.gsi..pnn.gsx.gcsx). Version May 2012 Page 2 of 12

3 10. How will defence receive large files that are too big for CJSM Secure accounts? Any digital file larger than the 10MB limit for CJSM Secure will be served on an encrypted disk. In the future, the Document Repository Service (DRS) will allow files of any size up to 100 MB to be made available when the system has been fully rolled-out. 11. What is the maximum mailbox size for CJSM Secure ? The maximum mailbox size for a hosted service is 100MB. Your local CJSM Secure Administrator will have access to change individual mailboxes up to this limit. 12. Are there prohibitions on storage of such s in the cloud or on non-uk based servers? You can use cloud computing providers but your service provider will need to be vetted by the Ministry of Justice (MoJ) first. The MoJ are happy for cloud service providers, whose servers reside within the UK, to apply for accreditation to connect to CJSM Secure . Enquiries should be sent via the CJSM Helpdesk cjsm.helpdesk@cw.com or Cloud computing providers must be accredited because data transferred to servers outside of the UK becomes subject to the laws of that country. For example, under the USA Patriot Act, the US Government can ask for data that is held on Microsoft EU data centres to be handed over to them, as Microsoft are a US based company. 13. Can I use collaborations tools in the cloud to share information with expert witnesses? Yes, but again, the cloud collaboration service provider must be approved by the MoJ. Data transmitted by CJSM Secure may not be stored on unapproved collaboration or cloud services. 14. Is there any training for CJSM Secure users? Yes. An online training package is available at It is very straightforward to use. 15. Will there be a helpline if I have a technical problem? You can contact the CJSM Secure helpdesk on between 08:00 and 19:00 Monday to Friday, or cjsm.helpdesk@cw.com. Document Repository Service (DRS) Version May 2012 Page 3 of 12

4 16. What is the DRS? The DRS is an MoJ web-based service that will provide a way of securely sharing documents and digital files between CJS partners and the defence. The repository will allow the Police to share documents and media such as video files, images and audio files etc. with the CPS. The CPS will then inturn publish the digital multimedia and case material to others such as the Courts and defence practitioners. 17. Will there be a helpline if I have a technical problem? There will be a helpdesk for the Document Repository Service (DRS) available when the service goes live. IT and security requirements 18. What IT do I need? You must have an IT system which enables you to perform your obligations under the LSC contract. However, no bespoke IT equipment is needed to receive, open and view the digital file provided by the CPS or access CJSM Secure . The proposed system of digital working is not driven by hardware or proprietary software. The CPS electronic bundle product is an open source PDF based file, which can be accessed and used across any modern operating system i.e. Apple Mac OSX, Windows XP/Vista/7 and Linux based hardware, and by using any PDF reader/editor software. Additionally, you will need access to an internet connection to access to CJSM Secure and, in the future, the Document Repository Service (DRS). If you propose to access these systems using portable equipment, a FIPS accredited encryption is required for the device and for operating system you are running. 19. What IT security measures do I need to take? To ensure that you are complying with the requirements of the Data Protection Act, your portable IT must have whole device encryption, which is readily available. Any removable media such as USB flash drives must also be encrypted. Data should only be stored on suitably protected servers, which means that information and equipment can only be accessed by authorised individuals. The servers must be within the UK. 20. What about Blackberries and iphones? Version May 2012 Page 4 of 12

