Search results
IT risk assessment methodology
An effective IT risk assessment looks at risk based on the probability of it occurring and the cost of impact and recovery.
ISO 27001 IT security management standard
An overview of the ISO 27001 information security standard, and how it can help you improve security for your business.
Different types of IT risk
Your IT systems and data face many types of risks, including physical damage, malicious attacks, technical faults and human error.
What is IT risk?
Introduction to information technology (IT) risk and its potential to damage or devalue your business.
IT risk management
Introduction to IT risk management and processes you should follow to manage and mitigate IT risks in your business.
Data subject rights under the UK GDPR
Introduction to the rights of individuals under the UK GDPR, and your duties and obligations in respect of them.
Skills and training for company directors
Extra training that may be needed to fulfil the duties of a company director.
Sample acceptable internet use policy
Find sample wording for an internet use policy, which sets out your employees' responsibilities when using the internet.
Managing your team
Discover the skills that make for successful team management.
Sample acceptable email use policy
Use our email policy template to set out your employees' responsibilities when using email in your business.
Sample website copyright statement
Use our digital copyright statement and disclaimer template to state the copyright position of your website content.
Sample business email disclaimer
Use our free email disclaimer template to include your business’ legal information, confidentiality or warnings in your emails.
Sample IT policies, disclaimers and notices
Free templates for IT policies and forms, including website disclaimers, copyright notices and privacy statements.
Staff monitoring: reasons and methods
What workplace monitoring is, why monitor staff, and the methods you can use for surveillance.
Staff monitoring: deciding if it is justified
Using an impact assessment to determine if staff monitoring is justified and ensuring that you meet legal requirements on privacy.
Staff security and monitoring employees
How to ensure the safety of your staff and the rules to follow when using surveillance in the workplace.
Set up staff monitoring policies
Writing staff monitoring policies, particularly on the use of computers phones, and business vehicles.
Monitor staff correctly and lawfully
How to monitor your staff in accordance with the law and best practices.
Penalties for improper staff monitoring
The right and wrong way to monitor workers, and the penalties for improper staff monitoring.
Different types of cyber crime
Understand the common ways cyber criminals may attack your business, how cyber attacks work and how they might affect you.