ContactPoint was a government database that held information on all children under 18 in England. It was created in response to the abuse and death of eight-year-old Victoria Climbié in 2000 in England; in which it was found that various agencies involved in her care had failed to prevent her death. ContactPoint aimed to improve child protection by improving the way information about children was shared between services. It was designed by Capgemini and previously had the working titles of Information Sharing Index (or IS Index or ISI) and the Children's Index.
The database, created under the Children Act 2004, cost £224m to set up and £41m a year to run. It operated in 150 local authorities, and was accessible to at least 330,000 users. The database was heavily criticised by a wide range of groups, mainly for privacy, security and child protection reasons. On 12 May 2010 the new UK Coalition Government announced plans to scrap ContactPoint and on 6 August 2010 the database was shut down. From that date the Children Act 2004 Information Database (England) Regulations 2007, as amended in 2010, no longer applies.
The term information sharing has a long history in information technology. Traditional information sharing referred to one-to-one exchanges of data between a sender and receiver. These information exchanges are implemented via dozens of open and proprietary protocols, message and file formats. Electronic data interchange (EDI) is a successful implementation of commercial data exchanges that began in the late 1970s and remains in use today.
Initiatives to standardize information sharing protocols include extensible markup language (XML), simple object access protocol (SOAP), and web services description language (WSDL).
One example of United States government's attempt to implement one of these design patterns (one to one) is the National Information Exchange Model (NIEM). Unfortunately, one-to-one exchange models fall short of supporting all of the required design patterns needed to fully implement data exploitation technology.
Kenneth Crowther presents a list of why information sharing fails in cybersecurity that actually mirrors historical information sharing fails outside of cybersecurity. Of course, the flip side is if we avoid these causes of failure we have a better chance of successfully sharing and using important information.
published: 17 Oct 2022
Information Sharing in SES
published: 30 Sep 2020
Cybersecurity Information Sharing
This short video explains why sharing information between public power utilities is vital to improving the security of the grid. Watch this video to learn more about information sharing with the E-ISAC to ensure your utility is #CyberReady. We produced this video as part of our cooperative agreement with the U.S. Department of Energy to develop tools and resources to improve the cybersecurity of public power utilities. Learn more about improving your cybersecurity posture at http://www.PublicPower.org/gridsecurity
published: 04 Oct 2018
Information sharing animation
Sharing of information can support and assist families to
receive support when needed and enable collaboration
between services to help ensure the safety and wellbeing
of children.
published: 28 Oct 2018
Homeland Security Information Network - Real-Time Information Sharing
This video hones in on how HSIN is used for real-time information sharing to track, share, deconflict and report on information efficiently. An example is how HSIN was used to respond to a robo-call bomb threat at a local high school.
published: 27 Sep 2017
Child Protection - Information Sharing Programme: How it Works
This film shows NHS staff, social workers and the NSPCC, highlighting the need for better information sharing between the NHS and local authorities.
The film discusses the benefits that can be realised from having the new CP-IS system in place.
An animated scenario is featured to show how the technical IT system works in practice
published: 21 Mar 2014
Robert Hoopes on the Cybersecurity Information Sharing Act
VOX Global President Robert Hoopes Discusses the Cybersecurity Information Sharing Act (CISA) on Bloomberg.
published: 16 Mar 2015
Information sharing - MARAM Animation Series
This video introduces two information sharing schemes of Family Violence Information Sharing and Child Information Sharing and the benefits of the Schemes.
published: 25 Jan 2023
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
The Gramm-Leach-Bliley Act was enacted on November 12, 1999. In addition to reforming the financial services industry, the Act addressed concerns relating to consumer financial privacy. The Gramm-Leach-Bliley Act required the Federal Trade Commission (FTC) and other government agencies that regulate financial institutions to implement regulations to carry out the Act's financial privacy provisions (GLB Act). Th...
published: 31 Jul 2024
Information Sharing and Collaboration
Working Across Industry and with Government to Protect Against Threats
Banks and other financial institutions have a long history of working across the industry and with government partners to protect individual firms, the customers they serve and the U.S. economy against threats. These efforts have served as leading examples as other critical infrastructure sectors seek to replicate these efforts.
To learn more about how banks share cybersecurity threat information, please visit www.bpi.com/infosharecollab
Kenneth Crowther presents a list of why information sharing fails in cybersecurity that actually mirrors historical information sharing fails outside of cyberse...