5 The terms and conditions of connection to CJSM Secure does not prohibit the use of mobile devices e.g. smart phones, tablets, etc. Such devices also need to encrypt any information held on the device when at rest as well as in transmission. The configuration details of the device need to be submitted to the CJSM Helpdesk for approval. Currently, Blackberries are compliant with the right settings applied but iphones are not accredited to the FIPS standard. If in doubt, contact the CJSM Helpdesk at or on How will defence practitioners encrypt their laptops? The encryption standard for laptops is recommended by the Information Commissioners Office (ICO) to ensure you are protected under the requirements in the Data Protection Act. Whole disk encryption software (BitLocker) is already built-in to Microsoft Vista and Windows 7, which has been approved for use by CESG. For Windows XP, TSols have provided information on products available from other suppliers. For Apple users, the Mac Operating System OSX 10.6 (Snow Leopard) and OSX 10.7 (Lion), Apple has provided guidance (see links below) on how to set up and maintain an Apple OSX FIPS enabled Mac with both OS X v10.6 Snow Leopard and OSX 10.7 Lion: How to set up and maintain a FIPS-enabled Mac OS X v10.6 Snow Leopard system How to set up and maintain a FIPS-enabled Mac OS X v10.7 Lion system 22. What if I need help with encryption? For more information on encryption please see the Information Commissioners Office (ICO) website on encryption: What format will the digital file be in? The digital case file (sometimes called a bundle, as the CPS use a bundling tool to prepare it) will be in Portable Document Format (PDF), which is a universally accepted open source file format which can be viewed on many freely available PDF readers and editors. We recommend that you use Adobe Reader X PDF reader, which is freely downloadable from Will the digital file be in a format which will enable it to be copied to disc and forwarded on to interested parties? Yes, the PDF digital file can be copied to disc/usb stick, with the right level of security and encryption applied. Version May 2012 Page 5 of 12

6 25. What information will I need to provide to the CPS before the digital file can be released? If a defence practitioner is known to be representing a defendant, the CPS will send you the digital file. You will need to show that you are the appointed representative, and be able to identify the case with the following minimum information: defendant(s) full name defendant(s) date of birth court hearing date 26. What happens if the file is updated later by the CPS? An updated version of the digital file will be provided. 27. Can I send the digital file on to other parties involved in the case? E.g. expert witnesses Yes, provided it is sent securely, typically to another CJSM Secure account, or via encrypted disk 28. Can I send the digital file on to my client? Under the Data Protection Act, you must first agree with your client, and they have signed a disclaimer to say they understand the risks of sending information across the open internet and are willing to receive the information by . However, if the data includes information of any other individual then, no, it is against the principals of the Data Protection Act to send personal data unless you have additionally obtained their permission to do so. The Law Society are in discussions with the Information Commissioner s Office around the feasibility of sending sensitive personal information via encryption technologies across the open internet via , and will provide an update as solutions are presented. 29. What is the average size in megabytes (MB) of a data file? It is anticipated the digital file, such as Initial Disclosure of the Prosecution Case (IDPC), will be in the region of 250KB to 1MB per file. Committal bundles will depend on the size of the case, but we estimate 4 to 5 MB. CJSM Secure has a maximum attachment size of 10MB per Will we need to be able to download data from the internet at court? No, because you either will have accessed the digital file in advance, or you will be in possession of a paper copy of the file if the defendant is in custody. It should be noted, that it is unlikely that the defence will need to access the Document Repository Service (DRS) in court, but the intention is to provide sufficient time for the defence to access the DRS prior Version May 2012 Page 6 of 12

7 to court. The CPS will similarly work from downloaded files and not access a live system in court. 31. Will there be adequate WiFi available in court for all agencies to use? HM Courts & Tribunals Service are currently testing a number of wired and wireless technologies but cannot guarantee access to the internet for the defence (or prosecutors) in all court locations. The outcome of testing secure wifi, and the associated costs, will inform a decision on the feasibility of making this a nationwide provision. Defence practitioners may also want to consider: access to the Internet from their own premises to prepare cases in advance of appearing in court and their own 3G access provision where the internet is not available. The CPS have made a commitment to provide paper for first time hearings where representation is only decided on the day. This all reduces the dependence on secure wifi access at court. 32. Where must the documents be stored? Will it have to be on my server? The digital file can be stored on your server or case and document management systems. Standard business continuity and disaster recovery process should already be in place. 33. What are the requirements regarding backing up the documents? Can we just have the documents on our laptops? If digital file is stored on your laptop, then again, standard business continuity and disaster recovery process should already be in place to have your device backed-up. Backup systems are also a requirment of the LSC standard crime contract. 34. Will any equipment or funding be provided? The CJS Efficiency Programme is being carried out against a backdrop of budget cuts set out in the Comprehensive Spending Review In this context, the MoJ is working with the programme and LSC colleagues to establish clear requirements for the defence community to work digitally alongside the CJS agencies. Costs associated with digital working will depend on a firm s IT infrastructure. Looking beyond initial start-up costs (if any) savings can be made from digital working across the end-to-end process, for example, reduced paper storage, transport and handling costs. The Programme will be working with the defence to produce a cost/benefit illustration. 35. Legal aid funding for Crown Court cases is based on the number of pages. Will this be affected by digital working? Version May 2012 Page 7 of 12

