Details This course is aimed at Water and Wastewater managers, field managers, asset managers and others involved in meeting compliance within the Water industry. As Wastewater Treatment compliance now comes under increasing regulatory scrutiny from OFWAT the overall ability of the Water Industry to effectively oversee and manage the Wastewater Treatment process comes under sharper focus. Demonstrating the competence of those responsible will likely become increasingly the focus of public awareness and form a key strand of the regulator’s investigation. Main themes Demonstrate an understanding of the current regulatory framework pertaining to pollution incidents Understand the sources of pollution Understand pollution risks specific to the Water and Wastewater industry Critically analyse the stakeholders’ views of pollution from the Water and Wastewater industry Understand the importance of stakeholder communication, feedback and involvement in the context of pollution incidents Understand the impact of pollution in terms of the environment, customers, cost, H&S and from the regulatory perspective Describe the cumulative effect of point source and diffuse sources of pollution Describe and explain the collective responsibilities and ethical and moral issues as pertaining to pollution incidents Critically evaluate the use of internal systems and mechanisms for delivery of pollution risk reduction strategies Develop a pollution risk reduction strategy appropriate to your organisation. Instructions This online course will be delivered using CISCO Webex. You will need a suitable device with a camera and microphone like a laptop. If you have any questions about what is required, please contact us on enquiries@learninganddevelopment.associates. Qualification All learners taking the qualification will need to produce identification to enable ProQual registration. This can take the form of a: Passport Driving Licence Construction Skills Certification Scheme Card (CSCS Card) Construction Plant Competence Scheme Card (CPCS Card) If none of the above are available to the learner, a photograph with a statement confirming their identity, dated and signed, along with a utility bill, would be acceptable.
In January 2024 alone, reports were published about the SRA taking enforcement action against 3 firms and 4 individuals for failure to comply with the Money Laundering Regulations 2017. The fines issued for these non-compliances total over £570,000 plus costs. The absence of staff training, or requirement to complete additional training, was noted in a number of these cases. Many of the breaches resulting in enforcement action involved failures by the fee earners to conduct appropriate due diligence, adequately check the source of funds and/or wealth or recognise and report red flags. As highlighted by enforcement action being taken against individuals as well as firms, fee earners cannot hide behind their firm when AML failures occur and may be held personally accountable by the SRA for non-compliances with the MLR 2017. This course will cover the following to assist fee earners in the application of AML in their casework. How to comply with your obligations and stay compliant Written CRA & MRA Client Booms Risks – what to consider? PCPs – CDD &EDD POCA / TA SOF and SOW On going monitoring Reporting to MLRO/MLCO Tipping off Target Audience The online course is suitable for fee earners or legal practitioners that want to improve their AML knowledge. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).
Build a rent to rent business using a proven system
The Data Protection (GDPR) Foundation Certificate is the course for people who need a formal qualification to demonstrate a clear, concise and generic understanding of the UK General Data Protection Regulation and Data Protection Act 2018, in support of the practical knowledge often acquired in the workplace. It is suitable for the public, private and third sectors and will teach participants essential UK GDPR skills and sufficient knowledge to assist their organisation toward their data protection implementation and UK GDPR accountability requirement. The course is suitable for beginners but anyone with significant data protection knowledge will also get considerable benefit from it. This Foundation Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. Copies of the slides for the course are sent out a few days in advance. As the course covers a lot of ground in a short time we recommend attendees who know nothing about data protection to read through these. Note: This course is delivered live, online, using Zoom. It will be delivered 9.30 - 12.30 and 13.30 - 16.30 approx. Course Content Topics covered include: Background to Data Protection Legislation Scope Essential Definitions The Core of Data ProtectionPrinciplesLegal BasisTransparency/Privacy NoticesRights and Their Management Data Security Obligations and Breach Notification International Transfers (including cloud) Data Processors and ContractsDue Diligence Data Sharing and Joint ControllersAd Hoc and Planned Data Protection by DesignData Protection Impact Assessments Data Protection Officers Accountability and Action Plan The ICO and Enforcement Questions/discussion throughout the course Suitability - Who should attend? Anyone with an interest in data protection or needing a detailed introduction. Anyone involved in supporting data protection compliance in an organisation. Outcome / Qualification etc. Learning Outcomes: Be aware of the importance of data protection legislation and the GDPR Understand the key obligations of the GDPR and DPA Understand the rationale behind a data protection audit and gap analysis Assist with policies and procedures required for data protection compliance and accountability
This course is designed to equip participants with comprehensive knowledge in Pharmaceutical Quality System and Good Manufacturing and Distribution Practices. It covers the entire lifecycle of pharmaceutical production, from initial design and development to distribution and compliance. The course includes real-world case studies and interactive tools. Course Objectives Career Launch: Equip those with little or no GMP/QA experience with the essential knowledge, practical skills, and industry support needed to launch a successful career. Comprehensive Foundation: Provide a strong foundational understanding of QA in the EU, UK, and US, preparing you for diverse opportunities in the global market
Driver CPC - 1 Day Periodic 7 Hour Course The Compliant Driver / Trailer Checks and 3rd Party Trailers Join our online course from Total Compliance, designed to build your expertise in being a compliant driver and conducting essential trailer check. Driver Compliance: Understanding the responsibilities and legal requirements for maintaining compliance on the road. Trailer Checks: Conducting thorough pre-use and post-use trailer inspections to ensure safety and efficiency. 3rd Party Trailers: Best practices for managing and operating third-party trailers, including checks, handling procedures, and risk mitigation. Don't miss out on this opportunity to improve your driving practices! Please review our Terms and Conditions for more information.
Driver CPC - 1 Day Periodic 7 Hour Course The Compliant Driver / Trailer Checks and 3rd Party Trailers Join our online course from Total Compliance, designed to build your expertise in being a compliant driver and conducting essential trailer check. Driver Compliance: Understanding the responsibilities and legal requirements for maintaining compliance on the road. Trailer Checks: Conducting thorough pre-use and post-use trailer inspections to ensure safety and efficiency. 3rd Party Trailers: Best practices for managing and operating third-party trailers, including checks, handling procedures, and risk mitigation. Don't miss out on this opportunity to improve your driving practices! Please review our Terms and Conditions for more information.
Driver CPC - 1 Day Periodic 7 Hour Course The Compliant Driver / Trailer Checks and 3rd Party Trailers Join our online course from Total Compliance, designed to build your expertise in being a compliant driver and conducting essential trailer check. Driver Compliance: Understanding the responsibilities and legal requirements for maintaining compliance on the road. Trailer Checks: Conducting thorough pre-use and post-use trailer inspections to ensure safety and efficiency. 3rd Party Trailers: Best practices for managing and operating third-party trailers, including checks, handling procedures, and risk mitigation. Don't miss out on this opportunity to improve your driving practices! Please review our Terms and Conditions for more information.
Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews