SlideShare a Scribd company logo
1 of 13
Victims & Vulnerable People

 Steve Foston (North Lincolnshire
 Safer Neighbourhoods) and John
Dunworth (former Head of ASB Unit,
           Home Office)

                                     1
Why protect Victims & Vulnerable
              People?


• The European Convention on Human
  Rights
  – All public authorities have to comply with the
    convention
     • In consideration of 2 British cases the European
       Court of Human Rights confirmed that the State is
       obliged to „take measures to protect individuals ...
       From ill-treatment and to take reasonable steps to
       prevent ill-treatment of which the authorities had or
       ought to have had knowledge‟


                                                               2
How we have built the Victim &
   Vulnerable Person Index system

• The system is based on the CLG research programme
  “Effective Partnership Data Management”
• Developed by Xantura Ltd and built upon their „data
  fusion‟ technology – the system matches, coordinates and
  builds a Victim & Vulnerable Person‟s Index from the
  partnership supplied data sets using –
   –   Predictive modelling techniques based on customer insights
   –   Including vulnerable localities, risk determinants and constraints
   –   Maps the citizen‟s different forms of vulnerability into „domains‟
   –   Identifies those citizen‟s at „high risk‟ of becoming a victim.
• Provides the “ought to have” knowledge required for
  compliance with the European Convention

                                                                        3
Overcoming obstacles

• Extensive research on Data Protection issues
   – Legal opinion provided by a barrister confirms
       • The Crime & Disorder Act 1998 does provide the ‘gateway’ for the
         exchange of personal information between partnership agencies (with some
         constraints)
       • The development of the Index system is a for a legitimate and lawful
         purpose
   – The main “issue” is the potential for conflict between implied
     consent (protection from harm) and a data subject‟s explicit and
     informed consent.
• Securing personal information
   – Xantura have set up a private data centre that is GC accredited
     (IL3 “Restricted”) and partner data transfers are undertaken
     through the Public Service Network (G-App)

                                                                                4
Supporting Vulnerable People -
         practical examples

• Identifying the vulnerable
  – Prevent people from falling through the 'gaps'




                                                     5
Supporting Vulnerable People
•   “High risk” individuals are identified by the insights provided by the
    Index system, the other side of the Xantura system is the
•   Springvault application providing a secure support package that is
    designed to reduce a citizen‟s overall level of vulnerability this
     – Includes both a core personal safety plan (e.g. Fire safety checks, target
       hardening, asset scanning, etc.) and individually tailored services elements.
     – Is a 2 way communications portal for the electronic exchange of information
       between vulnerable citizen‟s & their supporters (family, “Big Society” groups
       such as Victim Support and professional partnership practitioners)
     – Permits citizens and their proxies to manage their own data sharing
       consents
•   This is a secure „cloud‟ based application that is available over the
    world wide web and, soon, will be supported by a mobile phone App
    that our social enterprise partnership (Squeak) is commissioning from
    Xantura.



                                                                                   6
Supporting Vulnerable People –
     Additional practical examples

• Protecting their on-line identity
   – Squeak is investigating the use of Smartcards to store
     Citizen ID's
      • Encourage digital inclusion (i.e. the vulnerable will not
         have remember complicated userid/password
         combinations to login)
      • Chip/Pin, Biometrics, Metro style picture interface
      • The Squeak smartcard will be compatible with the Local
         Government Smartcitizen scheme that is in current use
         by 7.5M citizens throughout the UK
   – Single sign-on and access to „Clouds‟
       • Use of encrypted identity “tokens” for sign-in to web/mobile apps;
         much safer than „vanilla‟ userid/password accreditation, helps
         protect against malware


                                                                              7
Supporting Vulnerable People –
    Additional practical examples

• Physical protection
  – Electronic Incident Diaries and Alert Boxes
  – Protecting their equipment
     • Lojack Laptop protection software - tracking
       and immobilising access to data
     • Radio Tactics "Hermes/Apollo" - UK National
       property register
  – Protecting their money (Cyber-crime)
     • Smartswipe - Credit/Debit card protection

                                                      8
Physical protection – Equipment &
           property (Laptops)
• Laptops: Squeak is making arrangements
  with Absolute Software for the supply of
  their „lojack‟ product this –
  – Is „Secured by Design‟ and ACPO approved
  – Loads into the Laptop‟s firmware and cannot
    be removed
  – When stolen
     • Tracks where the device is for recovery in
       cooperation with the Police
     • Protects privacy, disables access to files,
       applications, etc. stored on the laptop

