ICT
Internet and Email Access Policy
In order to protect the firm, its employees, and customers and suppliers, all members of staff should be given a copy of the firms policy regarding acceptable use of IT resources - particularly internet and e-mail access. This will form part of the contract of employment - to the extent that any breaches of the policy could result in disciplinary action, and in some cases dismissal.
 
Data Security - Access
Many businesses are now completely reliant on the data stored on their Network Servers, PCs, laptops, and mobile devices. Here we look at some of the issues to consider when reviewing the security of your computer systems with respect to access controls, and to ensure compliance with Principle 7 of the Data Protection Act.
 
Data Security - Backup
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices and in the cloud. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the issues to consider when reviewing the security of your computer systems and data.
 
Data Security - Data Loss Risk Reduction
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, and mobile devices. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the issues to consider when reviewing the security of your computer systems, and how to minimise the risks of data loss.
 
Data Security - Data Protection Act
Many businesses are totally reliant on the data stored on their PCs, laptops, networks and mobile devices. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the key compliance issues surrounding data protection and the Data Protection Act.
 
Bring your own device (BYOD)
BYOD refers to the policy by which employees can use their own personal mobile devices (such as phones, tablets, laptops) to access company networks/systems. We consider guidelines on creating a policy.
 
Data Security - Cloud and Outsourcing
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices or in the cloud. Some of this data is likely to contain either personal information and/or confidential company information.
 
Data Security - General Data Protection Regulation
The General Data Protection Regulation (GDPR) will replace the existing Data Protection Act and will apply from 25 May 2018.
 
Data Security - General Data Protection Regulation - preparation
The General Data Protection Regulation (GDPR) will replace the existing Data Protection Act and will apply from 25 May 2018.