Kenneth Crowther presents a list of why information sharing fails in cybersecurity that actually mirrors historical information sharing fails outside of cybersecurity. Of course, the flip side is if we avoid these causes of failure we have a better chance of successfully sharing and using important information.
Kenneth Crowther presents a list of why information sharing fails in cybersecurity that actually mirrors historical information sharing fails outside of cybersecurity. Of course, the flip side is if we avoid these causes of failure we have a better chance of successfully sharing and using important information.
This short video explains why sharing information between public power utilities is vital to improving the security of the grid. Watch this video to learn more ...
This short video explains why sharing information between public power utilities is vital to improving the security of the grid. Watch this video to learn more about information sharing with the E-ISAC to ensure your utility is #CyberReady. We produced this video as part of our cooperative agreement with the U.S. Department of Energy to develop tools and resources to improve the cybersecurity of public power utilities. Learn more about improving your cybersecurity posture at http://www.PublicPower.org/gridsecurity
This short video explains why sharing information between public power utilities is vital to improving the security of the grid. Watch this video to learn more about information sharing with the E-ISAC to ensure your utility is #CyberReady. We produced this video as part of our cooperative agreement with the U.S. Department of Energy to develop tools and resources to improve the cybersecurity of public power utilities. Learn more about improving your cybersecurity posture at http://www.PublicPower.org/gridsecurity
Sharing of information can support and assist families to
receive support when needed and enable collaboration
between services to help ensure the safety and we...
Sharing of information can support and assist families to
receive support when needed and enable collaboration
between services to help ensure the safety and wellbeing
of children.
Sharing of information can support and assist families to
receive support when needed and enable collaboration
between services to help ensure the safety and wellbeing
of children.
This video hones in on how HSIN is used for real-time information sharing to track, share, deconflict and report on information efficiently. An example is how H...
This video hones in on how HSIN is used for real-time information sharing to track, share, deconflict and report on information efficiently. An example is how HSIN was used to respond to a robo-call bomb threat at a local high school.
This video hones in on how HSIN is used for real-time information sharing to track, share, deconflict and report on information efficiently. An example is how HSIN was used to respond to a robo-call bomb threat at a local high school.
This film shows NHS staff, social workers and the NSPCC, highlighting the need for better information sharing between the NHS and local authorities.
The film d...
This film shows NHS staff, social workers and the NSPCC, highlighting the need for better information sharing between the NHS and local authorities.
The film discusses the benefits that can be realised from having the new CP-IS system in place.
An animated scenario is featured to show how the technical IT system works in practice
This film shows NHS staff, social workers and the NSPCC, highlighting the need for better information sharing between the NHS and local authorities.
The film discusses the benefits that can be realised from having the new CP-IS system in place.
An animated scenario is featured to show how the technical IT system works in practice
This video introduces two information sharing schemes of Family Violence Information Sharing and Child Information Sharing and the benefits of the Schemes.
This video introduces two information sharing schemes of Family Violence Information Sharing and Child Information Sharing and the benefits of the Schemes.
This video introduces two information sharing schemes of Family Violence Information Sharing and Child Information Sharing and the benefits of the Schemes.
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
The Gramm-Leach-Bliley Act requires financial institutions...
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
The Gramm-Leach-Bliley Act was enacted on November 12, 1999. In addition to reforming the financial services industry, the Act addressed concerns relating to consumer financial privacy. The Gramm-Leach-Bliley Act required the Federal Trade Commission (FTC) and other government agencies that regulate financial institutions to implement regulations to carry out the Act's financial privacy provisions (GLB Act). The regulations required all covered businesses to be in full compliance by July 1, 2001.
The FTC is responsible for enforcing its Privacy of Consumer Financial Information Rule (Privacy Rule). Anyone who uses this Guide should also review the Privacy Rule, found at 16 C.F.R. Part 313 (May 24, 2000).
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
The Gramm-Leach-Bliley Act was enacted on November 12, 1999. In addition to reforming the financial services industry, the Act addressed concerns relating to consumer financial privacy. The Gramm-Leach-Bliley Act required the Federal Trade Commission (FTC) and other government agencies that regulate financial institutions to implement regulations to carry out the Act's financial privacy provisions (GLB Act). The regulations required all covered businesses to be in full compliance by July 1, 2001.