                                                     9
Physical protection – Equipment &
  property (Other mobile devices,
              property)
• Other mobile devices/property; with
  Humberside Police we are implementing
  Radiotactics “Hermes/Apollo” system for –
  – Other mobile devices (smart phones, etc.)
  – Other uniquely identifiable property (e.g.
    Cameras, bikes, etc.) details can be registered
    with the UK National Property Database
    “Immobilise”
  – When stolen
     • To deter „thefts‟ property can be scanned into the
       database and more easily recovered by Police – acts like
       an electronic form of „Smartwater‟

                                                             10
North Lincolnshire
                                        • Use the burglary predictive modeller to
Case Study being
                                          identify „hot spots‟ to target
progressed at the
moment
We are using predictive modelling
techniques to target burglary hot
spots with crime prevention leaflets
and offer protection to the public in
these areas. The licensing of the
Lojack software can be purchased
by members of the public in these
areas, if they chose to do so, from
the Squeak web site.

Similarly, there other property
details can be added to the UK
national property database for„
Hermes/Apollo‟ scanning if stolen.

The Vigilance predictive modeller is
available for free use by Police
forces and community safety
partnerships at
https://www.vigilancemodeller.net


                                                                               11
Protecting their money – Cyber-crime
•   Its a sad fact of life that vulnerable people are increasingly
    targeted both physically (through the post) and virtually via the Internet
    to relieve them of their cash; thieves use „malware‟ to capture their
    identity and credit/debit card details, etc.
•   We have already referred to systems that can assist protect a citizen‟s
    identity through the use of smartcards, tokenised single sign-on to
    cloud systems, etc. and now we want to show you this „Smartswipe‟
    device that can help protect people when making credit/debit card
    purchases over the Internet or other applications such as on-line
    banking.
•   This device „insulates‟ the citizen‟s financial transaction data from being
    stored on their PC . Any financial transactions made over the internet
    are fully encrypted by the „Smartswipe‟ device.
•   This particular device can read Smartcards as well as credit/debit cards
    so it can be used as a conventional card reader (e.g. Squeak & LA
    smartcards) as well as protecting a vulnerable person (or their
    supporters) financial information on the world wide web

                                                                             12
Additional Information
•   Further information about the North Lincolnshire Victim and Vulnerable
    Persons Index project can be found on-line at:
     – http://www.saferneighbourhoods.net/files/index?folder_id=4622416
•   An on-line demonstration of the main system features can be found at:
     – http://www.xantura.com/presentation/
•   Xantura are registering and accrediting this G-App for public service
    use with the recently announced Cabinet Office Cloudstore, details can
    be found at:
     – http://www.govstore.net/
•   Further details of our community safety partnership company can be
    found at:
     – http://www.esqueak.co.uk/
•   Use of technology for the „Big Society‟ journey
     – http://www.ukauthority.com/?tabid=64 &id=3567




                                                                          13

More Related Content

What's hot

UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_LightVincent Lebunetel
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...Feroot
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
 

What's hot (19)

UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
 
eGovernment in Belgium
eGovernment in Belgium eGovernment in Belgium
eGovernment in Belgium
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Patent Insights: Connected Car Innovations
Patent Insights: Connected Car InnovationsPatent Insights: Connected Car Innovations
Patent Insights: Connected Car Innovations
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Basema aljaberi tra
Basema  aljaberi  traBasema  aljaberi  tra
Basema aljaberi tra
 
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
 

Viewers also liked

Employment support for long term incapacity benefit claimants
Employment support for long term incapacity benefit claimantsEmployment support for long term incapacity benefit claimants
Employment support for long term incapacity benefit claimantslocalinsight
 
Use of customer insight in revire of offender management services in Lewisham
Use of customer insight in revire of offender management services in LewishamUse of customer insight in revire of offender management services in Lewisham
Use of customer insight in revire of offender management services in Lewishamlocalinsight
 
Stage bij Novire | Hoe werkt dat?
Stage bij Novire | Hoe werkt dat?Stage bij Novire | Hoe werkt dat?
Stage bij Novire | Hoe werkt dat?Evelien Verkade
 
