|
Improved hand hygiene amongst hospital staff is almost certain to be the major factor in the dramatic fall in healthcare associated infections, new research has found.
The DaRo Group, which manufactures hand hygiene inspection cabinets used by NHS organisations for staff training purposes, carried out in-depth research over three months to assess the impact of improved hand hygiene practices in hospital settings.
The research included gathering important information and statistics from key agencies such as the National Patient Safety Agency (NPSA), the Health Protection Agency (HPA) and the World Health Organisation (WHO). It also involved engaging directly with a number of leading infection control experts.
Annette Jeanes, Consultant Nurse and Director of Infection Prevention and Control at University College London Hospitals NHS Foundation Trust, said: -In terms of reducing infections such as MRSA and C.diff improved hand hygiene has been the key. Microbiologists and infection control experts have known the importance of hand hygiene for many, many years. However, the real difficulty was changing the hearts and minds of people and getting them to take the issue seriously.
-In recent years patients, politicians and the press have become involved, which has helped to raise awareness of the issue. However, the fact levels of infections are now statistically measured and people are being held responsible for performance is the main reason for improved behaviour towards hand hygiene in hospitals and this had lead to a major reduction in infection rates.
Dr Tony Elston, Consultant Microbiologist and Director of Infection Prevention and Control at Colchester Hospital University NHS Foundation Trust said: -I would certainly agree that improved hand hygiene amongst hospital staff has been the principle reason for the reduction in MRSA rates and, along with a other measures, has played a vital role in helping to reduce a number of other infections such as C.diff.
-In recent years HCAIs have been falling at a significant rate and it is no coincidence the reduction has happen after stringent hand hygiene improvements were introduced. Hand hygiene for staff is extremely important. Our clinical staff now undergo vigorous hand hygiene training, which includes testing their hand washing competence under an ultra violet ‘glow box’ which highlights any bacteria which is left after the hand washing process.
HPA figures show healthcare associated infections, such as MRSA and Colstridium Difficile have fallen dramatically since the NPSA launched the Clean Your Hands Campaign in 2004 with the aim of improving hand hygiene amongst healthcare staff.
Between April 2004 and March 2010 MRSA rates in hospitals across England fell from 7,233 to 1,898. Similarly, cases Clostridium Difficile (C.diff) in hospitals in England have fallen from 55, 498 in to 25,604 in recent years.
Damon Goodyear, Managing Director of the DaRo Group, based in Sudbury, Suffolk, said: -We wanted this research to be a real fact finding mission. A lot of resources nationally have gone into raising the importance of hand hygiene to stop the spread of infection. However, what we haven’t seen is any report which shows how effective the improvements have been and how much of a role improved hand hygiene has played in terms of helping to reduce HCAIs.
-Our research, backed by the opinions of leading experts, clearly show improved hand hygiene amongst hospital staff is the major reason for the fall of HCAIs in hospital settings. We feel it is only right to make our findings public to ensure the importance of hand hygiene retains a high profile.
Health experts across the UK, Europe and America now agree that improved hand hygiene has played a major role in reducing HCAIs and as a result in May 2010 the WHO launched the ‘Save lives, clean your hands campaign’ inviting hospital workers and healthcare professionals to actively promote hand hygiene to reduce infections. To date 11,500 healthcare facilities representing 6.5 million healthcare professionals have registered their commitment to the campaign.
Washing hands for 20 to 30 seconds according to NHS and WHO guidelines is known to significantly reduce risk of cross contamination, therefore reducing risk to patients becoming exposed to infections. Healthcare professionals should clean their hands before touching a patient, before a medical procedure, after being exposed to a patient’s body or body fluids, after touching a patient and after touching a patient’s surroundings.
-Although improved hand hygiene is helping to reduce HCAIs this is no time for complacency and there is still much more work to be done. Micro-organisms and viruses are becoming much more sophisticated and resistant so we have to keep ahead of the game. Although there is almost a 100% compliance with the national hand hygiene requirements in some organisations, many individuals still do not clean their hands properly and this is something which needs to improve, added Annette Jeanes.
For more information of the hand hygiene inspections cabinets go to
www.handinspection.co.uk
Before we can hope to achieve best practice, we need to address ‘best thinking’ – that is, to assess the patterns of thinking amongst our managers. How managers think will affect the way they manage and interact with their team, ultimately affecting the success or failure of a project or initiative.
In order to bring a project to a successful conclusion and if they are to develop and maintain a strong relationship within their team, a manager needs to have a clear sense of their role.
Over recent years I have started to consider how people think and whether everyone has a mental crib sheet, a ‘to do’ list in their head. As a trainer and mentor, I am a great supporter of management training which focuses on competence and behaviour, but I also believe that the way managers think has a huge impact on their management style.
In fact, I was so convinced that the way managers think defines them as leaders, shaping the way they allocate their time, making decisions and ultimately delivering, that we at pearcemayfield decided to conduct some research into the subject. We carried out a modest research study among practicing portfolio, programme and project managers and assessed the views of their senior managers on their abilities.
The study revealed some intriguing patterns of thinking and it quickly became apparent that the most highly regarded managers are those with a clear sense of direction, who understand why they make a particular decision and are able to articulate the reason for making that decision. This self-awareness doesn’t come easily to everyone and can separate the drivers from the driven.
We asked our sample of managers to make their own personal action list at a particular point in their project or initiative and, of course, no two lists were the same. Where some people are inclined to concentrate the majority of their time reacting to and solving problems, others spend their time more proactively – clearly separating the managers into two groups. We also found that everyone does have a mental cribsheet but that the think-act mechanism varies from one person to another.
The self-aware manager should understand that relationships are central to success and this trait did emerge from our findings, with the leaders showing a distinct bias towards developing and maintaining relationships. By committing between 60 to 85 per cent of their time to engaging with stakeholders, our high performing managers illustrated they were thinking about their relationships in a real and active way, rather than just ticking the right boxes.
Most of us are able to examine the success or failure of our projects and programmes and have the means to measure the performance of individuals. Research from Harvard indicates that personal performance is actually based on being part of a team and on joining a new team those previously performing well experience a drop in performance. If this is the case then perhaps we also need to address the role of the extended team.
From other studies among high-performing project managers it has been revealed that there is a tendency for them to assess unexpected issues which arise before committing them to a formal part of the management process or logging system.
These high performers advocate a cooling off period when faced with unforeseen circumstances, on the premise that many apparently serious issues often come to nothing. They believe it is unnecessary to complicate matters by formally recording an issue which can force unnecessary urgency and demand on the management team.
