Search results

Filter by

Remove filters

370 results found

FSA Subject Access Requests

This dataset is an abridged version of the Information Management and Security Team Subject Access Requests Log. The log is used to record, track and report on the Subject Access Requests made to...

Information Management Awareness Raising Log

This log records the internal awareness raising activities carried out by the Information Management and Security team at the FSA. The data includes a brief description of the awareness raising...

Personal Wealth

This publication contains information about Identified Personal Wealth in the UK, i.e. wealth based on the assets (including land and buildings, cash, bank and building society accounts and...

Population in custody, England and Wales

Presents data on the population in custody with summary figures on the population in prison establishments, police cells, secure children's homes and secure training centres. Source agency:...

OS Places API

Find UK addresses instantly online and be confident you're getting the most up-to-date information with our address API.  Perform accurate geocoding and reverse geocoding with our secure,...

Youth custody data

Monthly statistics on the population in custody of children and young people within secure children's homes, secure training centres (STCs) and young offender institutions (YOIs). This includes...

Food security in London: Headline findings from The Survey of Londoners 2018-19

The Mayor of London committed to measuring food security in London in his Food Strategy. The Survey of Londoners collected this data, which will be used to support the development of long-term...

UKTI senior officials travel

This report shows international travel by UK Trade and Investment (UKTI) senior officials at SCS2 (or equivalent) and above. The report includes bookings made through the department’s central...

eAsset

Database used by the Youth Justice Board placement service to record custodial orders (e.g. hearing date, Court name, custodial Order type) and placement results.It is used to record sentence...

CIO-DSAS STRAP Incident Database

Details of all STRAP security incidents (STRAP Team, serial 5, of CIO-DSAS Information Asset Register)

Review of posts with access to sensitive material

A list of all staff with the need for security / developed vetting (DV) clearance. Sensitive information, very important to BIS but no monetary value

Databases holding Defence Imagery and Video.

Defence Imagery Database is used by members of the Ministry of Defence. The Defence News Imagery is used by members of the national press via a secure log on.

Independent Monitoring Board Appointments Files

HR type information relating to appointment of IMB Members, eg Application forms, interview panel forms, security forms, Ministerial Submissions

NIW SECURITY OF SUPPLY INDEX CRITICAL PERIOD 2019 2020

NI Water Annual Information Return 2019 2020 Table 10A Non Financial Measures Security of Supply Index Critical Period (total)

Transec Information Management System (TIMS) - 1

Contact database. Names, addresses, telephone number and e-mail of up 10,000 transport industry security contacts. Information is stored on the TIMS system.

National Archives - financial spend and income compared with last year

The National Archives is the UK government's official archive. We are guardians of some of the most iconic national documents dating back over 1,000 years. We give detailed guidance to government...

Fraud and Error in the Benefit System

An estimate of the levels of fraud and error in the social security benefits system in Great Britain. Source agency: Work and Pensions Designation: National Statistics Language:...

Debt Management

This data is extracted from the Department's Debt Manager System, the IT solution used to record, calculate, decide recoverability and recover overpayments of DWP and other Social Security...

Data Sharing Register

This dataset is an abridged version of the Information Management and Security Team log of Data Sharing Agreements. The log is used to record, track and report on the various data sharing...

Hate crime, cyber security and the experience of crime among children: Findings from the 2010/11 British Crime Survey Supplementary Volume 3 to Crime in England and Wales 2010/11

This supplementary volume explores topics from the 2010/11 British Crime Survey and provides analysis of the extent of and perceptions towards hate crime, use of the internet and cyber security and...