Search results
Trader Support Service: Assisted Completion Service
The Trader Support Service (TSS) can help businesses complete their Supplementary Declarations (SD) with the Assisted Completion Service
CLP - Classification, Labelling and Packaging
What the CLP regulation is, knowing your role within the supply chain and your responsibilities to ensure compliance
EU CLP
Your role and responsibilities under EU CLP and where to get support for your activities which fall within scope
GB CLP
Your role and responsibilities under GB CLP and where to get support for activities which fall within scope
EU REACH
How EU REACH affects businesses in Northern Ireland and where to get support if your activities fall within scope
UK REACH
Guidance on how UK REACH regulates chemical substances that are imported into Great Britain from Northern Ireland
Carrying out and commissioning research on overseas markets
Undertaking market research in overseas export markets.
Top tips for conducting export market research
Five top tips to help you conduct your export market research.
Research product and packaging changes for export
Adjusting your product to comply with law overseas.
Conducting in-market export research
Ways of conducting in-market research on export markets.
How to report a cyber crime
Find out where and how businesses can report online fraud, cyber security incidents and other types of cyber crime.
IT risk management process
How to identify risks and assets as part of the IT risk management process, and create risk management plans procedures.
IT risk assessment methodology
An effective IT risk assessment looks at risk based on the probability of it occurring and the cost of impact and recovery.
ISO 27001 IT security management standard
An overview of the ISO 27001 information security standard, and how it can help you improve security for your business.
Different types of IT risk
Your IT systems and data face many types of risks, including physical damage, malicious attacks, technical faults and human error.
What is IT risk?
Introduction to information technology (IT) risk and its potential to damage or devalue your business.
IT risk management
Introduction to IT risk management and processes you should follow to manage and mitigate IT risks in your business.
Data subject rights under the UK GDPR
Introduction to the rights of individuals under the UK GDPR, and your duties and obligations in respect of them.
Sample acceptable internet use policy
Find sample wording for an internet use policy, which sets out your employees' responsibilities when using the internet.
Sample acceptable email use policy
Use our email policy template to set out your employees' responsibilities when using email in your business.