8 The Ministry of Justice has amended the Funding Order to include pages of evidence that have only ever existed digitally from 1 April This will mean there is no impact on the Crown Court fee as a result of digital working. 36. If I send an instead of making a call or writing a letter, will I be paid? Sending an will be treated the same as sending a letter or making a phone call for the purposes of legal aid funding. 37. When will the LSC be retendering the crime contracts? The LSC have no current plans to tender the standard crime contracts before This is in line with recent Ministerial announcements on the timing of consultation on price based competition for crime contracts. This timescale fits with the current contracts and their power to extend by up to 2 years: The terms and conditions require my organisation to have a business focused risk assessment ISO How do we carry out this assessment? Connection to CJSM Secure requires organisations to adhere to industry good practice for data protection. ISO provides a framework for assessing IT security. It is not necessary to have a specialist consultant carry out the assessment. The government website, Business Link, provides an IT security assessment tool, advice and links for further information. This is sufficient for a small to medium sized organisation: How much training will I need and what is the likely cost? Basic computer skills are needed to open, navigate and annotate the PDF electronic bundle using Adobe Reader software. There are a number of free online tutorials on the Adobe website and YouTube, if you are using Adobe Reader software. 40. Can I send data received by CJSM onto other organisations involved in the case, such as expert witnesses, across the open internet? If the client agrees to the transfer of data to the expert witness across the internet then yes, this is acceptable. However, if the data includes data of any other individual then, no, it is against the Data Protection Act for sensitive personal information and the terms and conditions of use of CJSM to send the information in across the open internet without any additional protection (encryption). However, expert witnesses are eligible to join CJSM - we already have a number of such users including many DNA testing laboratories, etc. Alternatively, you may use another form Version May 2012 Page 8 of 12

9 of commercial encryption to protect the . However, the data will always need to be handled in accordance with the Data Protection Act and CJSM Terms and Conditions. Court Presentation 41. Will the CPS have a full electronic file at Court? At present, in most cases, the CPS have the correspondence at Court but that is not sent to Counsel. Will that remain the position? The CPS will have the full electronic case available on our tablet PC/laptop device. 42. How will the witness refresh their memory both before and in Court? We fully understand that there will still be the need for some paper in the process. The CPS will be expected to print some statements for the witness, if they wish to review it before going into the courtroom. It will either be printed on the CPS printer at court or be printed before court. 43. Will the evidence served at Court be in hard copy or scanned and served electronically? Material which has been created digitally, such as digital photographs, will be served electronically. Evidence in hard-copy format will be scanned, with the original evidence being kept as part of the master file. Jury bundles will continue to be provided in paper format. We are currently working with HMCTS to develop a digital format. 44. Will the digital file be in a format which can be easily printed? For example, will each page will be the equivalent of an A4 page? The digital file is formatted to A4, although it could be printed at any size, if required. 45. What will the digital file look like? The digital file looks very similar in format and layout to the paper file, but with a number of important benefits. You will be able to quickly navigate the file through embedded bookmarks and hyper-links. The digital file is fully indexed and keyword searchable. Text size can be controlled to make the content easier to read depending on your personal preferences. The case bundler automatically creates a contents page, which are bookmarked and hyperlinked. So if, for instance, you wanted to get to the first witness statement, you click on the bookmark link and you are taken straight to the first witness statement. Version May 2012 Page 9 of 12