It seems to come quite naturally to the successful project manager to build extra time, or what we call a personal float, into their working schedules, to allow sufficient time to cover for unplanned events. Interestingly, not everyone in our study was able to work in this way, or was capable of thinking ahead, leading us to examine the ‘knowing-doing’ gap. This differentiation between people seems to come down to someone’s level of self-awareness and self-confidence which they constantly measure against their management capabilities.
Out of our study three particular patterns emerged relating to the way project, programme and portfolio managers think. They are all self-aware, have a bias towards building relationships and an ability to build a personal margin into their thinking.
When looking at how to get the best performance out of our managers which will lead to the benefit of them individually, the members of their team and the business as a whole, if we just focus on best practice, we are missing an important piece of the jigsaw. We obviously need to continue to concentrate on management training in core competencies, but until we start to think about our thinking we will not truly benefit from best practice.
John Edmonds is an experienced project and programme manager and head of training and development at pearcemayfield www.pearcemayfield.com. He was on the authoring team of the highly acclaimed version of the project management method PRINCE2, released in 2009. John writes in his blog called The Opsimath.
www.pearcemayfield.com
CSC (NYSE:CSC) has announced that the Royal Liverpool and Broadgreen University Hospitals NHS Trust has successfully completed a proof of concept (PoC) evaluation of its Clinical Information Portal. This was developed as part of a pilot of the NHS Interoperability Toolkit.
Going live on June 10 of this year, the portal was initially deployed within the trust’s haematology and dermatology departments. During the 60 day evaluation period, the success of the portal grew to include two additional departments: cardiology and renal. Since completion in September, due to demand from clinicians, the trust extended the use of the CSC portal for a further two months to cover the period whilst it completed its procurement process of selecting a portal system to be rolled-out across all hospital sites.
The PoC was initiated to enable the trust to evaluate the use of portal technology as a replacement for paper case notes. Working with CSC and NHS Connecting for Health, the PoC project managers devised full assessment criteria against which results could be measured and opinion of clinicians assessed.
CSC partnered with Carefx Corporation, a leading interoperability platform provider, to deploy the portal which is built on Carefx’s Fusionfx platform. After announcing a partnership agreement in April 2010, both organisations have worked together to deliver the PoC at the trust.
The portal has enabled healthcare professionals to obtain a single screen view of a patient’s notes, collated from information currently held in disparate clinical and administration systems across the trust, such as PAS (patient administration system) and PACS (picture archiving and communications system). It has allowed consultants, their registrars and specialist nurses to consult with patients by viewing patient medical history, key treatments, referrals, diagnosis and test results electronically rather than by paper case notes.
Since completion of the PoC, evaluation reports indicate complete success. All of the targets set have been met or exceeded and feedback from clinicians has been extremely positive, indicating that there have been no problems seeing patients without the traditional case notes.
Use of the portal has given healthcare professionals the ability to have instant access to comprehensive patient records, meaning that treatments can be based on the latest data, ensuring care plans are as relevant and as safe as possible. Clinical and administrative efficiency has also increased significantly with clinicians reporting, on average, a reduction of clinic times by up to 30 minutes. Also, nurses no longer have to spend time moving case notes around and clerk time searching for and preparing case notes has been cut drastically, which previously could take up to 60 percent of their time.
-Just being able to view all critical information about a patient on one screen is a revelation, stated Professor Patrick Chu, consultant haematologist at the Royal Liverpool and Broadgreen University Hospitals NHS Trust. -The use of portals is clearly the way forward to help increase efficiency, improve treatment and diagnosis and patient safety. It will make the paperless clinic a reality which is long overdue. I wholly support the wider adoption of this technology so that healthcare professionals are free to concentrate on the care of their patients.
Supporting Professor Chu’s comments, James Norman, Director of IM&T at the trust also agreed that the success of the PoC has provided the business case required to ensure that a portal solution is deployed across the trust.
-We are aiming to begin full roll-out of a portal system at the beginning of 2011, he said. -To get us to this stage I must give credit to the support and professionalism of the CSC and Carefx personnel that worked closely in partnership with the trust staff to help ensure the evaluation was a success. It has certainly been refreshing for me to see users embrace the system and witness their delight in the end results. We are excited about the efficiencies and opportunities that a portal can bring to the trust through the elimination of case notes and improved access to the right information at the right time for clinicians.
Crucially, as the portal can integrate systems from multiple vendors, this is consistent with the trusts objectives around interoperability, protecting their existing IT infrastructures and assuring flexibility in the future.
Andrew Spence, CSC’s UK director of Healthcare Strategy, added: -This pilot demonstrates how clinical staff can benefit from this approach. By making access to relevant data simpler as part of their workflows, clinicians can spend more time concentrating on their patients rather than IT. No longer will clinicians or administrative staff have to remember multiple passwords and user names and have to interrogate different systems for each part of a patient’s record, which brings gains for everyone.
-The results speak for themselves and I believe the work with Royal Liverpool University Hospital and Broadgreen Hospital will ultimately benefit other trusts in the NHS. It is clear that portal technology can drive efficiencies and provide a more seamless service for patients.
With more than 82 per cent of the adult population now having access to the Internet, Tufin Technologies is warning IT managers of the need to prepare for a potential network overload situation as workers use their company IT resources for everything from multimedia greetings to videoconferencing connections to distant colleagues.
And that, says Rueven Harrison, the security lifecycle management specialist’s chief technology officer, is before we even begin to talk about those organisations that host Web sites in the online retail sector, or process payment card transactions.
“Even at the best of times, the Internet is well loaded with Web surfing and general email exchanges, but the current cold snap, combined with the impending holidays – and the fact that many people are taking their annual leave allocation before the year’s end – means that workers are turning to the Internet to ratchet up their work efficiency,” he said.
“Videoconferencing is definitely in vogue amongst many of the companies we encounter, but the real potential Internet killer is the number of Web site visitors – and the consequential IP traffic that these sessions generate,” he added.
According to Harrison, the potential overload situation will crank up a few more stops this coming weekend as Thanksgiving starts in the US, and Black Friday-driven online shopping starts in earnest.
Amazon, he explained, has done its bit to get users online with its UK-based Black Friday lightening sales, which has resulted in peak-time page issues with the Amazon.co.uk site.
Whilst Amazon is using all manner of Internet load balancing to ensure that users of its site only have to wait a short while for a page to load at peak times, the fact that the mighty shopping giant’s Web site is exhibiting page loading delays indicates the potential scale of the problem, he went on to say.
