www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1ec0
Public Scan
Submitted URL: https://e.zmp.techtarget.com/click?EbW90c2hhYmkudGhhYmVuZ0BmbmJib3Rzd2FuYS5jby5idw/CeyJtaWQiOiIxNzMyNjIwNDQ1ODE0MGQwNjZiMzg4Z...
Effective URL: https://www.computerweekly.com/news/366616282/Metropolitan-Police-officer-dismissed-for-unlawfully-accessing-Sarah-Everard-file...
Submission: On November 26 via api from ZA — Scanned from DE
Effective URL: https://www.computerweekly.com/news/366616282/Metropolitan-Police-officer-dismissed-for-unlawfully-accessing-Sarah-Everard-file...
Submission: On November 26 via api from ZA — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://www.computerweekly.com/search
<form action="https://www.computerweekly.com/search" method="post" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
Text Content
3 Trending Now Computer Weekly – 9 July 2024: How data drives decisions at BAE SystemsDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * Computer Weekly – 9 July 2024: How data drives decisions at BAE SystemsDownload Now * A Computer Weekly buyer's guide to network cost and bandwidth optimisationDownload Now * Computer Weekly – 12 March 2024: From grassroots to Wembley – how tech supports English footballDownload Now Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * Download 2024 IT salary survey RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in France * IT in the Nordics * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Database management * Quality/governance * Data warehousing * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * AI and storage * Cloud storage * Containers and storage * Data management * Backup * Compliance and storage * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Tape storage * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk * Home * Database management Dutourdumonde - Fotolia Dutourdumonde - Fotolia News METROPOLITAN POLICE OFFICER DISMISSED FOR UNLAWFULLY ACCESSING SARAH EVERARD FILES OVER 100 MET POLICE OFFICERS AND STAFF HAVE BEEN INVESTIGATED FOR ACCESSING SENSITIVE DATA RELATED TO THE SARAH EVERARD CASE, LEADING TO THE DISMISSAL OF A ROADS AND TRANSPORT OFFICER WHO ACCESSED THE INFORMATION WHILE OFF-DUTY * Share this item with your network: * * * * * * * * * * * * By * Sebastian Klovig Skelton, Data & ethics editor Published: 25 Nov 2024 14:45 A Metropolitan Police officer has been dismissed after repeatedly accessing sensitive files related to the disappearance and murder of Sarah Everard while off-duty, prompting concern that legal requirements around police data access – which are due to be removed by the government’s data reforms – are not being followed. Following the murder of Sarah Everard in March 2021 by serving Met Police officer Wayne Couzens, a dedicated taskforce of investigators from the Directorate of Professional Standards carried out an audit of those who had accessed files relating to her disappearance and the subsequent investigation, looking specifically at whether those who had accessed these files did so with a proper policing purpose. The Met said a total of 104 officers and staff (68 officers and 36 staff) were initially identified as potentially accessing files relating to the investigation without a legitimate policing purpose, which resulted in seven officers being served with gross misconduct notices and appearing in front of a hearing. While this led to one officer – a member of the Met’s Roads and Transport unit who accessed the information off-duty – being formally dismissed, others have received a mixture of written warnings and further training. In total, two-thirds of the cases required further action. However, campaigners and privacy experts said these situations would be made more likely if the government’s Data Use and Access Bill (DUAB) passes, as it’s set to remove the police logging procedure that requires forces to keep records detailing how information is accessed and used. This includes recording a justification for why an individual officer has accessed a particular piece of information, although according to the DUAB’s explanatory notes, officers and staff will still be legally expected to log the time, date and, “as far as possible”, their identity when accessing information. “The Met investigated over 100 staff over the inappropriate accessing of information in relation to Sarah Everard,” said Jim Killock, executive director of the Open Rights Group. “This shows the police can and do act to access information inappropriately. This is likely the tip of the iceberg. There may be less prominent cases, where police abuse their power by accessing information without worry for the consequences. “Against this, the government needs to explain why it wants to actively remove accountability measures for accessing public data while at the same time removing other safeguards and protections. “We need more, not less, transparency and accountability over how, why and when the police access, process and share data about the public,” he said. “Reducing restrictions risks worsening existing tensions between police and the communities they claim to serve.” Owen Sayers, an independent security consultant and advisor on police data protection compliance with more than 25 years of experience in delivering secure solutions to policing, added that the incident raises the question