Investigations may lack data during three-month process to restore 200,000 police records

Written by Sam Trendall on 15 February 2021 in News
News

Minister reveals former Met commissioner will lead review into incident

Credit: Karl-Josef Hildenbrand/DPA/Press Association Images

A minister has claimed that it may take up to three months to recover more than 200,000 records that were last month accidentally deleted from the Police National Computer database, and that investigations may be hampered in the meantime.

In a written statement to parliament last week, crime and policing minister Kit Malthouse said that efforts to restore the lost information are “now well underway and technicians are confident that all the data which has been deleted can be restored”.

But he added that this process may not be completed until well into the spring. Until then, police and other agencies may find themselves deprived of information pertinent to investigations.

“Work to recover that data is moving forward as quickly as is possible, but it is vital that the data is restored safely to protect the integrity of the data,” Malthouse said. “Our current assessment suggests that the work will take approximately 12 more weeks to complete, though clearly, we will accelerate this if we possibly can.”

He added: “While the data is incomplete, there is the possibility that law enforcement partners will not have access to records and information that could help progress their inquiries and investigations.”


Related content


The police minister clarified that data concerning 209,550 offences and 112,697 people had been deleted, with records on 15,089 people entirely wiped – including 195 sets of fingerprints. All the data relates to offences that did not result in a conviction, Malthouse said, and 99.5% of records were more than 10 years old.

The data loss will be subject to an external review led by Lord Bernard Hogan Howe, a crossbench peer and former police officer, who finished his career with a six-year stint as commissioner of London’s Metropolitan Police. 

The aim of this exercise – which will conclude by the middle of next month – is to “ensure the necessary lessons are learned to avoid similar incidents in the future”, Malthouse said.

Response plan
The Home Office is now into the third part of a four-phase incident-response plan. The first two stages saw the department compile a complete list of the files that had been erased and the extent to which individual forces had been impacted.

The third phase is dedicated to data recovery, while the final part of the response plan will see the Home Office take steps to make sure it is deleting the data that it intended to delete as part of the administrative process during which the records were wrongly wiped.

While these phases are completed, a backup of DNA data has been created at a “temporary, secure location”.

“We have made this data accessible to forces and national agencies this week and set up a business process has been created to enable matching in support of ongoing investigations,” Malthouse said. “During this period all audit and legislative requirements will be met.”

Forces can also mitigate the impact of the missing records by making use of various other resources, according to the minister. These include the Police National Database.

“This is a national intelligence database that holds records of arrests of individuals and contains information that will allow law enforcement partners to judge whether there is biometric information or other key evidence missing from the affected systems,” he said. “If missing data records are identified, then the investigating officers can request copies of biometric samples and arrest records from the owning organisations.”

Other national databases, such as the violent offender and sex offender register, can also be used, as can local systems, which Malthouse said are “frequently used as the primary system into which information is entered, before it is then integrated into PNC for national use”.

Local forces may also have retained a hard copy of fingerprints that can be requested by other agencies. 

In some instances, they may simply be able to rearrest someone to obtain more DNA, according to the minister.

“If the police have enough evidence and they believe that the DNA of a suspect is required but cannot find any records on the PNC or other systems, they can arrest suspects and collect their DNA in line with their powers,” Malthouse said.

 

About the author

Sam Trendall is editor of PublicTechnology

Share this page

Tags

Categories

CONTRIBUTIONS FROM READERS

Please login to post a comment or register for a free account.

Related Articles

ICO set to issue fewer public sector fines to avoid ‘data breach victims being punished twice’
1 July 2022

Penalties for public bodies often impact services – rather than shareholders – according to commissioner John Edwards

Fraud challenges see HMRC and DWP named among ‘departments of concern’
27 May 2022

Public spending watchdog points to issues with controls on fraud and error

GDS adds gender non-binary options to employee records
5 July 2022

Digital agency claims that gathering more data will help ensure greater diversity in hiring new recruits and career progression of existing staff

Government seeks data and analysis leader for post-Brexit trade unit
5 July 2022

Cabinet Office-based team offers potential six-figure salary for cross-government role