So what can IT managers do to stop their Web sites – and the company IT resources – from becoming seriously stretched?
The solution, the Tufin CTO says, lies in careful planning.
IT managers and their staff, he advises, need to start monitoring their systems. The firewall, he points out, is a good point for monitoring connection rates.
“If there are rules that you need to report on, make sure that audit logs are being generated. If you are not recording firewall performance stats, turn them on now – before you need them,” he said.
“Secondly, start looking for anything that can cause an interruption of service due to resource exhaustion. What is your firewall connection table limit? If it was 25,000 last year, it probably should be higher this year,” he added.
Harrison went on to say that managers need to look at what their peak IP traffic was last year and what the peak has been so far this year – you should, he says, plan for somewhere between a 20 and 200 per cent increase, depending on your business model.
You will also, he notes, want to ensure you don’t hit your maximum number of IP connections at this time of year.
“Most security experts advise setting this number low enough to stop a denial-of-service, but at this time of year we are expecting sudden bursts of connections, so flexibility is the name of the game,” he explained.
It’s also, he said, worth printing out some hard copies of performance trends from last year. It is much easier if you already have them handy when you are trying to understand this year’s trends.
“Also take a look at all of your disk drives. Logically, do you have plenty of space? Don’t forget to physically walk to your firewalls and make sure there are no failed drives with the little red lights on. With firewalls tucked away in data centres, and drives in RAID, we all sometimes forget to look for faults on devices, like a failed drive in a RAID mirror set,” he said.
“Finally, don’t forget the cloud. If, like many organisations you are running a hybrid data centre configuration, ensure that your cloud service provider has sufficient spare and on-demand capacity to support a surge in peak time demand,”
Using these recommendations, Harrison says that IT managers can develop a good risk analysis strategy that they can update on a regular basis.
As your IT resource grows and diversifies, he adds, your IT security planning will then not get left behind. Then, if the worst really does happen, you’ll be as prepared as possible.
For more on Tufin Technologies:
www.tufin.com or Yvonne Eskenzi on 0207 1832 833 or email Yvonne@eskenzipr.com
The University Hospital of South Manchester NHS Foundation Trust has been awarded the top prize at the Guardian Public Services Awards 2010 for reducing its energy consumption and carbon emissions by 26% over the last three years, saving £15,000.
As well as the Overall Winner Award (sponsored by Hays Recruitment), the trust also won the Sustainability prize (Sponsored by Capgemini). All of the organisations that won individual categories were considered for the overall award, and Manchester beat eleven other category winners to win the top prize.
At the awards ceremony in London last night, broadcaster Jeremy Vine, who hosted the event, said: -With efficiency and sustainability at the forefront of the public services agenda, the judges thought the long-term energy and cost savings planned at both of the trust’s hospitals made it an extremely worthy Overall Winner this year. In addition to its use of sustainable technology, Wythenshawe – which aims to be Britain’s greenest hospital – actively engages staff to share in its ambition through the provision of employee allotments, cycle to work and car sharing schemes, and the judges said it was an excellent example of best practice.
The prestigious Public Servant of the Year award was won by John Biggin, Director of Doncaster Prison and Young Offender Institution. John, who joined the prison service 25 years ago, won the award – sponsored by Unison – for his outstanding leadership, creativity and commitment to both prisoners and staff, including bringing the Doncaster Rovers football team into the prison to offer coaching sessions. The award was voted for by members of the public.
David Brindle, The Guardian’s Public Services Editor, said: -The Public Servant of the Year category is perhaps the toughest since the candidates have to stand the test of public scrutiny. John’s commitment to the prison service over 25 years is a true demonstration of what public service is all about. Much of what John has achieved has been the result of activities and incentives that dissuade prisoners from rule breaking. For example, in the past year he has introduced media and arts activities to improve education and reoffending rates and has even encouraged Doncaster Rovers to provide sports coaching to inmates. He is a true inspiration, and my congratulations go to John and all the shortlisted candidates.
North Yorkshire Police statement regarding police officer recruitment
In relation to reports in the national media about police forces in England and Wales putting in place a recruitment freeze in response to the Comprehensive Spending Review, North Yorkshire have issued to the following statement:
Having reviewed the force’s financial position, in common with many forces, North Yorkshire Police have decided to cease the existing Police Officer recruitment process and will not be recruiting Police Officers for the foreseeable future.
We recognise that this news is disappointing for aspiring police officers with current applications pending, all of whom have by now received a letter informing them of the situation.
The English National Screening Programme for Diabetic Retinopathy (ENSPDR) is working with Quicksilva, an independent provider of software to the private and public sector, and OLM Professional Services, a specialist provider of consultancy services to the health and social care sector, to put in place a framework for automating the sharing of data between GP practices and diabetic retinopathy screening programmes.
Current information sharing processes have presented barriers to the accurate identification of screening programme participants, resulting in a significant number of individuals being overlooked. Quicksilva has developed a bespoke application, called the GP2DRS database, which will automate the transfer of patient data between GPs and local screening programmes.
At present details of people with diabetes are made available to screening programmes through various manual processes. With 8,000 GP practices and nearly 100 screening programmes in England, this represents a huge administration burden that is also prone to error. As a result, screening programme registers are often incomplete or out-of-date. Built in .NET, the GP2DRS database will automate the transfer of patient details, notification of eligibility and consent for screening, and the return of screening results to GPs.
Esther Provins, National Informatics Lead, ENSPDR said: -Diabetic retinopathy is the leading cause of loss of sight in the working age population. If caught early it can be successfully treated, but the current system for information sharing between GPs and LSPs represents a number of challenges due to the sheer volume of data that needs to be shared, processed and logged by both parties. This data tidal wave is impacting patients on two levels. Firstly, it restricts screening programmes from identifying individuals that need to be screened. Secondly, we don’t always have the most up-to-date information about current patients, impacting the quality of service they receive.
-The GP2DRS database will significantly overhaul how patient information is managed, resulting in a more streamlined and effective service for all concerned.
The ENSPDR is working closely with screening programmes and national NHS organisations to ensure that the new process is understood and the technology can be adopted as soon as possible.
Gayna Hart, MD, Quicksilva commented: -Without question the GP2DRS database is going to a have a positive impact on the patients’ experience. Diabetic retinopathy screening programmes are outnumbered by GPs 80 to 1, which represents a significant administrative strain for them. Automating the sharing of data will ease the pressure point and allow them to concentrate on other activities that have a direct impact on the service they deliver which they are rightly very proud of.