10 46. The Consolidated Criminal Practice Direction requires the indexing and pagination of evidence. Will the indexes and pagination remain as at present? The CPS will ensure that the electronic bundle complies fully with Practice Direction. 47. Can we re-order, mark and search the documents? Will we be able to copy sections of the documents and attach them to word documents? Yes, Adobe Reader X allows the full use of annotation, comment, mark-up and search tools on to the PDF electronic bundle document. If you have access to a PDF Editor, the electronic bundle can be re-ordered, added to and re-saved. The CPS does not apply any PDF security controls to the electronic bundle. 48. When we receive further information, will we be able to merge the documents so that there is just one file still? If you have access to PDF editing software, the document can be re-formatted as necessary. If supplementary documents such as witness statements or exhibits need to be added to the bundle at a later stage, they will be added to the end so that existing comments and annotations can be exported and re-used. 49. Are wet signatures still required? Analysis has been carried out covering the service of digital copies of wet signatures (and the service of electronic signatures themselves) and no legislative or regulatory changes are necessary to permit the admissibility of a written statement in digital format, at committal or at trial, provided it purports to be signed by the person who made it. 50. Are electronic signatures acceptable? Yes. The analysis has proved the concept that authenticated electronic signatures can be captured and set the technical and policy requirements for doing so will be made available. These requirements will be used in other parts of the criminal justice process where wet signatures are currently used. Digital statements may be used immediately and it is unnecessary to have paper versions of statements at court when digital documents are being used. The intention is for a CJS wide joint policy statement to be made. 51. How will you be adding redactions to the electronic bundle? Redaction involves permanently removing sensitive or private information from a document. Redacting a PDF document is slightly more complicated. Confidential content cannot be hidden by just by obscuring or covering the information in a PDF document. PDF Version May 2012 Page 10 of 12

11 documents are structured in layers - for example, text is on one layer and images on another. Thus, redacting text with opaque objects is not a foolproof method of redaction, if another layer is simply added, this could be peeled back to reveal what is underneath. The CPS uses Adobe Acrobat Professional to redact content. This is a safe, secure and forensic reduction process that cannot be reversed once completed. 52. What cables would I need to show exhibits from my laptop/tablet PC through the court equipment? All laptops have a standard VGA output to enable the connection to an external monitor through a standard VGA to VGA PC monitor cable. Other popular connection to monitors and TVs are cheaply available (VGA to Component output and VGA to S-Video). 53. Are defence practitioners allowed to use HMCTS power sockets? Defence practitioners are welcome to use power supplies that are suitably located and can be used safely. HMCTS is currently assessing what power sources are available nationally. Any portable electrical equipment used within HMCTS estate must be compliant with the Electricity & Work Act 1989 and Provision and Use of Work Equipment 1998 Regulations. 54. Can HMCTS alter where their power sockets are? HMCTS is not in a position to alter the existing in-court wiring/power provision, except where courts are being refurbished or new courtrooms built. Custody Areas 55. Will we be able to use our IT in prisons? On 1 March 2012, NOMS issued a revised policy on the Conveyance and Possession of Prohibited Items and Other Related Offences. This included: IT provision in court cells: Legal advisers/defence practitioners are authorised to bring into court holding cells/areas IT equipment that is necessary for consultation with their clients and on those cases on which they are engaged with that particular client. This is provided that the equipment and the use of it complies with the terms set out in the guidance. IT provision in prisons: Prisons should allow solicitors to bring necessary IT equipment into legal visits or implement alternative arrangements which allow solicitors to properly brief their clients electronically (such as use of specialised HMP laptops or remote docking points for solicitor laptops). Version May 2012 Page 11 of 12

