Search results
Stock control systems - keeping track using computer software
Sales order processing, automatic stock monitoring and how to choose the right stock control system
Stock security
Set up a security policy, prevent employee theft and ensure you comply with health and safety requirements
Using RFID for inventory control, stock security and quality management
RFID inventory management provides a highly versatile way to control and track stock
Control the quality of your stock
Stock and batch tracking, checking goods and the British Standards Institute scheme for quality management
Stock control administration
An administrator or stock controllers' duties, typical paperwork and auditing or checking stock
Supplementary protection certificates (SPCs) and the Northern Ireland Protocol
How the Northern Ireland Protocol affects supplementary protection certificates (SPCs), and what it means you need to do when applying for an SPC and afterwards
Trade marks and geographical indications
Guidance for businesses and organisations on the relationship between trade marks and geographical indications (GIs)
Using robotics to improve our business operations - Irwin's Bakery (video)
In this case study, Aaron Harrigan from Irwin's Bakery discusses the business benefits of introducing automation and robotics into their manufacturing process
EU trade mark protection and comparable UK trade marks
Guidance for businesses and organisations holding EU trade marks at the end of the transition period
Using digital innovation to benefit our business - GRAHAM Group (video)
Shervin Yousefzadeh and Victoria Allen from GRAHAM Group talk about the company's digital transformation
Using robotics to increase efficiency in our business - NC Engineering (video)
Robert Nicholl from NC Engineering describes how the company has introduced automation and robotics in their manufacturing process to increase their efficiency and competitiveness
How to report a cyber crime
Find out where and how businesses can report online fraud, cyber security incidents and other types of cyber crime.
IT risk management process
How to identify risks and assets as part of the IT risk management process, and create risk management plans procedures.
IT risk assessment methodology
An effective IT risk assessment looks at risk based on the probability of it occurring and the cost of impact and recovery.
ISO 27001 IT security management standard
An overview of the ISO 27001 information security standard, and how it can help you improve security for your business.
Different types of IT risk
Your IT systems and data face many types of risks, including physical damage, malicious attacks, technical faults and human error.
What is IT risk?
Introduction to information technology (IT) risk and its potential to damage or devalue your business.
IT risk management
Introduction to IT risk management and processes you should follow to manage and mitigate IT risks in your business.
Data subject rights under the UK GDPR
Introduction to the rights of individuals under the UK GDPR, and your duties and obligations in respect of them.
Sample acceptable internet use policy
Find sample wording for an internet use policy, which sets out your employees' responsibilities when using the internet.