Codemotion pixel art for coders - Codemotion Rome 2015
Codemotion   pixel art for coders - Codemotion Rome 2015Codemotion   pixel art for coders - Codemotion Rome 2015
Codemotion pixel art for coders - Codemotion Rome 2015Codemotion
 
Brighton & Hove budget cuts 2015-16
Brighton & Hove budget cuts 2015-16Brighton & Hove budget cuts 2015-16
Brighton & Hove budget cuts 2015-16brightonpa
 
Wireframes Rulez - Santangelo
Wireframes Rulez - SantangeloWireframes Rulez - Santangelo
Wireframes Rulez - SantangeloCodemotion
 

Viewers also liked (8)

Employment support for long term incapacity benefit claimants
Employment support for long term incapacity benefit claimantsEmployment support for long term incapacity benefit claimants
Employment support for long term incapacity benefit claimants
 
Use of customer insight in revire of offender management services in Lewisham
Use of customer insight in revire of offender management services in LewishamUse of customer insight in revire of offender management services in Lewisham
Use of customer insight in revire of offender management services in Lewisham
 
Budget saving proposals - January 2014
Budget saving proposals - January 2014Budget saving proposals - January 2014
Budget saving proposals - January 2014
 
Stage bij Novire | Hoe werkt dat?
Stage bij Novire | Hoe werkt dat?Stage bij Novire | Hoe werkt dat?
Stage bij Novire | Hoe werkt dat?
 
Codemotion pixel art for coders - Codemotion Rome 2015
Codemotion   pixel art for coders - Codemotion Rome 2015Codemotion   pixel art for coders - Codemotion Rome 2015
Codemotion pixel art for coders - Codemotion Rome 2015
 
Brighton & Hove budget cuts 2015-16
Brighton & Hove budget cuts 2015-16Brighton & Hove budget cuts 2015-16
Brighton & Hove budget cuts 2015-16
 
Elderly Revision
Elderly RevisionElderly Revision
Elderly Revision
 
Wireframes Rulez - Santangelo
Wireframes Rulez - SantangeloWireframes Rulez - Santangelo
Wireframes Rulez - Santangelo
 

Similar to Protect Vulnerable Victims Index

Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
The challenges of making data secure
The challenges of making data secureThe challenges of making data secure
The challenges of making data secureLudovic Tant
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorLapSafe Products
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Huntsman Security
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelSURFnet
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 

Similar to Protect Vulnerable Victims Index (20)

Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
The challenges of making data secure
The challenges of making data secureThe challenges of making data secure
The challenges of making data secure
 
2019 GDRR: Blockchain Data Analytics - Cryptocurrency and blockchain analysis...
2019 GDRR: Blockchain Data Analytics - Cryptocurrency and blockchain analysis...2019 GDRR: Blockchain Data Analytics - Cryptocurrency and blockchain analysis...
2019 GDRR: Blockchain Data Analytics - Cryptocurrency and blockchain analysis...
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Avoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA ViolationsAvoiding Common Security Breaches & HIPAA Violations
Avoiding Common Security Breaches & HIPAA Violations
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 

More from localinsight

Using social media to reduce alcohol misuse - Birmingham City Council
Using social media to reduce alcohol misuse - Birmingham City CouncilUsing social media to reduce alcohol misuse - Birmingham City Council
Using social media to reduce alcohol misuse - Birmingham City Councillocalinsight
 
Thinking family, thinking community, Dr Debs Thompson
Thinking family, thinking community, Dr Debs ThompsonThinking family, thinking community, Dr Debs Thompson
Thinking family, thinking community, Dr Debs Thompsonlocalinsight
 
Dr Steve Scholey: Hampshire and Isle of Wight
Dr Steve Scholey: Hampshire and Isle of WightDr Steve Scholey: Hampshire and Isle of Wight
Dr Steve Scholey: Hampshire and Isle of Wightlocalinsight
 
Wakefield customer insight project
Wakefield customer insight projectWakefield customer insight project
Wakefield customer insight projectlocalinsight
 
Applying customer insight to make better informed decision making, Kingston u...
Applying customer insight to make better informed decision making, Kingston u...Applying customer insight to make better informed decision making, Kingston u...
Applying customer insight to make better informed decision making, Kingston u...localinsight
 