12 An extract from the related Prison Service Instruction, which comes into full force on 26 March 2012, is available on the defence practitioners webpage Police custody areas are covered by the ACPO/Law Society protocol for police custody. If you are having difficulty gaining access to HM Prision estate or court and police custody areas, please let us know in the CJS Efficiency Programme Office (PMO) 56. If prisoners will not be given facilities to view the material in electronic format, will we be reimbursed for the cost of printing it for them? Until a full digital solution can be found, the CPS has committed to providing paper copies in custody cases where the prison does not have facilities to view material in electronic format. If you have any further questions not answered in these FAQs, please do not heasitate to contact us by to the CJS Efficiency Programme Office (programme.office@cps.gsi.gov.uk). Version May 2012 Page 12 of 12

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

Plea and Case Management Hearing Form: Guidance Notes

Plea and Case Management Hearing Form: Guidance Notes Plea and Case Management Hearing Form: Guidance Notes The need for an effective PCMH i. The public, and all those concerned in or affected by a criminal case, have a right to expect that the business of

More information

Service Schedule for BT Web Conferencing Service powered by Microsoft Live Meeting

Service Schedule for BT Web Conferencing Service powered by Microsoft Live Meeting Service Schedule for BT Web Conferencing Service powered by Microsoft Live Meeting 1. INTERPRETATION Account means an identifier that BT gives to the Customer. This identifier is used on all records. BT

More information

INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente... 1. Content... 1. 1. Introduction... 2

INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente... 1. Content... 1. 1. Introduction... 2 CONTENT INTRODUCTION OF IPAD USE AT UT Introduction of ipad use at the University of Twente... 1 Content... 1 1. Introduction... 2 2. BEFORE YOU GET STARTED... 2 3. Setting to work... 2 3.1. Purchase...

More information

Professional Court User Wi-Fi User Guide for accessing the service

Professional Court User Wi-Fi User Guide for accessing the service Professional Court User Wi-Fi User Guide for accessing the service Issue 6 July 2015 Contents 1. Introduction... 3 2. Who is this guide for and what does it cover?... 4 3. How to access Professional Court

More information

Electronic documents questionnaire

Electronic documents questionnaire Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes

More information

Orixcloud Backup Client. Frequently Asked Questions

Orixcloud Backup Client. Frequently Asked Questions Frequently Asked Questions Version 1.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights

More information

Encryption Policy (ISP03)

Encryption Policy (ISP03) Encryption Policy (ISP03) Issue Date: December 2014 Version 1.0 DOCUMENT CONTROL...3 1 INTRODUCTION...4 2 DEFINITION...4 3 WHEN TO USE ENCRYPTION...4 4 MANAGEMENT....4 5 ENCRYPTION STANDARDS...4 6 UK LAW...4

More information

DELIVERING JUSTICE IN A DIGITAL AGE

DELIVERING JUSTICE IN A DIGITAL AGE DELIVERING JUSTICE IN A DIGITAL AGE A JOINT INSPECTION OF DIGITAL CASE PREPARATION AND PRESENTATION IN THE CRIMINAL JUSTICE SYSTEM APRIL 2016 HMCPSI HMIC INSPECTING FOR IMPROVEMENT DELIVERING JUSTICE

More information

Eduroam wireless network - Windows 7

Eduroam wireless network - Windows 7 Eduroam wireless network - Windows 7 How to configure laptop computers and tablets to connect to the eduroam wireless network. Contents Introduction 1 Instructions for Windows 7 Devices 2 Technical Information

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PERSONAL CLOUD BACKUP 5NINES 5NINES Data Centres Services Service Offered 5DRIVE - CLOUD BACKUP SERVICE with remote access

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

Glossary of terms used in the survey

Glossary of terms used in the survey Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program

More information

Cloud (educational apps) software services and the Data Protection Act

Cloud (educational apps) software services and the Data Protection Act Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About

More information

Our Commitment to Victims

Our Commitment to Victims Our Commitment to Victims September 2014 We need to do more to help victims of crime navigate the criminal justice system, access the information and support they need, protect vulnerable victims and witnesses

More information

Virtual College actively supports children s charities and over the years has donated over 180,000 via the Safeguarding e-academy.

