• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6990 Compliance courses

IT Manager

4.7(160)

By Janets

Register on the IT Manager today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The IT Manager is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The IT Manager Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the IT Manager, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Manager
Delivered Online On Demand3 days
£25

Firefighter Training and Fire safety - CPD Accredited

5.0(10)

By Apex Learning

Give a compliment to your career and take it to the next level. This Firefighter Training and Fire safetywill provide you with the essential knowledge and skills required to shine in your professional career. Whether you want to develop skills for your next job or want to elevate skills for your next promotion, this Firefighter Training and Fire safetywill help you keep ahead of the pack. The Firefighter Training and Fire safetyincorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can reinforce your professional skills and essential knowledge, reaching out to the level of expertise required for your position. Further, this Firefighter Training and Fire safetywill add extra value to your resume to stand out to potential employers. Along with this Firefighter Training and Fire safetycourse, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. This Firefighter Training and Fire safety Bundle Consists of the following Premium courses: Course 01: Firefighter Training Course 02: Fire Extinguisher - Online Course Course 03: Fire Safety Course 04: Fire Marshal Level 4 Training Course 05: Asbestos Awareness Level 2 Course 06: DSEAR Training Course 07: COSHH Training and Safety - Level 2 Course 08: Ladder Safety Course 09: Working at Height Awareness Diploma Course 10: Working in Confined Spaces Course 11: First Aid Training Benefits you'll get choosing Apex Learning for this Fire safety & Firefighter Training: One payment, but lifetime access to 11 CPD courses Certificates, student ID for the Fire safety & Firefighter Training included in a one-time fee Full tutor support available Accessible, informative Fire safety & Firefighter Training modules taught by expert instructors Learn Fire safety & Firefighter Training at your ease - anytime, from anywhere Study the Fire safety & Firefighter Training course from your computer, tablet or mobile device CPD accredited So, enrol Firefighter Training and Fire safety now to advance your career! Curriculum of the Bundle Course 01: Fire Extinguisher - Online Course Module 1: Understanding Fire Module 2: Basics of Fire Extinguishers Module 3: Using Fire Extinguishers Safely Module 4: Pre and Post Engagement Action Module 5: Laws Regarding Fire Extinguisher Module 6: Standards on Fire Protection and Prevention Module 7: Risk Assessment Course 02: Fire Marshal Level 4 Training Fire Warden Safety: An introduction Understanding Fires - The Fire Triangle Risk Assessments The Fire Plan and Safety Arrangements Fire Evacuation Procedures and Strategies Personal Emergency Evacuation Plans Course 03: Asbestos Awareness Level 2 Module 01: Asbestos Explained Module 02: Asbestos Identified Module 03: Asbestos and the Law Module 04: Risk Factors of Asbestos Module 05: Surveys and Risk Assessment Module 06: Asbestos Awareness & Safety Module 07: Asbestos Containing Waste (ACW) Disposal Module 08: Accidental Disturbance of ACMs and Dealing with Emergencies Course 04: DSEAR Training Introduction to DSEAR ATEX and Explosive Atmospheres General Safety Safe Working with Flammable Substances Equipment and Protection System Risk Assessment Course 05: COSHH Training and Safety - Level 2 COSHH Explained COSHH Regulations Health Problems Related to Hazardous Substances Identifying Hazardous Substances COSHH Risk Assessments Control Measures and Monitoring Implementing Control Measures Course 06: Ladder Safety Module 01: Introduction to Ladder Safety Module 02: Ladder Classifications and Uses Module 03: Pre-use Safety Inspections and Risk Assessment Module 04: Setting Up and Safe Use of Ladders Module 05: Placement Considerations and Securing a Ladder Course 07: Working at Height Awareness Diploma Module 01 : Introduction, Regulations and Duties Module 02 : Risk Assessment and Prevention Module 03 : Work at Height Equipment Course 08: Working in Confined Spaces Module 01: Working in Confined Spaces and the Laws Module 02: Risk Assessment Module 03: Control Measures Module 04: Emergency Procedures Course 09: RIDDOR Training Module 1: Health and Safety at Work and the Laws Module 2: Managing for Health and Safety Module 3: Risk Assessment and Common Risks Module 4: RIDDOR Course 10: First Aid Training Introduction to Workplace First Aid Legal Framework for Workplace First Aid Incident Management at Work Primary Survey Secondary Survey Basic First-Aid Techniques Dealing with Minor Injuries at the Workplace Secondary Illness Loss of Responsiveness and CPR Secondary Illness Breathing Problems Secondary Illnesses and Injuries Dealing With Fractures and Dislocations Call for an Emergency Course 11: Time Management Identifying Goals Effective Energy Distribution Working with Your Personal Style Building Your Toolbox Establishing Your Action Plan CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? How will I get my Fire safety & Firefighter Training Certificates? After successfully completing the Fire safety & Firefighter Training course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Requirements Our Fire safety & Firefighter Training Diplomais fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This Fire safety & Firefighter Training Diploma course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. Career path Having this Fire safety & Firefighter Training Diploma expertise will increase the value of your CV and open you up to multiple job sectors. This can apply to: Office workers Factory workers Leisure centre workers Shopworkers Warehouse workers Property owners Certificates Certificate of completion Digital certificate - Included