Quicksilva is delivering the GP2DRS data base in partnership with OLM Professional Services, part of the OLM Group, who deliver technology and consultancy solutions for adult and children’s services, health and the corporate IT market.
Peter O’Hara, CEO, OLM Group said: -In recognition of OLM Group’s ASCC approved supplier status, which demonstrates the strength of our commitment to the sector, we are delighted to partner with Quicksilva on this project. We are proud to be involved in such a vital project that will help screening programmes across England to be more efficient and proactive.
Keeping your staff’s personal information safe online
Media law expert Cleland Thom warns of the dangers of mixing business with pleasure.
Personal information
Private material on social networking sites is protected by the media regulatory codes, and the law.
In short – instruct your clients:
1. Never publish personal information anywhere on the web.
2. Assume the content of ALL emails will be published.
3. Never mix business with pleasure on sites like Facebook.
What’s personal
The European Convention on Human Rights gives privacy rights to:
1. Your correspondence – written and digital.
2. Your family life
3. Your private life
4. Your home life
5. Health and medical information
The PCC /Ofcom Codes
Publishing people’s personal information can be a breach of privacy. You may be able to protect clients from breaches.
Just because someone uploads their details and photos to a social networking site like Facebook does not mean they have consented to the media using them.
The media can only publish personal / private information safely if it is in the public interest. And if the person is under 16, exceptional public interest must be proved.
Photos – PCC Code and the DPA
The PCC and the courts make it clear that photos involve a greater invasion of privacy than words.
Photos published in areas of someone’s Facebook that are marked for ‘Everyone’ can be used by the media, though journalists should get consent unless publication is in the public interest.
There are issues with the Data Protection Act, too.
The Information Commissioner says that he treats images published on Facebook as for ‘personal use’ , similar to ‘family albums’.
So the journalist should not publish them without consent , unless there is a clear public interest issue.
Suicides and grief
Clients are entitled to significant protection during times of grief and shock.
The Press Complaints Commission has also issued new guidelines about the reporting of suicides:
1. Photos of victims of suicides, or other deaths on Facebook should not be used without consent of the close family, unless there is public interest in the victim – whether they are obtained from the dead person’s page, or someone else’s.
2. If there is a spate of suicides, photographs of previous victims should not be used each time a new death arises.
3. Excessive detail about suicides (including photos) should not be used.
4. Precise details about methods of suicides should not be reported.
5. Journalists should beware intruding into families’ grief and shock, both with approaches for stories and photos, or with the way stories and photos, including inquests, are presented. Note – these approaches apply to those made through Facebook as well as normal routes like door-knocks, etc. There is no problem in making an approach – but it should not amount to harassment or intrusion.
6. Tributes or comments from tribute sites, or from the Facebook pages of friends of people involved in deaths or accidents are usually safe to use – but again beware intruding into families’ grief and shock.
The law
EU Information Society Commissioner Viviane Redding has reminded the media: -European privacy rules are crystal clear: a person’s information can only be used with their prior consent.
The ECHR articles on privacy are worded the same as the PCC and Ofcom Codes. So the advice above applies to privacy law, too.
A reader can deal with an alleged invasion of privacy by a journalist, either under the codes, or through the courts, or both.
Readers are more likely to use the codes, because it is quicker and free.
This extract is taken from the PR Media Law Guide, price £19.95. To order a copy, contact: cleland@ctjt.biz
Cleland Thom does media law training and consultancy to a number of corporation and public authorities, including GPSJ, United Utilities, World Trade Group, Herts County Council, London Borough of Brent and Three Rivers District Council.
Trusteer’s research group has found that 30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism. These findings are based on monitoring of thousands of Phishing attacks.
According to Mickey Boodaei, Trusteer’s CEO, in a real time phishing attack the user enters details onto a phishing website which captures the banking credentials and authentication information; the stolen credentials are then immediately used to open a session on the real bank website to commit a fraud. Authentication information typically captured and used by criminals in real time phishing include: One Time Passwords (OTP) ; tokens; SMS authentication; Card and Readers, rendering them ineffective against this type of attack.
Most phishing attacks to date have been completely static. In traditional phishing attacks the victim reaches a phishing website, submits login credentials, and these credentials are stored for later use by e-criminals. The introduction of strong two-factor authentication systems, especially one time passwords, rendered these attacks useless as fraudsters could not use static stolen credentials to commit fraud. With strong two factor authentication the user is required to provide a OTP as part of the login process. There are many OTP approaches, some of them are based on token devices that users carry along with them, others are sent to the user’s phone as an SMS text or voice call each time the user tries to log on. OTP’s are limited in time. Even if the fraudsters managed to capture OTP data there is only a short period of time in which this data can be used. For some time, websites that used strong two-factor authentication reported a significant drop in phishing attacks. The e-criminals, however, have not given up.
Man-in-the-Middle Phishing
-Recently Trusteer have noticed an increase, on 3 different continents, of a type of attack called man-in-the-middle phishing or, real-time phishing. This tactic allows fraudsters to completely bypass two-factor authentication. The concept is not a new one and is well known in the security world; however, up until now, we haven’t seen too many attacks like this. The recent escalation of websites now experiencing this type of attack is a cause for immediate concern,” said Boodaei.
In a man-in-the-middle attack the phishing website is connected, in real-time, to the bank website. The credentials that the user submits to the phishing site, including OTPs, are stolen and used immediately by the fraudsters to initiate a fraudulent session with the bank website. It doesn’t matter if the website is using a dedicated OTP token, SMS authentication, Card and Reader, or any other type of two-factor authentication.
At first glance, real-time phishing seems just like any other phishing attack. On closer examination of the malicious website, however, one can determine that it is, in fact, connected in real-time to the bank. This enables any information submitted to the fake web page to be immediately posted to the bank website.
Many organizations that used strong two-factor authentication were dismissive of phishing attacks as they assumed that they were incapable of bypassing their security controls. This is no longer the case. Using phishing kits with real-time capabilities fraudsters have improved their operations to conduct fraud in real-time.
-With real-time phishing, OTPs are becoming useless. There is no update or improvement to OTP that can defeat real time phishing. The best form of defence is to implement dynamic layers of security, including browsing security, that can adapt to and block new threats,” said Boodaei.
Media law expert Cleland Thom offers some simple advice on an important law.
