Records in place now, not later

Issue 7 2022 Editor's Choice, Security Services & Risk Management

It is important, after an incident, to have records in place as soon as possible. Too often the matter is left for the day when the company is going to court, or a disciplinary hearing is scheduled.

We are all familiar with how long after an incident a matter will be brought to court or the hearing activated, and how often the proceedings will be postponed. This fact alone should be enough reason to ensure records are secured without any delay.

Incidents happen at very inconvenient times and usually management will only hear about it much later. By that time too many people are already involved or have had something to say.

The number of people involved can be controlled by ensuring they all submit the necessary affidavit within a day or two after the incident. Soon the message will be clear and the ‘crime scene’ purified.

The good and standard practice of ensuring completed, signed and dated affidavits for all criminal and disciplinary matters are on record without delay will prove to be the golden standard for any department, organisation or company. Take note: an affidavit is only valid when signed and dated.

Record-keeping basics

Ensure your organisation or department is familiar with records that may be requested as part of criminal or disciplinary proceedings. A checklist for records to be in place should be available and should be reviewed annually at the least.

The records must be evaluated for correctness in terms of references to the incident, and the relevant dates reflected in these documents complete the chain of evidence and chain of custody. All records must be traceable to the date and time of the incident.

Securing the relevant records (including affidavits) within days is important for the following reasons:

• The relevant person may not be available in future to provide the records/affidavit.

• The relevant person left the environment, has no commitment to the environment anymore and such a request at a later stage may simply be ignored.

• The relevant person needs to rely on their memory of the incident at a later stage to complete the records or to submit an affidavit.

• A record or affidavit provided at a much later stage than the date of the incident will leave room for the defence to question the credibility of the information and the person’s memory.

• Indicating in court that records were compiled by notes that were made at the time of the incident may result in the court requesting access to the mentioned notes.

• Such a request by the court must be complied with and can potentially lead to more questions being asked on the matter, especially if the notes do not relate to the affidavit.

• If, for some reason, such notes are not available as referred to, the person will be seen as an unreliable witness.

• Departments, organisations and companies with a history of many incidents must have a policy and a sound system in place, ensuring the records are in place within 2 to 3 days of the incident.

• An organised environment creates trust and usually has an easier day in court.

• The message will soon be clear that the required records are available and sound.

Managing the records is an essential part of the process. The saying ‘what gets managed, gets done’ has a lot of value, as often experienced by management.

Records must be secured in an organised manner by having all information related to a specific incident easily available and together. Records must be referenced and traceable to the specific incident (see article in Hi-Tech Security Solutions, Issue 8 2021, www.securitysa.com/14945r). The referencing system to use needs to be documented and not determined by each individual working on these cases.

Archiving of records must also be done in such a manner that the records do not deteriorate over time.

A policy needs to be in place on how long records need to be archived, taking into consideration possible claims at a later stage. It is recommended that legal advice is obtained on this matter. On the completion of the criminal case, there is also the possibility of a civil case.

Policies and procedures are of great value in providing a standard approach, and can also be used for managing performance.

Rather be prepared for the worst than lose a case because of a lack of sound records when it was possible to have such records secured.

For more information contact Sonja de Klerk, +27 82 778 9249, sonsdeklerk@gmail.com, www.linkedin.com/in/sonja-de-klerk-034909202/



Sonja de Klerk.

Sonja de Klerk retired from the SAPS Forensic Science Laboratory as a brigadier. She provides expert advice on CCTV management to secure images as evidence and presents training courses on CCTV management for footage to be presented in court, forensic evidence to expect as part of criminal activities, evidence management, how to present expert testimony in court and the importance of traceable records. Her expertise is also available for independent and confidential audits, evaluations and consultation on the traceability of records in an organisation. She is also the author of ‘The Complete Manual on CCTV Management’ (second edition).




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...