Welcome!

News Feed Item

Cycle Retailers To Benefit From Free BikeChecker Service & New Code of Practice

LONDON, April 8, 2014 /PRNewswire/ --



CYCLE shops are at constant risk of handling stolen goods, but a free service from BikeRegister, the UK's National Cycle Database, could quickly help them verify that they are buying bikes from a genuine source.

     (Photo: http://photos.prnewswire.com/prnh/20140408/679744 )

More than half of all bike thefts take place from an owner's property and bike thieves are becoming increasingly more organised. The ease with which a stolen bike can be sold continues to encourage the theft of bikes.

However, retailers and members of the public can now use the BikeChecker facility on the BikeRegister website (https://www.bikeregister.com/bike-checker) to check the origin of second-hand bikes being offered to them for sale.

The use of the BikeChecker facility is also recommended in BikeRegister's new CodeofPractice for the Purchase and Saleof Second-hand bikes.

The BikeRegister Code of Practice has been developed in conjunction with the Metropolitan Police Service's Cycle Task Force and other police partners who are looking at ways to expand the very successful   Project Cycle Ops launched just over a year ago by Chief Superintendent Sultan Taylor which delivered a reduction of cycle crime in London of over 10% in its first year.

Chief Sup. Sultan Taylor Comment 

"We want retailers and buyers of second hand bikes to be assured that they have taken part in a legitimate sale and that the bikes are not stolen.


"I urge all second hand Cycle Retailers to ensure that they check bikes with BikeRegister before purchase to verify legitimacy of sales. Should they discover that the bikes are stolen they should report it immediately to police.

"To help ensure we disrupt the trade of stolen cycles I cannot recommend strongly enough that all bicycle owners security mark their bikes with BikeRegister.

BikeRegister is used by every UK Police force to help them reunite some of the thousands of lost or stolen bikes they recover every year to their legal owners. The system is also designed to prevent bike theft in the first instance as the visible etching deters thieves.

The new Code of Practice (CoP) aims to help control the trade in second-hand cycles and to make it more difficult for criminals to dispose of stolen property through the retail network.

The CoP has been prepared on behalf of the Police Service, enforcement partners and local businesses that deal in the purchase/sale of second-hand bikes offered for resale. It is intended for use as the basis of standard operating procedures for all businesses that purchase or sell second-hand bikes. Four police forces have already signed up to the new code, with many others showing increasing interest.

The CoP outlines minimum criteria necessary for the identification, purchase and sale of second-hand bikes and supplies information on what actions are necessary when a cycle is identified as not being in the possession of its rightful/lawful owner.

Announcing the publication of the new Code, BikeRegister MD Andrew Knights, said: "Our new CoP is intended to be a voluntary guide for companies who operate in this area."

He continued: "If all bike shops insisted on an ownership check on BikeChecker before purchasing a second-hand bike and recording details of all second-hand bikes on BikeRegister, it would be a significant step forward in the fight against bike crime.

"It would also protect the retailer from handling stolen goods and generate goodwill towards the retailer from the cycling community."

Constantly looking for new ideas to fight bike crime, BikeRegister is also developing a new Traffic Light System to allow the provenance of second-hand bikes being offered for sale to be checked on web-based auction sites.

Notes to Editors 

The Code of Practice for the Purchase and Saleof Second-hand bikes is available from BikeRegister's Sales Team on 0800 587 4739 or by e-mail: [email protected]

BikeRegister is the preferred bike marking product and registration system for the Metropolitan Police Service (MPS); and has helped reduce bike theft by 10.5% in London between October 2012 and September 2013.

BikeRegister is operated by Selectamark Security Systems plc, a market leader in the security field, specialising in the security marking and identification of property.

For more press information and images, contact: Angela Singleton, BikeRegister Press Officer. 0800-587-4739. Email: [email protected]

Follow @BikeRegister on Twitter.


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you ...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, represent...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...