The FTC is responsible for enforcing its Privacy of Consumer Financial Information Rule (Privacy Rule). Anyone who uses this Guide should also review the Privacy Rule, found at 16 C.F.R. Part 313 (May 24, 2000).
Working Across Industry and with Government to Protect Against Threats
Banks and other financial institutions have a long history of working across the industry...
Working Across Industry and with Government to Protect Against Threats
Banks and other financial institutions have a long history of working across the industry and with government partners to protect individual firms, the customers they serve and the U.S. economy against threats. These efforts have served as leading examples as other critical infrastructure sectors seek to replicate these efforts.
To learn more about how banks share cybersecurity threat information, please visit www.bpi.com/infosharecollab
Working Across Industry and with Government to Protect Against Threats
Banks and other financial institutions have a long history of working across the industry and with government partners to protect individual firms, the customers they serve and the U.S. economy against threats. These efforts have served as leading examples as other critical infrastructure sectors seek to replicate these efforts.
To learn more about how banks share cybersecurity threat information, please visit www.bpi.com/infosharecollab
Kenneth Crowther presents a list of why information sharing fails in cybersecurity that actually mirrors historical information sharing fails outside of cybersecurity. Of course, the flip side is if we avoid these causes of failure we have a better chance of successfully sharing and using important information.
This short video explains why sharing information between public power utilities is vital to improving the security of the grid. Watch this video to learn more about information sharing with the E-ISAC to ensure your utility is #CyberReady. We produced this video as part of our cooperative agreement with the U.S. Department of Energy to develop tools and resources to improve the cybersecurity of public power utilities. Learn more about improving your cybersecurity posture at http://www.PublicPower.org/gridsecurity
Sharing of information can support and assist families to
receive support when needed and enable collaboration
between services to help ensure the safety and wellbeing
of children.
This video hones in on how HSIN is used for real-time information sharing to track, share, deconflict and report on information efficiently. An example is how HSIN was used to respond to a robo-call bomb threat at a local high school.
This film shows NHS staff, social workers and the NSPCC, highlighting the need for better information sharing between the NHS and local authorities.
The film discusses the benefits that can be realised from having the new CP-IS system in place.
An animated scenario is featured to show how the technical IT system works in practice
This video introduces two information sharing schemes of Family Violence Information Sharing and Child Information Sharing and the benefits of the Schemes.
Gramm-Leach-Bliley Act Requires Financial Institutions Information-sharing Practices and Safeguard
The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
The Gramm-Leach-Bliley Act was enacted on November 12, 1999. In addition to reforming the financial services industry, the Act addressed concerns relating to consumer financial privacy. The Gramm-Leach-Bliley Act required the Federal Trade Commission (FTC) and other government agencies that regulate financial institutions to implement regulations to carry out the Act's financial privacy provisions (GLB Act). The regulations required all covered businesses to be in full compliance by July 1, 2001.
The FTC is responsible for enforcing its Privacy of Consumer Financial Information Rule (Privacy Rule). Anyone who uses this Guide should also review the Privacy Rule, found at 16 C.F.R. Part 313 (May 24, 2000).
Working Across Industry and with Government to Protect Against Threats
Banks and other financial institutions have a long history of working across the industry and with government partners to protect individual firms, the customers they serve and the U.S. economy against threats. These efforts have served as leading examples as other critical infrastructure sectors seek to replicate these efforts.
To learn more about how banks share cybersecurity threat information, please visit www.bpi.com/infosharecollab
ContactPoint was a government database that held information on all children under 18 in England. It was created in response to the abuse and death of eight-year-old Victoria Climbié in 2000 in England; in which it was found that various agencies involved in her care had failed to prevent her death. ContactPoint aimed to improve child protection by improving the way information about children was shared between services. It was designed by Capgemini and previously had the working titles of Information Sharing Index (or IS Index or ISI) and the Children's Index.
The database, created under the Children Act 2004, cost £224m to set up and £41m a year to run. It operated in 150 local authorities, and was accessible to at least 330,000 users. The database was heavily criticised by a wide range of groups, mainly for privacy, security and child protection reasons. On 12 May 2010 the new UK Coalition Government announced plans to scrap ContactPoint and on 6 August 2010 the database was shut down. From that date the Children Act 2004 Information Database (England) Regulations 2007, as amended in 2010, no longer applies.