Copyright law protects original work. It affects PRs in two different ways:
1. The media may illegally use your copyright material.
2. You may illegally use someone else’s copyright material.
Copyright covers:
1. Written words.
2. Photos.
3. Logos.
4. MP3 / MP4 files.
5. Images.
6. Clips from YouTube etc.
7. Page designs.
8. Computer programmes.
9. Databases.
It doesn’t cover:
1. Facts.
2. News.
3. Information.
4. Ideas.
5. Slogans.
Who owns copyright?
1. Employers – not employees.
2. Freelance writers.
3. Freelance photographers.
If you are distributing material to the media (images, photos, words, podcasts etc), it is your job to check the copyright and obtain necessary consents.
If you have a photo that was commissioned for private or domestic use (eg: someone’s wedding photo, graduation pic etc) you must get the consent of the person who COMMISSIONED it. They have the right to veto publication. You need the consent of the PHOTOGRAPHER, too.
Fair dealing
EXTRACTS of copyright work can be used – free, and without consent, on two occasions:
1. To report current events – but you can only use words, not pix.
As a guide, you should use less than a third of the original. Weigh up:
How many extracts have been used?
What percentage of the original have been used?
The percentage the extracts make up of the new article.
2. For review purposes – words or pix.
You can only use as much as you need to make your point.
The conditions of fair dealing are:
1. The copyright owner must be given sufficient credit.
2. You must not misrepresent the work or make fun of it.
3. You must not pass it off as your own.
Don’t …
1. Lift pix from the web, or anywhere else, without written consent.
2. Use videos from YouTube or elsewhere on the web, without written consent.
3. Lift facts from copyright work, without checking they’re accurate.
4. Use ‘personal’ pix without written consent – see above.
5. Use frame-grabs from TV or the web without acknowledgement.
6. Alter graphics or pix and pass them off as yours.
7. Deep link to other sites and give the impression the content is yours.
This extract is taken from the PR Media Law Guide, price £19.95. To order a copy, contact: cleland@ctjt.biz
Cleland Thom does media law training and consultancy to a number of corporation and public authorities, including GPSJ, United Utilities, World Trade Group, Herts County Council, London Borough of Brent and Three Rivers District Council.
The ProcessFlows Text Message Server (TMS) platform was chosen by Fireco, manufacturers and installers of wireless fire safety products, as the text messaging gateway for their new Deaf Message Service (DMS) fire notification solution for the deaf and hard of hearing.
DMS has been developed by Fireco and partners – ProcessFlows, Adaptive Modules (modem technology provider) and Wireless Logic (SIM technology provider) – to meet the demand for improved emergency notification communications for the deaf community.
Using DMS, deaf people who are out and about in a public place in which DMS has been installed, can sign up to receive ‘fire alarm sounding’ notification on their mobile phone.
Text is a global success story, so it is not surprising that innovative applications are being built on top of the SMS technology.
Why was DMS developed?
One in seven people in the UK suffer some degree of deafness
Deaf people have concerns that they could remain unaware of an emergency situation in a public place
There are 76,168,000 mobile phone subscriptions in the UK (SMS mobile phone stats for 2008/2009
ProcessFlows developed TMS to be a powerful and adaptable tool – making it the ideal SMS platform on which to build wireless applications
Claire Chilton, an assessor for Level One British Sign Language exams and a TV presenter on deaf issues is profoundly deaf. Claire said -DMS is such a brilliant idea. Using text messaging to let you know a fire alarm is sounding is using something deaf people use all the time.”
How DMS works:
Stage 1 – Signing up
User visits location where the DMS system is installed – which could be your local supermarket
User sends a text with the location code to the DMS number
The DMS server receives the text and adds the user to the location given
The user is sent a text by the DMS server to let them know they are connected to DMS for that location
Stage 2 – When the fire alarm sounds
When the fire alarm sounds (unless it’s a test) DMS will send a text to the server
Users connected to the specific location receive a ‘Fire’ text advising them to evacuate
The main benefit for users:
DMS gives deaf and hard of hearing people the reassurance that they will be as aware of an audio warning of an emergency situation as the rest of us.
The main benefit for Public and Service Providers:
DMS helps service providers and employers comply with the Disability Discrimination Act (DDA). It is designed to respond to a fire alarm installed in conformity with the British Standard 5839 Part 1.
Editor’s Notes
ProcessFlows’ SMS technology is also enabling a patient appointment reminder system – SMS Patient Notification – a solution designed and developed to help cut the cost of missed appointments to the NHS.
Further information about DMS can be found at www.deafmessageservice.com
Further information about ProcessFlows at www.processflows.co.uk
Procurement specialist xynergie has called for Government savings announced in the Spending Review [Oct 20th 2010] to be achieved through improving procurement efficiencies, rather than by cutting frontline services.
xynergie chief executive Tony Lockwood said: -Government procurement inefficiencies were highlighted in Philip Green’s Efficiency Review. While the chancellor has said it will make savings by improving efficiency as well as making cuts, we are yet to see how they will achieve this. Technologies and methodologies are available and in-use in the private sector that completely rule out the levels of inefficiency shown in the Philip Green report.
-In the way it handles procurement, the Government needs to get up to speed with the private sector. It must re-engineer its procurement processes and make savings with backroom efficiency, not frontline cuts.”
For further information, go to
www.xynergie.co.uk
The emerging agreements as part of the spending review set out a clear financial expectation (required quantum and phasing of spending reduction). The challenge is to commute the expectation into practice without an unnecessary degradation in ‘front-line services’. Third Horizon experience confirms the following will be necessary:
An operational blueprint
Sponsorship from the top
An operational blueprint
The blueprint translates a financial requirement into an operational reality. Let’s take the MOD as an example. Total UK expenditure equates to 2.6% of GDP today and it is mandated that it will fall (by ~10% – according to press reports) to ~2.3% as a result of the spending review (which compares, for example to 1.8% in Australia and 1.3% in Canada). We have been spending at a relatively high level and the reduction will bring that spend more in line with our peers. But we have intractable problems within the MOD which need to be resolved as part and parcel of this spending reduction. We spend a disproportionate amount on bureaucracy and inter-service rivalry (e.g. as Liam Fox said “There is one civilian for every two armed forces personnel in the Ministry of Defence. In other words the total of civilians in the MoD is larger than the Royal Navy and the RAF combined”). This is unacceptable and must change. Defence expenditure should be primarily about achieving a security outcome rather than maintaining tradition or as a tool of industrial policy where certain businesses are propped up. The operational reality must, in the vernacular, make sure we cut the fat rather than the muscle.