of who else is having their data accessed by off-duty officers. “How do we know that access is controlled only to those who need to see our data?” he said. “Or is police data management literally the pile-on free-for-all it looks like from this case?” MISCONDUCT HEARINGS AND FURTHER ACTION While three of the seven officers were found to have accessed the information with a legitimate policing purpose, three others were not, leading to a dismissal for one of the officers (who accessed the data off-duty), and a final warning to last three years for another. The third would have been dismissed had they not already resigned. The seventh serving officer will face a separate gross misconduct hearing on a date to be set. The Met added that another member of police staff previously faced a private gross misconduct hearing and was dismissed. “Our officers and staff are regularly reminded that police systems and specific files must only be accessed where there is a legitimate policing purpose to do so,” said deputy assistant commissioner Stuart Cundy. “This includes reminder screens and warning pages when logging on to our software systems, as well as mandatory training on information management which must be completed by everyone within the organisation. “It is clear the panel has carefully considered the circumstances of each individual case before coming to their conclusion that three officers had no acceptable reason for looking at this information.” Cundy added that the majority of the 104 officers and staff who had inappropriately accessed information admitted they had done so out of curiosity. In terms of those other cases, 10 officers and staff were issued written warnings, 16 were referred for “reflective practice”, and four received “no further action” following misconduct hearings, while a further 38 were referred for reflective practice without a hearing. No further action was taken against the remaining 28 officers and staff, with no requirement for them to attend a misconduct hearing. “When spoken to, they were remorseful, apologised, admitted poor judgement and were keen to engage in training,” said Cundy. “All of this was taken into account when determining the most appropriate outcome for each individual. We know that honest mistakes can be made and the most serious outcomes relate to those who were deliberately evasive or tried to avoid accountability. Those actions are not compatible with the values of the Met.” In response to Computer Weekly’s questions about the incident – including whether justifications were recorded by the officers and what these justifications were if so – a Met spokesperson said the specifics of the hearing outcomes will be available on its website once it has been reviewed. Asked about whether the incident was referred to the Information Commissioner’s Office (ICO), the spokesperson added: “We assessed the risks posed and determined that the matter did not meet the criteria for a mandatory referral. However, we did inform them of the circumstances. “On wider access – the Met has the ability to restrict files, but to deliver operational policing it is an important principle that police information can be appropriately accessed and used by police officers as part of their roles. Our policy is clear that if an employee does not have a lawful or genuine policing purpose to view data, then they should not view it.” READ MORE ABOUT POLICE TECHNOLOGY * MPs hold first ever debate on live facial recognition: MPs have held an open debate on police use of live facial recognition technology for the first time since it was initially deployed by the Met Police in August 2016. * Tech and digital skills key to improving police productivity: The Policing Productivity Review sees data and technology as a way of improving productivity and outcomes, as well as a potential means of restoring diminishing legitimacy, but warns there needs to be a revamp in digital skills, investment and coordination to harness the full range of benefits. * Police accessed phone records of ‘trouble-making journalists’: The Police Service of Northern Ireland ran a rolling programme to monitor phone records of journalists to identify the source of police leaks, it was claimed today. Computer Weekly also contacted the Home Office about the removal of logging requirements under the DUAB, and whether it would reconsider this approach given the number of officers and staff that accessed the files, even when there are rules in place. “The Data Use and Access Bill aims to remove the ineffective requirement for police officers to record a justification for accessing or disclosing personal data,” said a Home Office spokesperson. “Officers that access or disclose data will still need to have a legitimate law enforcement reason to do so.” The DUAB explanatory notes added the requirement to record a justification is being removed because “it is unlikely that a person accessing records inappropriately would record an honest justification”. Responding to questions about the incident, a spokesperson for the ICO said: “We are pleased that the section 62 logging requirement is being retained as we recognise the value and importance of being able to determine the date, time and identity of those accessing information when monitoring potential misconduct or abuse. “The decision to remove the justification