Investigations may lack data during three-month process to restore 200,000 police records

Written by Sam Trendall on 15 February 2021 in News
News

Minister reveals former Met commissioner will lead review into incident

Credit: Karl-Josef Hildenbrand/DPA/Press Association Images

A minister has claimed that it may take up to three months to recover more than 200,000 records that were last month accidentally deleted from the Police National Computer database, and that investigations may be hampered in the meantime.

In a written statement to parliament last week, crime and policing minister Kit Malthouse said that efforts to restore the lost information are “now well underway and technicians are confident that all the data which has been deleted can be restored”.

But he added that this process may not be completed until well into the spring. Until then, police and other agencies may find themselves deprived of information pertinent to investigations.

“Work to recover that data is moving forward as quickly as is possible, but it is vital that the data is restored safely to protect the integrity of the data,” Malthouse said. “Our current assessment suggests that the work will take approximately 12 more weeks to complete, though clearly, we will accelerate this if we possibly can.”

He added: “While the data is incomplete, there is the possibility that law enforcement partners will not have access to records and information that could help progress their inquiries and investigations.”


Related content


The police minister clarified that data concerning 209,550 offences and 112,697 people had been deleted, with records on 15,089 people entirely wiped – including 195 sets of fingerprints. All the data relates to offences that did not result in a conviction, Malthouse said, and 99.5% of records were more than 10 years old.

The data loss will be subject to an external review led by Lord Bernard Hogan Howe, a crossbench peer and former police officer, who finished his career with a six-year stint as commissioner of London’s Metropolitan Police. 

The aim of this exercise – which will conclude by the middle of next month – is to “ensure the necessary lessons are learned to avoid similar incidents in the future”, Malthouse said.

Response plan
The Home Office is now into the third part of a four-phase incident-response plan. The first two stages saw the department compile a complete list of the files that had been erased and the extent to which individual forces had been impacted.

The third phase is dedicated to data recovery, while the final part of the response plan will see the Home Office take steps to make sure it is deleting the data that it intended to delete as part of the administrative process during which the records were wrongly wiped.

While these phases are completed, a backup of DNA data has been created at a “temporary, secure location”.

“We have made this data accessible to forces and national agencies this week and set up a business process has been created to enable matching in support of ongoing investigations,” Malthouse said. “During this period all audit and legislative requirements will be met.”

Forces can also mitigate the impact of the missing records by making use of various other resources, according to the minister. These include the Police National Database.

“This is a national intelligence database that holds records of arrests of individuals and contains information that will allow law enforcement partners to judge whether there is biometric information or other key evidence missing from the affected systems,” he said. “If missing data records are identified, then the investigating officers can request copies of biometric samples and arrest records from the owning organisations.”

Other national databases, such as the violent offender and sex offender register, can also be used, as can local systems, which Malthouse said are “frequently used as the primary system into which information is entered, before it is then integrated into PNC for national use”.

Local forces may also have retained a hard copy of fingerprints that can be requested by other agencies. 

In some instances, they may simply be able to rearrest someone to obtain more DNA, according to the minister.

“If the police have enough evidence and they believe that the DNA of a suspect is required but cannot find any records on the PNC or other systems, they can arrest suspects and collect their DNA in line with their powers,” Malthouse said.

 

About the author

Sam Trendall is editor of PublicTechnology

Share this page

Tags

Categories

CONTRIBUTIONS FROM READERS

Please login to post a comment or register for a free account.

Related Articles

‘Huge problems’ – MPs raise concerns over Home Office work on £1bn police IT project
10 December 2021

Committee publishes damning report on scheme it claims is five years behind schedule and hundreds of millions of pounds over budget

Consumer regulator seeks £100k leader for algorithm work
19 January 2022

CMA created team last year to better understand and oversee the use of automated technologies in business

Cabinet Office head of news to oversee anti-misinformation unit
18 January 2022

Post as departmental media relations leader comes with salary of up to £118k

No.10 parties: ICO warns officials deleting messages is a criminal offence
17 January 2022

Data watchdog issues warning in light of reports that a digital clean-up had been encouraged