Sponsorship from the top
No-one can doubt the political will to reduce government expenditure. But this does not mean the desired savings will be realised. Political will needs to be commuted to departmental intent. Sir Philip Green suggests there is scope to improve procurement across Government and he is surely right not least because other high-level reviews have come to similar conclusions. But the sceptics and cynics cry ‘why should anything happen this time’? Nothing short of a root and branch culture change will suffice and this will entail inter alia:
1. Focusing on non-negotiable outputs (rather than on inputs and processes)
2. Embedding business case thinking into all investment and change programmes (identifying the NPV taking account of risk and possible delay)
3. Removing barriers to change (whether they be people-, process- or protocol-related)
4. Effective communication (ensuring the message is heard, understood and reinforced through, for example, the reward mechanism)
Our track record
Third Horizon is currently working with a number of Australian federal and state government departments including:
The Department of Defence – a workforce and shared service review
NSW State Health Department – efficiency review and governance restructure implementation
‘Service Delivery Reform’ – a back office IT-enabled integration project across three Australian government departments (Department for Human Services, Centrelink and Medicare)
The NSW Department of Premier and Cabinet – shared services design across 13 super agencies
Department of Services, Technology and Administration – a major efficiency programme.
The overall themes of our work are:
Creation of super agencies (to deliver economies of scale and scope)
Integrating agencies at the point of delivery (to both reduce cost and improve customer experience)
Unlocking benefits from shared services (to deliver economies of scale and scope as well as improved capacity utilisation)
Better IT-enabled processes (effectively harnessing IT in both the front- and back-office).
With over 22,000 students, 800 teaching staff and 800 visiting lecturers, the University of Westminster prides itself on the ability to offer the best resources to facilitate learning. Undergraduates make up 75 per cent of students and more than 5,000 are international students from over 150 countries. Westminster is in the top 15 of most popular UK universities for international students and continuing to attract over-seas students is an important business driver for the organisation.
The University recognises the importance of technology in delivering services and facilities to attract new students. Since selecting systems integrator, Esteem Systems, to work on an ambitious IT infrastructure-transformation project, The University of Westminster has:
Powerful infrastructure running on just 18 servers (spread across two sites)
Minimised power consumption and carbon footprint
Reduced maintenance and support costs
Failover mechanisms and improved disaster recovery with two data centres
Improved performance and simplified IT management whilst minimising downtime
Secure, reliable and high availability system with dynamic resource scheduling and performance migration
The University of Westminster
With three campuses in central London and one in Harrow, the University of Westminster can offer all the academic, cultural and career opportunities expected from an international educational institution in one of the world’s most vibrant cities.
The University attracts over 22,000 undergraduates and postgraduates from 150 different nations, making it one of the most popular UK universities for international students. Westminster is the leading modern university in a number of research areas including art and design, electronic engineering and law. It has also achieved excellent QAA ratings for a wide range of courses, such as Arabic, building, communication and media, and politics.
Opening a new chapter
Today, the University of Westminster’s storage and data requirements are immense with an explosion of electronic learning and research resources such as databases, e-journals, webpages, exam papers and CD-ROMs.
Jesse Lewis, Principal Systems Development Officer (Microsoft) ISLS at the University of Westminster, explains, -Universities are more like commercial businesses than ever before and so we are in a very competitive environment. A solid technology foundation means we can continue to grow and adapt to our changing needs as an organisation.”
Before the implementation, processing power, data centre space, storage capacity and electricity consumption, were all key challenges for the University. It needed to scale its system support to meet the increasing demand for electronic and online resources, without putting any additional strain on core business applications, such as student records, HR and library resources.
-Not only did we need redundancy to meet our additional needs, we required a server infrastructure that would allow us to carry out regular maintenance without disrupting day to day needs. Our staff and students need to be able to focus on their work without worry about a frustratingly slow system or worse, lost information and data,” adds Jesse Lewis.
-We were very aware of green computing targets and how virtualisation would help us to meet these. By allowing us to reduce the physical amount of servers required, we would be able to reduce power consumption and minimise cooling equipment. It would also give us the opportunity for up-scaling in the future,” says Jesse Lewis.
The right answer
The University put out a tender to find the best virtual technology available to meets its needs and, following stiff competition Esteem was awarded the contract. -Whilst all the competitors offered a VMware solution, Esteem stood out because of its heritage in the education sector and obvious understanding of how to meet our needs,” comments Lewis.
Esteem Systems has more than 20 years experience of working with organisations to improve their performance by aligning business objectives with the delivery of tailored IT services. In this time it has designed, implemented and managed IT solutions for both public and private sector companies and has proven ROI.
The prep work
Esteem was selected to work closely with the University’s IT team to mentor them on how to operate all aspects of the new infrastructure, enabling them to complete the project. Esteem invested time into bringing the University’s IT team up to speed on how to manage the new server estate, improve availability and IT processes, meaning University staff can now manage the new IT infrastructure without the need for additional support from Esteem.
Jesse Lewis explains, -We knew virtualisation would allow us to refresh hardware more easily because we’d tested it in a development environment and were sure of the benefits. Esteem was chosen for its expertise and ability to help replicate this success for real”.
Seeing results
Working together, Esteem guided the University of Westminster staff through the process of building the new infrastructure using VMware virtualisation technology before migrating existing and additional virtual services over. Spread across two remote data centres (one in West London and one in Harrow), 18 servers are now supported using DataCore SanMelody to provide replication services in the event of disruption to one site.
Jesse Lewis continues, -Upgrading our IT performance through virtualisation has guaranteed us a significant return on server investment and a lower total cost of ownership. Every machine on the University network has already seen a performance increase in speed, which has been recognised by staff and students alike.”
Now, the University of Westminster is able to refresh its core business applications as necessary with greatly reduced downtime for staff and students. As demand changes the University can modify and allocate resources quicker than before. Before the new infrastructure was built it would take the IT team several days to buy new hardware and configure it, now the IT team simply have to manage a simple reboot and add memory to accommodate additional demands to the system.
The University can dedicate fixed resources to a chosen server when required and tailor a server’s processes through performance migration that is built into the system. Policies set within the software best utilise server capacity, for example, to schedule maintenance or updates when demand is light.
High availability of the new IT infrastructure means that in the event of physical server malfunction, all virtual servers automatically move to another physical server to prevent loss of data and downtime. The solution also provides the ability to drag and drop a running virtual server with no downtime from one host to another, which means that computer users can work without the knowledge that IT maintenance is taking place.