Virtual College actively supports children s charities and over the years has donated over 180,000 via the Safeguarding e-academy. 1 Virtual College is one of the UK s leading e-learning providers with over 1.7 million online learners across both public and private sectors and established as a major force in e-learning for over 19

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

Digital reform news now in one place

Digital reform news now in one place Issue 1 July 2014 sue 5 Special points of interest: Streamlined Digital File under development (p2) Toolkit to help Forces exploit video link (p2) Collaborative Digital Information Store to be developed

More information

Digital Witness Statement Evidential Authenticity Standards

Digital Witness Statement Evidential Authenticity Standards Digital Witness Statement Evidential Authenticity Standards Version: 2.1 Publication Date: 26/06/2014 Description: Author: The standards and associated tools required to create, transport and store a Digital

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

Yale School of Art Digital Technology Office Information

Yale School of Art Digital Technology Office Information Yale School of Art Digital Technology Office Information Online: http://art.yale.edu/diglab/ Email: art.help@yale.edu Phone: 203-432- 9120 Edgewood Email: sculpture.help@yale.edu The Digital Technology

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Downloading an Acted ebook Accessing an ActEd ebook on more than 1 computer/device Printing an ActEd ebook

Downloading an Acted ebook Accessing an ActEd ebook on more than 1 computer/device Printing an ActEd ebook ActEd ebooks FAQs Contents EBOOKS DEVICES AND SOFTWARE Checking you have a compatible computer and device Installing the applications Registering with Adobe Downloading a test ebook Accessing an ebook

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

System Requirements - Table of Contents

System Requirements - Table of Contents Page 1 of 12 System Requirements - Table of Contents CommNet Server CommNet Agent CommNet Browser CommNet Browser as a Stand-Alone Application CommNet Browser as a Remote Web-Based Application CommNet

More information

A Working Protocol between ACPO, the Crown Prosecution Service (CPS), Her Majesty s Court & Tribunals Service (HMCTS), the Witness

A Working Protocol between ACPO, the Crown Prosecution Service (CPS), Her Majesty s Court & Tribunals Service (HMCTS), the Witness A Working Protocol between ACPO, the Crown Prosecution Service (CPS), Her Majesty s Court & Tribunals Service (HMCTS), the Witness Service and the Senior Presiding Judge for England and Wales on Reading

More information

The UK s leading, secure and integrated evidential interview recording solution

The UK s leading, secure and integrated evidential interview recording solution The UK s leading, secure and integrated evidential interview recording solution 1 Digital Policing in the 21 st Century Capita provides the UK Police Service with business solutions that span the justice

More information

Metadata, Electronic File Management and File Destruction

Metadata, Electronic File Management and File Destruction Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide REMOTE ACCESS SERVICE SUPPORT ICR User Guide Question Answer/ What is supported Non-ICR computer access 1. What are the support hours for the remote access service? The IT Helpdesk service is available

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Before you start your SKE course:

Before you start your SKE course: Before you start your SKE course: We are looking forward to supporting you in your studies with us. As you know the course is entirely delivered online. In preparation, we just need to check with you about

More information

Nevada Supreme Court Training Sessions

Nevada Supreme Court Training Sessions Nevada Supreme Court Training Sessions Overview of System Features Web-based electronic filing system Allows electronic filing of documents 24/7 Provides electronic notification of case activity via email

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Getting it Right First Time Case Ownership Duty of Direct Engagement Consistent judicial case management

Getting it Right First Time Case Ownership Duty of Direct Engagement Consistent judicial case management 1. Better Case Management (BCM) links certain key complementary initiatives, which together should improve the way cases are processed through the system, for the benefit of all concerned within the criminal

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0

October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0 October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

Azeus Convene Paperless Board and EXECUTIVE Meetings

Azeus Convene Paperless Board and EXECUTIVE Meetings Service Definition Azeus Convene Paperless Board and EXECUTIVE Meetings 1. An Overview of the G- Cloud Service (functional, non functional) Azeus Convene replaces meeting papers with a user-friendly mobile

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

System Requirements - CommNet Server

System Requirements - CommNet Server System Requirements - CommNet Page 1 of 11 System Requirements - CommNet The following requirements are for the CommNet : Operating System Processors Microsoft with Service Pack 4 Microsoft Advanced with

More information

Introducing Graves IT Solutions Online Backup System

Introducing Graves IT Solutions Online Backup System Introducing Graves IT Solutions Online Backup System Graves IT Solutions is proud to announce an exciting new Online Backup System designed to protect your data by placing it online into the cloud. Graves

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

You ve reported a crime so what happens next?

You ve reported a crime so what happens next? You ve reported a crime so what happens next? This booklet tells you what you can expect from the Criminal Justice System, and explains: what happens now how to get advice and support your rights where

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS If you are experiencing, or have experienced, domestic violence and/or sexual violence there are a number of ways the law can protect you. This includes

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Personal WiFi Hotspot

Personal WiFi Hotspot Personal WiFi Hotspot Connect all WiFi enabled devices by simply plugging in activated 3G USB Modem and Mobile Phones Powerful portable WiFi Hotspot with true Plug & Play WiFi 802.11N up to 300Mbps Plug

More information

Document Number: SOP/RAD/SEHSCT/007 Page 1 of 17 Version 2.0

Document Number: SOP/RAD/SEHSCT/007 Page 1 of 17 Version 2.0 Standard Operating Procedures (SOPs) Research and Development Office Title of SOP: Computerised Systems for Clinical Trials SOP Number: 7 Version Number: 2.0 Supercedes: 1.0 Effective date: August 2013

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Life Cycle of Records

Life Cycle of Records Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible

More information

Protected PDF Common Installation Issues

Protected PDF Common Installation Issues Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

Design Professional Guide for New Building and Alteration Type 1 Applications 04-06-15

Design Professional Guide for New Building and Alteration Type 1 Applications 04-06-15 Design Professional Guide for New Building and Alteration Type 1 Applications 04-06-15 Bill de Blasio, Mayor Rick D. Chandler, P.E., Commissioner Development Hub@buildings.nyc.gov nyc.gov/buildings Table

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015

Information Governance in Dental Practices. Summary of findings from ICO reviews. September 2015 Information Governance in Dental Practices Summary of findings from ICO reviews September 2015 Executive summary The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

estatement Consent and Disclosure Agreement (Agreement to Receive or Access

estatement Consent and Disclosure Agreement (Agreement to Receive or Access estatement Consent and Disclosure Agreement (Agreement to Receive or Access Electronic Disclosures (edisclosures), Notices (enotices) and Statements (estatements)) Introduction This estatement Consent

More information

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51. School of Medicine Information Technology Services All newly enrolled School of Medicine students are encouraged to visit the School of Medicine s IT office before orientation to obtain help configuring

More information

Mobile Device Security and Encryption Standard and Guidelines

Mobile Device Security and Encryption Standard and Guidelines Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile

More information

MIS SERVICE CATALOG. . Corporate Application Support Services MIS Technical Services. MIS Professional Support Services

MIS SERVICE CATALOG. . Corporate Application Support Services MIS Technical Services. MIS Professional Support Services , - C()UNTY OFN1AUI INTRANET '> " i k '::':'.-,:--. _w;.;, ~-.. "; :;;~A'd~'~{::,,'.. -:. MIS SERVICE CATALOG. Corporate Application Support Services MIS Technical Services. MIS Professional Support Services

More information

Eduroam wireless network Apple Mac OSX 10.5

Eduroam wireless network Apple Mac OSX 10.5 Eduroam wireless network Apple Mac OSX 0. How to configure laptop computers to connect to the eduroam wireless network Contents university for the creative arts Contents Introduction Prerequisites Instructions

More information

Mobility and Young London Annex 4: Sharing Information Securely

Mobility and Young London Annex 4: Sharing Information Securely Young London Matters April 2009 Government Office For London Riverwalk House 157-161 Millbank London SW1P 4RR For further information about Young London Matters contact: younglondonmatters@gol.gsi.gov.uk

