Investigations may lack data during three-month process to restore 200,000 police records

Written by Sam Trendall on 15 February 2021 in News
News

Minister reveals former Met commissioner will lead review into incident

Credit: Karl-Josef Hildenbrand/DPA/Press Association Images

A minister has claimed that it may take up to three months to recover more than 200,000 records that were last month accidentally deleted from the Police National Computer database, and that investigations may be hampered in the meantime.

In a written statement to parliament last week, crime and policing minister Kit Malthouse said that efforts to restore the lost information are “now well underway and technicians are confident that all the data which has been deleted can be restored”.

But he added that this process may not be completed until well into the spring. Until then, police and other agencies may find themselves deprived of information pertinent to investigations.

“Work to recover that data is moving forward as quickly as is possible, but it is vital that the data is restored safely to protect the integrity of the data,” Malthouse said. “Our current assessment suggests that the work will take approximately 12 more weeks to complete, though clearly, we will accelerate this if we possibly can.”

He added: “While the data is incomplete, there is the possibility that law enforcement partners will not have access to records and information that could help progress their inquiries and investigations.”


Related content


The police minister clarified that data concerning 209,550 offences and 112,697 people had been deleted, with records on 15,089 people entirely wiped – including 195 sets of fingerprints. All the data relates to offences that did not result in a conviction, Malthouse said, and 99.5% of records were more than 10 years old.

The data loss will be subject to an external review led by Lord Bernard Hogan Howe, a crossbench peer and former police officer, who finished his career with a six-year stint as commissioner of London’s Metropolitan Police. 

The aim of this exercise – which will conclude by the middle of next month – is to “ensure the necessary lessons are learned to avoid similar incidents in the future”, Malthouse said.

Response plan
The Home Office is now into the third part of a four-phase incident-response plan. The first two stages saw the department compile a complete list of the files that had been erased and the extent to which individual forces had been impacted.

The third phase is dedicated to data recovery, while the final part of the response plan will see the Home Office take steps to make sure it is deleting the data that it intended to delete as part of the administrative process during which the records were wrongly wiped.

While these phases are completed, a backup of DNA data has been created at a “temporary, secure location”.

“We have made this data accessible to forces and national agencies this week and set up a business process has been created to enable matching in support of ongoing investigations,” Malthouse said. “During this period all audit and legislative requirements will be met.”

Forces can also mitigate the impact of the missing records by making use of various other resources, according to the minister. These include the Police National Database.

“This is a national intelligence database that holds records of arrests of individuals and contains information that will allow law enforcement partners to judge whether there is biometric information or other key evidence missing from the affected systems,” he said. “If missing data records are identified, then the investigating officers can request copies of biometric samples and arrest records from the owning organisations.”

Other national databases, such as the violent offender and sex offender register, can also be used, as can local systems, which Malthouse said are “frequently used as the primary system into which information is entered, before it is then integrated into PNC for national use”.

Local forces may also have retained a hard copy of fingerprints that can be requested by other agencies. 

In some instances, they may simply be able to rearrest someone to obtain more DNA, according to the minister.

“If the police have enough evidence and they believe that the DNA of a suspect is required but cannot find any records on the PNC or other systems, they can arrest suspects and collect their DNA in line with their powers,” Malthouse said.

 

About the author

Sam Trendall is editor of PublicTechnology

Share this page

Tags

Categories

CONTRIBUTIONS FROM READERS

Please login to post a comment or register for a free account.

Related Articles

Related Sponsored Articles

Avoid Infrastructure Paralysis: Six benefits of moving legacy Oracle workloads to the cloud
6 April 2021

There are many reasons to keep your Oracle workloads running on local servers. But there are even more reasons to move them to the cloud as part of a wider digital transition strategy. Six Degrees...

Tackling vaccination misinformation with local government communications
9 March 2021

As misinformation about the coronavirus vaccine spreads, Granicus outlines key considerations for local government when delivering a successful vaccine communications campaign 

Optimising the Benefits of Hybrid IT
7 April 2021

SolarWinds explains how public sector organisations can make the most of their hybrid IT investments - delivering services that are both innovative and reliable 

Human Centric Process Management: The common base for digital transformation, cost savings, compliance and agility
11 March 2021

Engage Process explains how to ensure that process remains at the heart of your management programs - and how to keep undue pressure from those processes