The northern launch of publicsectorknowhow.co.uk took place at the city of Manchester stadium in October.
The business, ambitiously described as, -the best thing to happen to the public sector this year, marks a new era of co-operation and collaboration which will help safeguard the future of public services by encouraging them to change practices and performance, and by connecting skills, experience and contacts.
Publicsectorknowhow is the innovative creation of co owners Sharon Richardson and Gill Gourley, themselves experts within the public sector in the areas of communication and programme management and procurement and transformation.
Richardson says -With experience across both the public and private sector in the last decade I can see where the two differ, but also where there is great potential for them to learn from each other. Sharon says -The current climate is difficult but not insurmountable, and it will take some radical thinking to make changes within public services and how they are procured and delivered in order to meet budgetary targets and preserve their longer term future.
Gill Gourley, added -There are a number of similar websites, associations and resources that deliver some of the information we present to some of the public sector arenas, but nowhere is there a true one stop shop that can really share experience and ideas that will truly cross fertilise across disciplines and services.
-We also have a unique procurement compare element of the site which also allows procurers to rate suppliers and services therefore sharing real knowledge. This will become an increasingly useful tool as tendering and commissioning, as we know it, changes, becoming more open and flexible.
Publicsectorknowhow is exclusive to public sector organisation and free to members via a quick sign up form. There is a forum for topical discussion and a shop provides access to free and cost effective resources and solutions including a virtual consultant. The website and forums will be supported by a new style of event that focuses on real problem solving rather than the traditional speaker workshop options.
-Our next event, not surprisingly will focus on the Comprehensive Spending Review – Analysis and Answers, but we will challenge the traditional thinking and look for some real ways forward, says Richardson.
Publicsectorknowhow is a national resource and there will be further regional launches in the South of England and Scotland in the new year.
For more information about the organisation or to find out when the next event is, contact info@publicectorknowhow.co.uk telephone 0845 838 1536 or check out the newly launched website at
www.publicsectorknowhow.co.uk
London, 18 Oct 2010 – Britain has published it’s National Security Strategy (NSS) which aims to inform thinking and drive policy over coming years.
The document categorises threats faced by the nation in tiers highlighting the level of severity, outlines actions to be taken to mitigate such threats and formed the background to the Strategic Defence Review (SDR).
High in rhetoric but offering little insight in terms of how its goals will be fulfilled against a backdrop of swinging cuts in both the Defence and Home Office budgets, the document does offer an interesting glimpse at what the present government considers are the priority concerns.
First tier threats are identified as acts of international terrorism, hostile attacks on the computer systems which nowadays underpin our critical national infrastructure, a major accident or natural hazard such as a flu pandemic, or an international military crisis between states that draws in this country and its allies.
Many of the issues highlighted in the NSS have been the subject of much debate at Counter Terror Expo in recent years and will almost certainly set direction for debate when the event is held again in April.
-Cyber Security & Electronic Terrorism- has long been considered a strategic threat to national assets.
Assumed state sponsored but carefully focused attacks against computer networks in Latvia and Iran in recent times, have illustrated clearly the impact that can be wrought on largely unprotected computer networks.
-Cyber Security & Electronic Terrorism- assumes a dedicated conference at the forthcoming Counter Terror Expo.
It is important to recognise that additional funding for so called cyber terrorism (which amounts to £500 million) is focused primarily at protecting government and military networks.
Around 80 percent of the national critical infrastructure is in private hands and these private entities are expected to fund security across the board from their own resources.
The -Cyber Security & Electronic Terrorism- conference stream is a timely response to the threat faced.
Counter Terror Expo is the only event of its kind to bring the public and private sectors together annually to debate the challenges faced and develop responses to them.
Publication of the National Security Strategy (NSS) comes hard on the heels of a report issued last week by the influential cross-party Public Administration Committee, which spoke of a chronic lack of strategic thinking in foreign and security policy threatening national interests.
Its report also warned that Britain’s ability to think strategically had been undermined by assumptions that its national interests are best served by its relationship with the United States of America and economic links within the European Union.
“Uncritical acceptance of these assumptions has led to a waning of our interests in, and ability to make, national strategy,” said the Committee.
-It is apparent that others aspects of national security highlighted in the document will not receive a similar funding boost since, as the country tightens its belt, the emphasis from government is on doing more with much less.
Maintenance of the national defences demands great ingenuity in the years to come on the part of those tasked with its delivery.
About Counter Terror Expo
Counter Terror Expo is the only event of its kind to bring the key experts from government, the military, law enforcement and the private sector together annually to discuss the issues, formulate strategy and direct policy making.
Counter Terror Expo comprises a series of high level conferences, an extensive programme of workshops and a world beating exhibition of leading solutions to the threats faced.
The next Counter Terror Expo will be held at the prestigious Grand Hall of London Olympia from 19- 20 April 2011.
More Information
Please contact Nicola Greenaway-Fuller on +44 (0) 208 542 9090.
It’s been just two months since the country’s police officers were told by their bosses to stop harassing press photographers.
Now we have AMBULANCE crews trying it instead.
Editor Stuart Littleford was out filming with cameraman Paul Bridgeman in Manchester city centre on Saturday night and took shots of a man being put into an ambulance.
Stuart, editor of the Government and Public Sector Journal, explains: ‘The paramedics sent the police over to question us and stop us filming claiming it was against the Data Protection act to film a patient!’
Earlier this year, Stuart made an official complaint to Greater Manchester Police after allegedly being assaulted by an officer while he was covering a an incident where a building collapsed.
‘So we are now getting it from the ambulance service not just the police!’ he says.
In fact the ambulance service were completely wrong when they challenged Stuart on Saturday.
I’d love to know quite why they thought filming someone in a public place could breach the DPA!
It’s another example where everybody from teachers to hospital staff wave the DPA like a magic wand any time they see a journalist or a photographer. It’s a piece of legislation that could aptly be re-named the Jobsworth Act.
It was established in 2009 that taking a photo of someone in the street was lawful.
At the Court of Appeal, Lord Justice Laws said: -Individuals do not have the right to prevent another person politely taking their photograph in public.
“The snapping of the shutter of itself breaches no rights.
Mr Laws explained that taking a photo could only be an invasion of privacy if it involved hot pursuit, face-to-face confrontation, pushing, shoving, bright lights or barging into someone’s home.
In Saturday’s incident, Stuart says he was filming unobtrusively from the other side of the street.
