Search results
Employees, IT and environmental checks when buying a business
What you need to know about a business' employees, IT systems and environmental responsibilities before buying it.
Confidential information and confidentiality agreements
Understand your legal obligations when buying an existing business.
Seeking professional advice when buying a business
Information on potential sources that help when buying a business.
IT risk management
Introduction to IT risk management and processes you should follow to manage and mitigate IT risks in your business.
Data subject rights under the UK GDPR
Introduction to the rights of individuals under the UK GDPR, and your duties and obligations in respect of them.
Sample acceptable internet use policy
Find sample wording for an internet use policy, which sets out your employees' responsibilities when using the internet.
Sample acceptable email use policy
Use our email policy template to set out your employees' responsibilities when using email in your business.
Sample website copyright statement
Use our digital copyright statement and disclaimer template to state the copyright position of your website content.
Sample business email disclaimer
Use our free email disclaimer template to include your business’ legal information, confidentiality or warnings in your emails.
Sample IT policies, disclaimers and notices
Free templates for IT policies and forms, including website disclaimers, copyright notices and privacy statements.
Different types of cyber crime
Understand the common ways cyber criminals may attack your business, how cyber attacks work and how they might affect you.
Tax implications of family succession
Pass shares to family members tax-efficiently, maximising relief for Capital Gains Tax and inheritance tax.
Succession planning in a family business - McKeever Hotel Group
How McKeever Hotel Group successfully manages family business succession planning.
Cyber security for business
Introduction to small business cyber security, risks to your business, and tools and techniques to help you manage it.
Cyber security risk management
How to manage cyber security risks to your business, create security policies and practices, and use cyber insurance.
Reasons behind cyber attacks
Find out why cyber criminals target businesses and what assets (financial or otherwise) may be at risk from attacks.
Accepting card payments in retail
How to start accepting card payments in your business, and the types of card that can be used for payments.
Types of retail payment
The types of payment that retail businesses may accept, including cash, card and credit agreements, and how to choose the right option for your business.
Cyber security incident response plan
How to respond to a cyber attack and develop an effective cyber incident response plan for your business.
Cyber security breach detection
How to know if your business is under a cyber attack, and what to do to contain or control a cyber breach.