Firefighter Training and Fire safety - CPD Accredited
Delivered Online On Demand
£39

Fire safety & Firefighter Training Diploma

5.0(10)

By Apex Learning

Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Fire safety & Firefighter Training Now Fire safety & Firefighter Training Course is required for all organisations, and employees such as fire wardens, managers and supervisors must be familiar with workplace fire safety laws and legislation. This introductory Fire safety & Firefighter Training Course is designed to teach you what procedures need to be in place and how to react professionally in the case of a fire emergency. The Regulatory Reform (Fire Safety) Order 2005, the Fire Safety (Scotland) Regulations 2006 and the Fire safety & Firefighter Training Regulations (Northern Ireland) 2010 state that all employers must provide their staff with Fire Safety Training and information. Some of the key Fire safety & Firefighter Training principles you'll learn are what causes a fire and how to prevent them, complying with safety laws in the workplace, evacuation procedures and housekeeping and maintenance. Along with this Fire safety & Firefighter Trainingcourse, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. This Fire safety & Firefighter Training Bundle Consists of the following Premium courses: Course 01: Fire Safety Course 02: Fire Marshal Level 4 Training Course 03: Fire Extinguisher - Online Course Course 04: Ladder Safety Course 05: Working at Height Awareness Diploma Course 06: Working in Confined Spaces Course 07: Manual Handling Level 2 Course 08: DSEAR Training Course 09: RIDDOR Training Course 10: First Aid Training Course 11: Time Management Benefits you'll get choosing Apex Learning for this Fire safety & Firefighter Training: One payment, but lifetime access to 11 CPD courses Certificates, student ID for the Fire safety & Firefighter Training included in a one-time fee Full tutor support available Accessible, informative Fire safety & Firefighter Training modules taught by expert instructors Learn Fire safety & Firefighter Training at your ease - anytime, from anywhere Study the Fire safety & Firefighter Training course from your computer, tablet or mobile device CPD accredited So, enrol Fire safety & Firefighter Training now to advance your career! How will I get my Fire safety & Firefighter Training Certificates? After successfully completing the Fire safety & Firefighter Training course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Fire safety & Firefighter Training Diplomabundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this Fire safety & Firefighter Training Diploma course. Requirements Our Fire safety & Firefighter Training Diplomais fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This Fire safety & Firefighter Training Diploma course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. Career path Having this Fire safety & Firefighter Training Diploma expertise will increase the value of your CV and open you up to multiple job sectors. This can apply to: Office workers Factory workers Leisure centre workers Shopworkers Warehouse workers Property owners Certificates Certificate of completion Digital certificate - Included

Fire safety & Firefighter Training Diploma
Delivered Online On Demand
£39

Level 7 Advanced Diploma in IT Administrator - QLS Endorsed

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

Level 7 Advanced Diploma in IT Administrator - QLS Endorsed
Delivered Online On Demand3 weeks
£100

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered OnlineFlexible Dates
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Working Safely

5.0(3)

By TNA Training & Safety Consultants

Working safely is in the interest and concern of all staff, both employers and employees. Health and safety is one of the few areas where the law places specific duties specifically on employees so a knowledge of where this applies and how to ensure that it is adhered to is vital to protect individuals and businesses. The course covers a wide range of topics including fire safety, asbestos awareness, working at height, COSHH, PPE and electricity. It also covers schemes for improving safety performance and methods of protecting the environment.