Perhaps the ambulance crew misunderstood a Press Complaints Commission ruling in 2008, when a local paper was censured for publishing a photo of someone receiving medical treatment after an accident.
The PCC said then: ‘There is a clear need for newspapers to exercise caution when publishing images that relate to a person’s health and medical treatment, even if they are taken in public places.’ Note – PUBLISHING images, not taking them.
The ambulance crew in question would do better to concentrate on treating the sick and injured, rather than waste time mis-applying the finer points of the law?
A statement from North West Ambulance Service NHS Trust said: -North West Ambulance Service NHS Trust aims to ensure that its staff have an understanding of how the media works. Many of the Trust’s operational staff work with film crews and journalists across the North West on specific projects and during incidents. Where possible, staff are asked to be tolerant of media filming in the public domain if there is no perceived detrimental effect to patient care. –
Sounds like they are doing us a favour by letting us film, said Stuart.
This article is by Cleland Thom and appears on his popular blog
www.ctjt-blog.biz
18th October 2010 – Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver in a Cumbria hotel room.
And, says Credant Technologies, the endpoint data security specialist, it seems that the USB stick contained details of the nuclear firm’s proposed workforce transfer from its Capenhurst operation in Cheshire to uranium specialist Urenco.one.
“This fact alone is manna from heaven to enemies of the UK, especially since the data on the USB stick suggested that International Atomic Energy technicians visiting the site were not sufficiently up to speed,” said Sean Glynn, Credant’s vice president and chief marketing officer.
-While the convenience of USB sticks make them an important tool for any business, you don’t have to be a nuclear scientist to know that the data carried on these devices must be protected,”he added.
Corporate USB sticks, says Glynn, should always include encryption and other forms of security as a basic requirement because – as this incident clearly shows – unencrypted data can, and does, fall into the wrong hands.
And in the case of Sellafield – the former Windscale nuclear material processing and handling site – he added that the data on the USB stick falls firmly into the kind of information which has national security implications, especially with the UK currently being on heightened terrorist alert (bit.ly/aMhIQI).
The discovery of this data on a USB stick in a hotel room, says the Credant vice president, is the kind of plot that would do justice to a John Le Carre thriller novel, rather than real-life hotel in deepest Cumbria.
“But here we have a coach driver making a discovery that has serious national security overtones. That technicians and other employees at Sellafield are using USB sticks to store and move sensitive data is not really a surprise in today’s world, but that there are not policies and procedures in place to encrypt or otherwise protect the data on those devices is a real concern,” he said.
“As the coach driver is quoted as saying in the local press, what if the USB stick had fallen into the hands of terrorists, or contained top secret information?” he added.
“Sellafield has done the right thing in launching an investigation, but this is a potentially serious breach of data security on several levels, with national security overtones. Sellafield needs to look very carefully at its data security policies, and the technology that enforces those policies.”
Take great care when issuing a comment, or making a statement, if legal proceedings are involved. You could interfere with the course of justice, or prejudice a trial.
COCA bans you from publishing anything, before or during a trial, that could create a SUBSTANTIAL RISK of SERIOUS PREJUDICE to the trial.
And if you breach the law, you could be:
1. Given a telling off by a Judge.
2. Prosecuted and fined.
Contempt law is NOT in force all the time.
1. Proceedings have to be ACTIVE.
2. They primarily activate:
When someone is arrested or charged.
3. They de-activate:
When sentence has been passed.
It’s your job to find out if proceedings are active, and when the trial is. Phone the court, the CPS or the defence solicitor to find out.
Things that raise the risk level
1. The type of trial – crown court trials pose the biggest contempt risk.
2. When the trial is.
3. How memorable the crime is.
So …
You’re usually safe publishing many things if the trial is a long way off – ie, more than 6 months away. The closer the trial is, the more danger there is from contempt of court.
How does this affect you?
Once someone has been charged, you should only reveal their:
Name.
Age.
Address.
Job title.
Where they work.
What they have been charged with.
How long they have worked for you.
Action taken by the company (eg, the person has been suspended on full pay).
A safe comment: ‘Mr Smith remains suspended on full pay until after the trial. We cannot comment further for legal reasons. We will make a decision on his future after the trial.’
Do not use:
The defendant’s previous convictions or acquittals.
The defendant’s photograph or detailed description.
Any quotes or background material that asserts guilt, or innocence.
Any statement that the person charged is the person who committed the crime.
A useful exception:
You can write about the ISSUES arising from active court cases …
For example:
Bastows repeated their warning today of the danger of breaking into electricity sub-stations.
The reminder came as a man faced trial at Manchester Crown Court, charged with damaging a sub-station last year.
Bastows spokesman Melanie Bright said: ‘People who fool around at electricity sub-stations are not just risking prosecution. They are also risking their lives.’
This extract is taken from the PR Media Law Guide, price £19.95. To order a copy, contact: cleland@ctjt.biz
Cleland Thom does media law training and consultancy to a number of corporation and public authorities, including GPSJ, United Utilities, World Trade Group, Herts County Council, London Borough of Brent and Three Rivers District Council.
7th December 2010, The Barbican, London
How will the Police Reform and Social Responsibility Bill affect you?
With the impending budget cuts, how can you ensure quality of service remains?
If you would like to know the answer to these questions and many more, then Modernising Policing is for you!
A radical redesign of workforce strategy is required in this era of austerity. The management of personnel, information and outcomes is integral to providing a quality police service that is more transparent, accountable and accessible, and can help to reconnect the police with the public, whilst ensuring that value for money and safer communities are achievable. The challenge will be how to reorganise, collaborate more effectively and prioritise the core services that police can provide.
The Police Reform and Social Responsibility Bill will offer new opportunities for individuals, communities and police officers at all levels to shape the future of our policing. The emphasis has now shifted away from quantity-driven goals towards improving the quality of service and allowing people to challenge police performance.
At our fourth annual Modernising Policing Conference, we will discuss how to manage workforce change, implement lean strategies, build community trust, empower the public and showcase the latest innovative solution providers. This conference will give you the opportunity to debate strategic policy and learn how to deliver policing for the people with fewer resources.
Read More
Speakers Include:
Chaired by Simon Reed – Vice-Chairman, Police Federation of England and Wales
Jan Berry – Independent Reducing Bureaucracy Advocate
Detective Superintendent Gary Linton – Head of ACPO Criminal Records Office (ACRO)
Jane Furniss – Chief Executive Officer, The Independent Police Complaints Commission
|
NEED AN UP TO DATE DATABASE?
|
Recent Comments