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

Data Breach Trends October 2015

Data Breach Trends October 2015 Data Breach Trends October 2015 Introduction In October 2015 the Information Commissioner s Office (ICO) published the latest data breach trends including incidents by quarter, type of incident and incidents

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

ELECTRONIC SIGNATURES FACTSHEET

ELECTRONIC SIGNATURES FACTSHEET ELECTRONIC SIGNATURES FACTSHEET Electronic signatures mean that you can exchange information with others electronically and securely safe in the knowledge that everyone is who they claim to be and that

More information

Cascade Collaboration Solutions 5 Aug 2014

Cascade Collaboration Solutions 5 Aug 2014 Cascade Collaboration Solutions 5 Aug 2014 5530001600 Rev 03 Contents 1. Solution Overview... 3 2. Collaboration End Points... 5 3. Collaboration Cloud Server... 7 4. Technical Specifications... 8 4.1.

More information

External Communication to Third Parties

External Communication to Third Parties External Communication to Third Parties Egress Software Technologies Ltd Unit 16 Quadrant Business Center, 135 Salusbury Road, London, NW6 6RJ T: +44 (0)20 7624 8500 / F: +44 (0)20 7624 8200 / E: info@egress.com

More information

Mobile Printing for Business Made Easy

Mobile Printing for Business Made Easy Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where

More information

Contents. Introduction. How to report a fraud. What happens when you report a fraud? The investigation process

Contents. Introduction. How to report a fraud. What happens when you report a fraud? The investigation process 1 Contents Introduction How to report a fraud What happens when you report a fraud? The investigation process Who decides if the case should go to court? What is a non-court disposal? What happens at

More information

NHSmail mobile configuration guide Apple iphone

NHSmail mobile configuration guide Apple iphone Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

Going to Court as a Witness

Going to Court as a Witness Going to Court as a Witness - July 2010 Going to Court as a Witness 1 Introduction Going to court can be stressful for many victims and witnesses. If you need to give evidence in a criminal trial, we hope

More information

UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA

UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA CASE MANAGEMENT/ELECTRONIC CASE FILING (CM/ECF) SYSTEM LIMITED USE/SERVICE OF PROCESS REGISTRATION FORM This form is to be used to register for LIMITED

More information

Secure e mail for Defence Practitioners in Sussex

Secure e mail for Defence Practitioners in Sussex Secure e mail for Defence Practitioners in Sussex The Future All key CJS agencies are committed to the full exchange of information digitally by April 2012. Secure email is a first step and it will become

More information

Navigate your workflow

Navigate your workflow Océ Document Management Tool 2.2 Navigate your workflow Digital document workflow software that streamlines productivity Put convenience and productivity at your fingertips Gain control over your document

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

The criminal justice system: landscape review

The criminal justice system: landscape review Report by the Comptroller and Auditor General The criminal justice system: landscape review HC 1098 SESSION 2013-14 7 MARCH 2014 4 Key facts The criminal justice system: landscape review Key facts 8m 17.1bn

More information

WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS?

WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS? WHERE WILL MY CRIMINAL CASE BE DEALT WITH AND WHAT HAPPENS? This factsheet relates to those who are 18 or over. If you are 17 or under, please see our separate factsheet for the Youth Court. Where will

More information

CLSA Criminal Procedure Rule Committee Magistrates courts preparation for trial form: Comments on use by The Criminal Law Solicitors Association

CLSA Criminal Procedure Rule Committee Magistrates courts preparation for trial form: Comments on use by The Criminal Law Solicitors Association CLSA Criminal Procedure Rule Committee Magistrates courts preparation for trial form: Comments on use by The Criminal Law Solicitors Association Criminal Law Solicitors Association Suite 2 Level 6 New

More information

CAMBRIDGE CELTA COURSE ONLINE FAQ SHEET

CAMBRIDGE CELTA COURSE ONLINE FAQ SHEET CELTA QUALIFICATION FROM SUPERCOMM CONTACT To request an application pack or for further information, please contact the CELTA Centre Administrator Mhairi Quinn. CELTA course direct line: +41 79 128 2972

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information