Working Safely
Delivered Online On Demand
£65

ISO 31000:2018 (RM) Auditor Training Course

By TUVSW Academy

ISO 31000:2018 is an international standard of Risk Management, the existence of it requires competent personnel to interpret its guidelines, address those to integrate Risk Management in an organization’s operations and audit organization to assess the implementation and effectiveness of overall implementation. This course is designed for professionals who are responsible of any aspect of Risk Management as well as for those, specifically, who are pursuing their career in the field of auditing Risk Management. This course enhances the knowledge and skills of delegates to understand the standard and audit it effectively. Course is consisting of study material in form of written details. Attendees of this course will be, on completion, competent to implement Risk Management, Plan, Conduct & Report 1st, 2nd & 3rd party audits. This course also discusses about different risk assessment techniques such as Brainstorming Structured or semi-structured interviews Delphi technique Check-lists Preliminary hazard analysis (PHA) HAZOP Hazard analysis and critical control points (HACCP) Toxicity assessment Structured “What-if” Technique (SWIFT) Scenario analysis Business impact analysis (BIA) Root cause analysis (RCA) Failure modes and effects analysis (FMEA) and failure modes and effects and criticality analysis (FMECA) Fault tree analysis (FTA) Event tree analysis (ETA) Cause-consequence analysis Cause-and-effect analysis Layers of protection analysis (LOPA) Decision tree analysis Human reliability assessment (HRA) Bow tie analysis Reliability centred maintenance Sneak analysis (SA)and sneak circuit analysis (SCI) Markov analysis Monte Carlo simulation Bayesian statistics and Bayes Nets FN curves Risk indices Consequence/ probability matrix Cost/benefit analysis (CBA) Multi-criteria decision analysis (MCDA)   Features of Couse ✔ 100% Online Self-paced: Considering the busy lives, we have designed this course to be attended online without bounding with the schedules. To make it interactive, we have created different communication groups where candidate can discuss the points with other fellows as well as the trainers of course. ✔ Testing the Learning: Each section of course is covered with exercise to check your knowledge in real-time, and overall result is affected by exercises you complete. ✔ Self-Scheduling: This 40 Hours full fledge course is designed to match you schedule. You will get a life time access to this course and complete it on your ease. ✔ Superlative Material: The training is designed, developed and reviewed by competent auditors having an extensive experience of auditing in different regions of world. ✔ Approved Course: The course is approved by one of the well-known personal certifying body “IRCP”.   Who should attend this? This course is recommended to be attended by those who are involved in implementation and/ or auditing of Risk Management System, specifically Risk Managers, Auditors and others willing to add credibility with a widely accepted qualification for auditing. Also, recommended to satisfy the applicable requirement of training and competence, if any. This course can add values to your profile if you are Intending to perform audits of RM. A Risk Management Executive/ Management Representative An Existing Internal Auditor A Ris Management Consultant Responsible for implementing the ISO 31000 standard. Responsibility to evaluate the outcome of internal RM audits and have responsibility/ authority to improve the effectiveness of the RM. Pursuing to make career in RM auditing.   Course Duration: 40 Learning Hours and extended time of exercise & Exam.   Certificate: Those who pass all exercises with 50% at least in each exercise and 70% overall marks will be awarded with successfully completion certificate with approval of Exemplar Global and a Lifetime validity.   Language of Course: English   Pre-Requisites: Knowledge of Risk Management

ISO 31000:2018 (RM) Auditor Training Course
Delivered Online On Demand
£198

Emergency First Aid at Work Level 3

By North West First Aid

A nationally recognised regulated qualification for low risk organisations to satisfy the requirements of the Health & Safety (First Aid) Regulations 1981.

Emergency First Aid at Work Level 3
Delivered In-PersonFlexible Dates
£95