www.computerweekly.com Open in urlscan Pro
2606:4700::6812:1ec0  Public Scan

Submitted URL: https://e.zmp.techtarget.com/click?EbW90c2hhYmkudGhhYmVuZ0BmbmJib3Rzd2FuYS5jby5idw/CeyJtaWQiOiIxNzMyNjIwNDQ1ODE0MGQwNjZiMzg4Z...
Effective URL: https://www.computerweekly.com/news/366616282/Metropolitan-Police-officer-dismissed-for-unlawfully-accessing-Sarah-Everard-file...
Submission: On November 26 via api from ZA — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://www.computerweekly.com/search

<form action="https://www.computerweekly.com/search" method="post" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

Text Content

3
Trending Now

Computer Weekly – 9 July 2024: How data drives decisions at BAE SystemsDownload
NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   Computer Weekly – 9 July 2024: How data drives decisions at BAE
   SystemsDownload Now
 * 
   A Computer Weekly buyer's guide to network cost and bandwidth
   optimisationDownload Now
 * 
   Computer Weekly – 12 March 2024: From grassroots to Wembley – how tech
   supports English footballDownload Now




Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * Download 2024 IT salary survey

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in France
    * IT in the Nordics
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Database management
    * Quality/governance
    * Data warehousing
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * AI and storage
    * Cloud storage
    * Containers and storage
    * Data management
    * Backup
    * Compliance and storage
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Tape storage
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk


 * Home
 * Database management

Dutourdumonde - Fotolia

Dutourdumonde - Fotolia

News


METROPOLITAN POLICE OFFICER DISMISSED FOR UNLAWFULLY ACCESSING SARAH EVERARD
FILES




OVER 100 MET POLICE OFFICERS AND STAFF HAVE BEEN INVESTIGATED FOR ACCESSING
SENSITIVE DATA RELATED TO THE SARAH EVERARD CASE, LEADING TO THE DISMISSAL OF A
ROADS AND TRANSPORT OFFICER WHO ACCESSED THE INFORMATION WHILE OFF-DUTY

 * Share this item with your network:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


By
 * Sebastian Klovig Skelton, Data & ethics editor

Published: 25 Nov 2024 14:45

A Metropolitan Police officer has been dismissed after repeatedly accessing
sensitive files related to the disappearance and murder of Sarah Everard while
off-duty, prompting concern that legal requirements around police data access –
which are due to be removed by the government’s data reforms – are not being
followed.



Following the murder of Sarah Everard in March 2021 by serving Met Police
officer Wayne Couzens, a dedicated taskforce of investigators from the
Directorate of Professional Standards carried out an audit of those who had
accessed files relating to her disappearance and the subsequent investigation,
looking specifically at whether those who had accessed these files did so with a
proper policing purpose.

The Met said a total of 104 officers and staff (68 officers and 36 staff) were
initially identified as potentially accessing files relating to the
investigation without a legitimate policing purpose, which resulted in seven
officers being served with gross misconduct notices and appearing in front of a
hearing.

While this led to one officer – a member of the Met’s Roads and Transport unit
who accessed the information off-duty – being formally dismissed, others have
received a mixture of written warnings and further training. In total,
two-thirds of the cases required further action.

However, campaigners and privacy experts said these situations would be made
more likely if the government’s Data Use and Access Bill (DUAB) passes, as it’s
set to remove the police logging procedure that requires forces to keep records
detailing how information is accessed and used.

This includes recording a justification for why an individual officer has
accessed a particular piece of information, although according to the DUAB’s
explanatory notes, officers and staff will still be legally expected to log the
time, date and, “as far as possible”, their identity when accessing information.

“The Met investigated over 100 staff over the inappropriate accessing of
information in relation to Sarah Everard,” said Jim Killock, executive director
of the Open Rights Group. “This shows the police can and do act to access
information inappropriately. This is likely the tip of the iceberg. There may be
less prominent cases, where police abuse their power by accessing information
without worry for the consequences.

“Against this, the government needs to explain why it wants to actively remove
accountability measures for accessing public data while at the same time
removing other safeguards and protections.

“We need more, not less, transparency and accountability over how, why and when
the police access, process and share data about the public,” he said. “Reducing
restrictions risks worsening existing tensions between police and the
communities they claim to serve.”

Owen Sayers, an independent security consultant and advisor on police data
protection compliance with more than 25 years of experience in delivering secure
solutions to policing, added that the incident raises the question of who else
is having their data accessed by off-duty officers.

“How do we know that access is controlled only to those who need to see our
data?” he said. “Or is police data management literally the pile-on free-for-all
it looks like from this case?”


MISCONDUCT HEARINGS AND FURTHER ACTION

While three of the seven officers were found to have accessed the information
with a legitimate policing purpose, three others were not, leading to a
dismissal for one of the officers (who accessed the data off-duty), and a final
warning to last three years for another. The third would have been dismissed had
they not already resigned.

The seventh serving officer will face a separate gross misconduct hearing on a
date to be set. The Met added that another member of police staff previously
faced a private gross misconduct hearing and was dismissed.

“Our officers and staff are regularly reminded that police systems and specific
files must only be accessed where there is a legitimate policing purpose to do
so,” said deputy assistant commissioner Stuart Cundy. “This includes reminder
screens and warning pages when logging on to our software systems, as well as
mandatory training on information management which must be completed by everyone
within the organisation.

“It is clear the panel has carefully considered the circumstances of each
individual case before coming to their conclusion that three officers had no
acceptable reason for looking at this information.”

Cundy added that the majority of the 104 officers and staff who had
inappropriately accessed information admitted they had done so out of curiosity.

In terms of those other cases, 10 officers and staff were issued written
warnings, 16 were referred for “reflective practice”, and four received “no
further action” following misconduct hearings, while a further 38 were referred
for reflective practice without a hearing. No further action was taken against
the remaining 28 officers and staff, with no requirement for them to attend a
misconduct hearing.

“When spoken to, they were remorseful, apologised, admitted poor judgement and
were keen to engage in training,” said Cundy. “All of this was taken into
account when determining the most appropriate outcome for each individual. We
know that honest mistakes can be made and the most serious outcomes relate to
those who were deliberately evasive or tried to avoid accountability. Those
actions are not compatible with the values of the Met.”

In response to Computer Weekly’s questions about the incident – including
whether justifications were recorded by the officers and what these
justifications were if so – a Met spokesperson said the specifics of the hearing
outcomes will be available on its website once it has been reviewed.

Asked about whether the incident was referred to the Information Commissioner’s
Office (ICO), the spokesperson added: “We assessed the risks posed and
determined that the matter did not meet the criteria for a mandatory referral.
However, we did inform them of the circumstances.

“On wider access – the Met has the ability to restrict files, but to deliver
operational policing it is an important principle that police information can be
appropriately accessed and used by police officers as part of their roles. Our
policy is clear that if an employee does not have a lawful or genuine policing
purpose to view data, then they should not view it.”


READ MORE ABOUT POLICE TECHNOLOGY

 * MPs hold first ever debate on live facial recognition: MPs have held an open
   debate on police use of live facial recognition technology for the first time
   since it was initially deployed by the Met Police in August 2016.
 * Tech and digital skills key to improving police productivity: The Policing
   Productivity Review sees data and technology as a way of improving
   productivity and outcomes, as well as a potential means of restoring
   diminishing legitimacy, but warns there needs to be a revamp in digital
   skills, investment and coordination to harness the full range of benefits.
 * Police accessed phone records of ‘trouble-making journalists’: The Police
   Service of Northern Ireland ran a rolling programme to monitor phone records
   of journalists to identify the source of police leaks, it was claimed today.

Computer Weekly also contacted the Home Office about the removal of logging
requirements under the DUAB, and whether it would reconsider this approach given
the number of officers and staff that accessed the files, even when there are
rules in place.

“The Data Use and Access Bill aims to remove the ineffective requirement for
police officers to record a justification for accessing or disclosing personal
data,” said a Home Office spokesperson. “Officers that access or disclose data
will still need to have a legitimate law enforcement reason to do so.”

The DUAB explanatory notes added the requirement to record a justification is
being removed because “it is unlikely that a person accessing records
inappropriately would record an honest justification”.

Responding to questions about the incident, a spokesperson for the ICO said: “We
are pleased that the section 62 logging requirement is being retained as we
recognise the value and importance of being able to determine the date, time and
identity of those accessing information when monitoring potential misconduct or
abuse.

“The decision to remove the justification requirement on the basis that there is
little evidence of its effectiveness is ultimately a matter for government, and
we welcome parliamentary scrutiny of this proposal. We’ll continue to work with
law enforcement organisations to help them understand the changes to the Data
Protection Act 2018 through the reforms.”

Liberal Democrat peer Lord Clement-Jones previously told Computer Weekly that
the removal of police logging requirements was “egregious”, and it represents a
potential divergence from the European Union’s Law Enforcement Directive (LED)
that could prevent the UK from renewing its LED data adequacy decision.