Assited bin collection vulnerable person project
Assited bin collection vulnerable person projectAssited bin collection vulnerable person project
Assited bin collection vulnerable person projectlocalinsight
 
CLG customer led transformation programme phase four
CLG customer led transformation programme phase fourCLG customer led transformation programme phase four
CLG customer led transformation programme phase fourlocalinsight
 
Lambeth violence againist women and girls customer insight project Lambeth pa...
Lambeth violence againist women and girls customer insight project Lambeth pa...Lambeth violence againist women and girls customer insight project Lambeth pa...
Lambeth violence againist women and girls customer insight project Lambeth pa...localinsight
 
South Staffordshire Council
South Staffordshire CouncilSouth Staffordshire Council
South Staffordshire Councillocalinsight
 
A consistent view of business identification before insight
A consistent view of business  identification before insightA consistent view of business  identification before insight
A consistent view of business identification before insightlocalinsight
 
Tesco voice of the customer: achieving a 360 customer view
Tesco voice of the customer: achieving a 360 customer viewTesco voice of the customer: achieving a 360 customer view
Tesco voice of the customer: achieving a 360 customer viewlocalinsight
 
Putting customer insight into practice, Peter Gadsdon, Lewisham Council
Putting customer insight into practice, Peter Gadsdon, Lewisham CouncilPutting customer insight into practice, Peter Gadsdon, Lewisham Council
Putting customer insight into practice, Peter Gadsdon, Lewisham Councillocalinsight
 
Insight family space, Graham Cadle
Insight family space, Graham CadleInsight family space, Graham Cadle
Insight family space, Graham Cadlelocalinsight
 
Embedding customer insight into the corporate culture Cheryl Coppell, London ...
Embedding customer insight into the corporate culture Cheryl Coppell, London ...Embedding customer insight into the corporate culture Cheryl Coppell, London ...
Embedding customer insight into the corporate culture Cheryl Coppell, London ...localinsight
 
Demenshate ken clemens
Demenshate ken clemensDemenshate ken clemens
Demenshate ken clemenslocalinsight
 
Behavioural insght and policy, David Halpern
Behavioural insght and policy, David HalpernBehavioural insght and policy, David Halpern
Behavioural insght and policy, David Halpernlocalinsight
 
Central bedfordshire council
Central bedfordshire councilCentral bedfordshire council
Central bedfordshire councillocalinsight
 
Families and alcohol
Families and alcohol Families and alcohol
Families and alcohol localinsight
 
Merseyside fire incident reduction partnership project update
Merseyside fire incident reduction partnership project updateMerseyside fire incident reduction partnership project update
Merseyside fire incident reduction partnership project updatelocalinsight
 

More from localinsight (20)

Using social media to reduce alcohol misuse - Birmingham City Council
Using social media to reduce alcohol misuse - Birmingham City CouncilUsing social media to reduce alcohol misuse - Birmingham City Council
Using social media to reduce alcohol misuse - Birmingham City Council
 
Thinking family, thinking community, Dr Debs Thompson
Thinking family, thinking community, Dr Debs ThompsonThinking family, thinking community, Dr Debs Thompson
Thinking family, thinking community, Dr Debs Thompson
 
Dr Steve Scholey: Hampshire and Isle of Wight
Dr Steve Scholey: Hampshire and Isle of WightDr Steve Scholey: Hampshire and Isle of Wight
Dr Steve Scholey: Hampshire and Isle of Wight
 
Wakefield customer insight project
Wakefield customer insight projectWakefield customer insight project
Wakefield customer insight project
 
Applying customer insight to make better informed decision making, Kingston u...
Applying customer insight to make better informed decision making, Kingston u...Applying customer insight to make better informed decision making, Kingston u...
Applying customer insight to make better informed decision making, Kingston u...
 
Assited bin collection vulnerable person project
Assited bin collection vulnerable person projectAssited bin collection vulnerable person project
Assited bin collection vulnerable person project
 
CLG customer led transformation programme phase four
CLG customer led transformation programme phase fourCLG customer led transformation programme phase four
CLG customer led transformation programme phase four
 
Lambeth violence againist women and girls customer insight project Lambeth pa...
Lambeth violence againist women and girls customer insight project Lambeth pa...Lambeth violence againist women and girls customer insight project Lambeth pa...
Lambeth violence againist women and girls customer insight project Lambeth pa...
 
South Staffordshire Council
South Staffordshire CouncilSouth Staffordshire Council
South Staffordshire Council
 
A consistent view of business identification before insight
A consistent view of business  identification before insightA consistent view of business  identification before insight
A consistent view of business identification before insight
 
Tesco voice of the customer: achieving a 360 customer view
Tesco voice of the customer: achieving a 360 customer viewTesco voice of the customer: achieving a 360 customer view
Tesco voice of the customer: achieving a 360 customer view
 
Putting customer insight into practice, Peter Gadsdon, Lewisham Council
Putting customer insight into practice, Peter Gadsdon, Lewisham CouncilPutting customer insight into practice, Peter Gadsdon, Lewisham Council
Putting customer insight into practice, Peter Gadsdon, Lewisham Council
 
Insight family space, Graham Cadle
Insight family space, Graham CadleInsight family space, Graham Cadle
Insight family space, Graham Cadle
 
Embedding customer insight into the corporate culture Cheryl Coppell, London ...
Embedding customer insight into the corporate culture Cheryl Coppell, London ...Embedding customer insight into the corporate culture Cheryl Coppell, London ...
Embedding customer insight into the corporate culture Cheryl Coppell, London ...
 
Demenshate ken clemens
Demenshate ken clemensDemenshate ken clemens
Demenshate ken clemens
 
Behavioural insght and policy, David Halpern
Behavioural insght and policy, David HalpernBehavioural insght and policy, David Halpern
Behavioural insght and policy, David Halpern
 
Central bedfordshire council
Central bedfordshire councilCentral bedfordshire council
Central bedfordshire council
 
Demenshare
Demenshare Demenshare
Demenshare
 
Families and alcohol
Families and alcohol Families and alcohol
Families and alcohol
 
Merseyside fire incident reduction partnership project update
Merseyside fire incident reduction partnership project updateMerseyside fire incident reduction partnership project update
Merseyside fire incident reduction partnership project update
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Protect Vulnerable Victims Index

  • 1. Victims & Vulnerable People Steve Foston (North Lincolnshire Safer Neighbourhoods) and John Dunworth (former Head of ASB Unit, Home Office) 1
  • 2. Why protect Victims & Vulnerable People? • The European Convention on Human Rights – All public authorities have to comply with the convention • In consideration of 2 British cases the European Court of Human Rights confirmed that the State is obliged to „take measures to protect individuals ... From ill-treatment and to take reasonable steps to prevent ill-treatment of which the authorities had or ought to have had knowledge‟ 2
  • 3. How we have built the Victim & Vulnerable Person Index system • The system is based on the CLG research programme “Effective Partnership Data Management” • Developed by Xantura Ltd and built upon their „data fusion‟ technology – the system matches, coordinates and builds a Victim & Vulnerable Person‟s Index from the partnership supplied data sets using – – Predictive modelling techniques based on customer insights – Including vulnerable localities, risk determinants and constraints – Maps the citizen‟s different forms of vulnerability into „domains‟ – Identifies those citizen‟s at „high risk‟ of becoming a victim. • Provides the “ought to have” knowledge required for compliance with the European Convention 3
  • 4. Overcoming obstacles • Extensive research on Data Protection issues – Legal opinion provided by a barrister confirms • The Crime & Disorder Act 1998 does provide the ‘gateway’ for the exchange of personal information between partnership agencies (with some constraints) • The development of the Index system is a for a legitimate and lawful purpose – The main “issue” is the potential for conflict between implied consent (protection from harm) and a data subject‟s explicit and informed consent. • Securing personal information – Xantura have set up a private data centre that is GC accredited (IL3 “Restricted”) and partner data transfers are undertaken through the Public Service Network (G-App) 4
  • 5. Supporting Vulnerable People - practical examples • Identifying the vulnerable – Prevent people from falling through the 'gaps' 5
  • 6. Supporting Vulnerable People • “High risk” individuals are identified by the insights provided by the Index system, the other side of the Xantura system is the • Springvault application providing a secure support package that is designed to reduce a citizen‟s overall level of vulnerability this – Includes both a core personal safety plan (e.g. Fire safety checks, target hardening, asset scanning, etc.) and individually tailored services elements. – Is a 2 way communications portal for the electronic exchange of information between vulnerable citizen‟s & their supporters (family, “Big Society” groups such as Victim Support and professional partnership practitioners) – Permits citizens and their proxies to manage their own data sharing consents • This is a secure „cloud‟ based application that is available over the world wide web and, soon, will be supported by a mobile phone App that our social enterprise partnership (Squeak) is commissioning from Xantura. 6
  • 7. Supporting Vulnerable People – Additional practical examples • Protecting their on-line identity – Squeak is investigating the use of Smartcards to store Citizen ID's • Encourage digital inclusion (i.e. the vulnerable will not have remember complicated userid/password combinations to login) • Chip/Pin, Biometrics, Metro style picture interface • The Squeak smartcard will be compatible with the Local Government Smartcitizen scheme that is in current use by 7.5M citizens throughout the UK – Single sign-on and access to „Clouds‟ • Use of encrypted identity “tokens” for sign-in to web/mobile apps; much safer than „vanilla‟ userid/password accreditation, helps protect against malware 7
  • 8. Supporting Vulnerable People – Additional practical examples • Physical protection – Electronic Incident Diaries and Alert Boxes – Protecting their equipment • Lojack Laptop protection software - tracking and immobilising access to data • Radio Tactics "Hermes/Apollo" - UK National property register – Protecting their money (Cyber-crime) • Smartswipe - Credit/Debit card protection 8
  • 9. Physical protection – Equipment & property (Laptops) • Laptops: Squeak is making arrangements with Absolute Software for the supply of their „lojack‟ product this – – Is „Secured by Design‟ and ACPO approved – Loads into the Laptop‟s firmware and cannot be removed – When stolen • Tracks where the device is for recovery in cooperation with the Police • Protects privacy, disables access to files, applications, etc. stored on the laptop 9
  • 10. Physical protection – Equipment & property (Other mobile devices, property) • Other mobile devices/property; with Humberside Police we are implementing Radiotactics “Hermes/Apollo” system for – – Other mobile devices (smart phones, etc.) – Other uniquely identifiable property (e.g. Cameras, bikes, etc.) details can be registered with the UK National Property Database “Immobilise” – When stolen • To deter „thefts‟ property can be scanned into the database and more easily recovered by Police – acts like an electronic form of „Smartwater‟ 10
  • 11. North Lincolnshire • Use the burglary predictive modeller to Case Study being identify „hot spots‟ to target progressed at the moment We are using predictive modelling techniques to target burglary hot spots with crime prevention leaflets and offer protection to the public in these areas. The licensing of the Lojack software can be purchased by members of the public in these areas, if they chose to do so, from the Squeak web site. Similarly, there other property details can be added to the UK national property database for„ Hermes/Apollo‟ scanning if stolen. The Vigilance predictive modeller is available for free use by Police forces and community safety partnerships at https://www.vigilancemodeller.net 11
  • 12. Protecting their money – Cyber-crime • Its a sad fact of life that vulnerable people are increasingly targeted both physically (through the post) and virtually via the Internet to relieve them of their cash; thieves use „malware‟ to capture their identity and credit/debit card details, etc. • We have already referred to systems that can assist protect a citizen‟s identity through the use of smartcards, tokenised single sign-on to cloud systems, etc. and now we want to show you this „Smartswipe‟ device that can help protect people when making credit/debit card purchases over the Internet or other applications such as on-line banking. • This device „insulates‟ the citizen‟s financial transaction data from being stored on their PC . Any financial transactions made over the internet are fully encrypted by the „Smartswipe‟ device. • This particular device can read Smartcards as well as credit/debit cards so it can be used as a conventional card reader (e.g. Squeak & LA smartcards) as well as protecting a vulnerable person (or their supporters) financial information on the world wide web 12
  • 13. Additional Information • Further information about the North Lincolnshire Victim and Vulnerable Persons Index project can be found on-line at: – http://www.saferneighbourhoods.net/files/index?folder_id=4622416 • An on-line demonstration of the main system features can be found at: – http://www.xantura.com/presentation/ • Xantura are registering and accrediting this G-App for public service use with the recently announced Cabinet Office Cloudstore, details can be found at: – http://www.govstore.net/ • Further details of our community safety partnership company can be found at: – http://www.esqueak.co.uk/ • Use of technology for the „Big Society‟ journey – http://www.ukauthority.com/?tabid=64 &id=3567 13