requirement on the basis that there is little evidence of its effectiveness is ultimately a matter for government, and we welcome parliamentary scrutiny of this proposal. We’ll continue to work with law enforcement organisations to help them understand the changes to the Data Protection Act 2018 through the reforms.” Liberal Democrat peer Lord Clement-Jones previously told Computer Weekly that the removal of police logging requirements was “egregious”, and it represents a potential divergence from the European Union’s Law Enforcement Directive (LED) that could prevent the UK from renewing its LED data adequacy decision. The LED said: “The logs of consultation and disclosure shall make it possible to establish the justification, date and time of such operations and, as far as possible, the identification of the person who consulted or disclosed personal data, and the identity of the recipients of such personal data.” READ MORE ON DATABASE MANAGEMENT * ORG URGES ICO TO REVISE PUBLIC SECTOR ENFORCEMENT APPROACH By: Sebastian Klovig Skelton * POLICE CLOUD PROJECT RAISES DATA PROTECTION CONCERNS DESPITE LEGAL REFORMS By: Sebastian Klovig Skelton * DATA BILL WILL BOOST NHS AND POLICE ACCESS TO DATA, SAYS GOVERNMENT By: Bill Goodwin * POLICE DIGITAL SERVICE STAFF ARRESTS: EVERYTHING YOU NEED TO KNOW By: Caroline Donnelly Latest News * How Kong is driving the future of APIs * Google Cloud research highlights potential for GenAI to transform public sector service delivery * Post Office scandal redress echoes Windrush compensation problems * View All News Download Computer Weekly * In The Current Issue: * Computer Weekly announces the Most Influential Women in UK Tech 2024 * From beauty model to tech role model – this year’s most influential woman in UK tech * Computer Weekly’s Women in UK Tech Rising Stars 2024 Download Current Issue Latest Blog Posts * NTT R&D Forum 2024: New horizons for photonics-based chips, clouds & qubits – CW Developer Network * Diversity in tech: To work for all, AI needs input from all – Computer Weekly Editors Blog * View All Blogs Related Content * Police cloud project raises data protection concerns ... – ComputerWeekly.com * NCA director sacked after WhatsApp and email security... – ComputerWeekly.com * ORG urges ICO to revise public sector enforcement ... – ComputerWeekly.com Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management Search CIO * DOJ's push to break up Google faces tough odds The Department of Justice wants Google to sell its Chrome browser and possibly even Android, in a move that some view as extreme ... * Elon Musk, big tech ties to China raise security concerns A U.S. senator warns U.S. tech companies that deep ties to China pose national security risks as cyberattacks rise. Time to ... * Best project portfolio management software and tools in 2025 Project portfolio management software and tools in 2025 promote strategic management of projects and agile tactics. Read our PPM ... Search Security * Volexity details Russia's novel 'Nearest Neighbor Attack' The security company warned that the new attack style highlights the importance of securing Wi-Fi networks, implementing MFA and ... * Cyber insurers address ransom reimbursement policy concerns In a recent op-ed for The Financial Times, U.S. Deputy National Security Advisor Anne Neuberger wrote that reimbursing ransom ... * DOJ charges 5 alleged Scattered Spider members The defendants, charged for conducting alleged phishing scams across the U.S., are suspected members of a prolific threat group ... Search Networking * 14 common network protocols and their functions explained Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are ... * 5 principles of change management in networking Network change management includes five principles, including risk analysis and peer review. These best practices can help ... * A guide to Li-Fi technology Li-Fi is an emerging wireless technology that uses visible light to transmit data instead of radio frequencies. Though still ... Search Data Center * How the rise in AI impacts data centers and the environment AI's impact on data centers raises environmental concerns as rising energy demands from technologies such as ChatGPT strain ... * HPC, supercomputing share stage with enterprise AI at SC24 AI's effects on supercomputing helped shift the focus toward enterprise demands at SC24, as vendors -- including Dell and HPE -- ... * Object storage, VM offerings emerge for HPE GreenLake HPE aims to attract new customers to its GreenLake ecosystem by launching standalone virtualization software. It also eyes AI ... Search Data Management * Snowflake fuels edtech vendor's data and AI initiatives PowerSchool is creating personalized educational experiences for teachers, students, parents, administrators and others by using ... * Snowflake partners with Anthropic to improve AI development The alliance aims to make it easier and faster for the data cloud vendor's customers to use the Claude line of large language ... * Noninvasive data governance offers friendly approach Data governance doesn't need to be a burden on employees. A noninvasive approach formalizes existing responsibilities as ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2024, TechTarget Privacy Policy Cookie Preferences Cookie Preferences Do Not Sell or Share My Personal Information Close