The LED said: “The logs of consultation and disclosure shall make it possible to
establish the justification, date and time of such operations and, as far as
possible, the identification of the person who consulted or disclosed personal
data, and the identity of the recipients of such personal data.”



READ MORE ON DATABASE MANAGEMENT

 * ORG URGES ICO TO REVISE PUBLIC SECTOR ENFORCEMENT APPROACH
   
   
   By: Sebastian Klovig Skelton

 * POLICE CLOUD PROJECT RAISES DATA PROTECTION CONCERNS DESPITE LEGAL REFORMS
   
   
   By: Sebastian Klovig Skelton

 * DATA BILL WILL BOOST NHS AND POLICE ACCESS TO DATA, SAYS GOVERNMENT
   
   
   By: Bill Goodwin

 * POLICE DIGITAL SERVICE STAFF ARRESTS: EVERYTHING YOU NEED TO KNOW
   
   
   By: Caroline Donnelly

Latest News
 * How Kong is driving the future of APIs
 * Google Cloud research highlights potential for GenAI to transform public
   sector service delivery
 * Post Office scandal redress echoes Windrush compensation problems
 * View All News

Download Computer Weekly
 * In The Current Issue:
   * Computer Weekly announces the Most Influential Women in UK Tech 2024
   * From beauty model to tech role model – this year’s most influential woman
     in UK tech
   * Computer Weekly’s Women in UK Tech Rising Stars 2024
   Download Current Issue

Latest Blog Posts
 * NTT R&D Forum 2024: New horizons for photonics-based chips, clouds & qubits –
   CW Developer Network
 * Diversity in tech: To work for all, AI needs input from all – Computer Weekly
   Editors Blog
 * View All Blogs

Related Content
 * Police cloud project raises data protection concerns ... – ComputerWeekly.com
 * NCA director sacked after WhatsApp and email security... – ComputerWeekly.com
 * ORG urges ICO to revise public sector enforcement ... – ComputerWeekly.com


Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

Search CIO
 * DOJ's push to break up Google faces tough odds
   
   The Department of Justice wants Google to sell its Chrome browser and
   possibly even Android, in a move that some view as extreme ...

 * Elon Musk, big tech ties to China raise security concerns
   
   A U.S. senator warns U.S. tech companies that deep ties to China pose
   national security risks as cyberattacks rise. Time to ...

 * Best project portfolio management software and tools in 2025
   
   Project portfolio management software and tools in 2025 promote strategic
   management of projects and agile tactics. Read our PPM ...

Search Security
 * Volexity details Russia's novel 'Nearest Neighbor Attack'
   
   The security company warned that the new attack style highlights the
   importance of securing Wi-Fi networks, implementing MFA and ...

 * Cyber insurers address ransom reimbursement policy concerns
   
   In a recent op-ed for The Financial Times, U.S. Deputy National Security
   Advisor Anne Neuberger wrote that reimbursing ransom ...

 * DOJ charges 5 alleged Scattered Spider members
   
   The defendants, charged for conducting alleged phishing scams across the
   U.S., are suspected members of a prolific threat group ...

Search Networking
 * 14 common network protocols and their functions explained
   
   Networking makes the internet work, but neither can succeed without
   protocols. Common network protocols and their functions are ...

 * 5 principles of change management in networking
   
   Network change management includes five principles, including risk analysis
   and peer review. These best practices can help ...

 * A guide to Li-Fi technology
   
   Li-Fi is an emerging wireless technology that uses visible light to transmit
   data instead of radio frequencies. Though still ...

Search Data Center
 * How the rise in AI impacts data centers and the environment
   
   AI's impact on data centers raises environmental concerns as rising energy
   demands from technologies such as ChatGPT strain ...

 * HPC, supercomputing share stage with enterprise AI at SC24
   
   AI's effects on supercomputing helped shift the focus toward enterprise
   demands at SC24, as vendors -- including Dell and HPE -- ...

 * Object storage, VM offerings emerge for HPE GreenLake
   
   HPE aims to attract new customers to its GreenLake ecosystem by launching
   standalone virtualization software. It also eyes AI ...

Search Data Management
 * Snowflake fuels edtech vendor's data and AI initiatives
   
   PowerSchool is creating personalized educational experiences for teachers,
   students, parents, administrators and others by using ...

 * Snowflake partners with Anthropic to improve AI development
   
   The alliance aims to make it easier and faster for the data cloud vendor's
   customers to use the Claude line of large language ...

 * Noninvasive data governance offers friendly approach
   
   Data governance doesn't need to be a burden on employees. A noninvasive
   approach formalizes existing responsibilities as ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information


Close