• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

146 Educators providing Courses

St Wilfrid's Catholic Primary School

st wilfrid's catholic primary school

Sheffield

We process personal data to provide public services. Personal data is information about living identifiable individuals. It can be a name, address, contact details, photograph, sound recording; it can be details of someone’s behaviour, lifestyle, physical or mental health needs; it can be a unique number, such as a vehicle registration plate, National Insurance number, etc. We decide what personal data we need and how to use it, so we are a Data Controller and registered as such on the Information Commissioner’s Register of Data Controllers. When we collect personal data, we are required to make sure you are clear what data we need and why, what we intend to do with it, what your individual rights are, and who you can contact for enquiries or concerns about the use of your personal data. This is called a privacy notice and we can do this verbally or in writing. This page is our general privacy notice and we have included specific privacy notices below for the services that process large amounts of personal data, for example council tax, planning, parking, elections, licensing, housing, etc. Why we collect and use personal data We collect and use personal information to: provide, plan and manage our services carry out our regulatory, licensing and enforcement roles carry out any other tasks which we have to do by law make and take payments and grants and spot fraud listen to your ideas about our services tell you about our services evaluate and improve services We might collect your personal data directly from yourself, from someone acting on your behalf, or from another third party. We might collect this data in person, over the telephone, in writing, or captured as an image, audio or film recording. We can only use your personal data if we have a lawful basis for doing so. The lawful basis will be recorded on the Council’s Record of Processing Activity and, where appropriate, on relevant service area privacy notices. If we rely on consent to process your data, you have the right to withdraw that consent at any time. To withdraw consent, either contact the Service that you provided the consent to or contact the information management team. Sharing your information We share personal data internally within the council and also with external third parties so we can carry out our work. Internal sharing might include checking your eligibility for a service (eg free school meals) or keeping accurate records, whereas external sharing might be to ensure you receive the right service (eg social care support). Who we share information with depends on the service we are providing and your circumstances, but may include: healthcare, social and welfare organisations and professionals providers of goods and services financial organisations, including debt collection, tracing and credit referencing agencies elected members local and central government ombudsman and regulatory authorities professional advisors and consultants police forces, other law enforcement and prosecuting authorities voluntary and charitable organisations Disclosure and Barring Service Courts and Tribunals utilities providers When personal data is shared, only the minimum amount is shared and relevant contracts and / or agreements will be in place. Fraud prevention and detection We are required by law to protect the use of public funds and for this reason we share information with internal services and other bodies responsible for auditing or administering of public funds to detect and prevent fraud. This sharing includes, but is not exclusive to the Council’s external auditor, Department for Work and Pensions, other local authorities, HM Revenue and Customs, the Police, credit reference agencies. We also share personal data with the Cabinet Office for the National Fraud Initiative. This is a national data matching exercise, which takes electronic data from the private and public sectors to identify potential fraudulent claims and payments. The Cabinet Office stipulates the data that they need and subsequently provides us with details of the cases where the matching indicates an inconsistency or potential for fraud, so that we can investigate further. This data matching is carried out under the Local Audit and Accountability Act (part 6, Schedule 9) and does not rely on your consent. How long we keep information for This varies depending on the type of information, as well as the legal requirements and reason we are keeping the information. In some instances the law sets the length of time information has to be kept. We also have retention and disposal schedules which give details about how long we need to keep different types of information. Your data rights You have the following rights in regard to your personal information, to: access copies of any records we hold about you have any information we hold about you corrected have any information we hold about you deleted or destroyed restrict how information we hold about you can be used or shared object to information about you being held have any information we hold about you transferred to a third party challenge decisions relating to you made using automated decision making and profiling (currently we have no services that use automated decision making or profiling for decision making) Please note there may be times that we cannot fulfil these rights fully because of legal reasons, for example we cannot delete your data if we still need it. If you want to exercise any of the above rights, please make a subject access request. Make a subject access request Who to contact about the way your personal data is handled If you have any queries, concerns or complaints about the way we process your personal data, including the way we handle information requests, you can contact our Customer Services or the Data Protection Officer. If you are not satisfied with our response or believe we are not processing your personal data in accordance with the law you have the right to contact the Information Commissioner’s Office.

St. Kevin's College

st. kevin's college

St Kevin’s College is an all boy’s secondary school under the trusteeship of the Edmund Rice Schools Trust and is located in the heart of the Ballygall community on Ballygall Road East, Finglas, Dublin 11 where it has served the community in education since 1967. The school currently has an enrolment of 528 students. We provide a wide range of subjects which are expertly taught by a team of highly dedicated teachers who work diligently both inside and outside the classroom. Our primary focus is on teaching & learning with emphasis on both high academic achievement and learning support. An average of 70% of our students proceed to third level with degree courses. Another 20% access further and higher education Our six care teams, which comprise of our Form Tutor’s for each class and the Year Head, report to our Student Services Support team. This ensures that all of our student’s welfare is catered for both in the academic and pastoral areas. We strive at all times to provide opportunities for our students which values the student’s personal, social, spiritual and academic development during their time in the school. Our dedicated teachers also encourage students to get involved in extracurricular activities such as our extended range of activities including sports, drama, debating, green school committee and much more. There is a book club for 5th and 6th years. There is also a library in the school. Our Literacy and Numeracy strategies focus on improving the student’s skills in both areas and this improves student participation in all subject areas. We also value partnership which is essential to a successful school. We believe in a working partnership between the school and the home and we have many initiatives to maintain and develop this partnership into the future. We also would like to encourage partnership within the wider community of Ballygall which will help enrich the learning experience for all parties including our students. St Kevin’s college has DEIS 2 status. The 8 DEIS Strands covering Attendance, Retention, Transitions, Examination Attainment, Literacy, Numeracy, Parental Engagement, Partnership with others while designed for target students are applied on a whole school basis and benefit all of our students. St. Kevin’s College:  Proven academic success Comprehensive range of subjects State-of-the-art IT facilities. St Kevin’s uses VSWare education platform which is available to parents. We also provide the Edmodo Virtual Learning Environment. Every student has a personalised account on each platform. 100Mbps high speed Broadband Wi-Fi access throughout the school. Supervised after school study Optional Transition Year Programme Homework Club Breakfast Club Canteen Facilities providing healthy lunches for all students. (Junior Cert 1, 2, & 3 students are not permitted to leave the school at lunchtime.) Book Rental Scheme Anti-bullying policy, procedures and charter Home School Community Liaison Coordinator Links with the Home There are several opportunities for parents to link with the college formally throughout the academic year: Parent/Teacher Meetings School Journal Login to your sons VSWare account. Login to your son’s Edmodo account. Assessment Reports. (E- Portal and post.) Information Evenings Parents’ Council Email and text message Home School Community Liaison Coordinator The college operates an open door policy where a parent can make an appointment to meet with a Year Head at any stage if they have concerns. The Principal and Deputy Principal are also available to meet with parents should the need arise. We focus on partnership with the parents and believe that a co-operative relationship between the college and home best fosters the development of the student. First Year Induction Moving to second level is a time of great change for young children and their families. Here in St. Kevin’s College we are mindful of this transition and the challenges it brings. We offer a comprehensive first year induction which includes a ‘phasing in’ programme. Our Home School Community Liaison coordinator has strong links with all our feeder primary schools. This induction programme supports students as they make the move to our college. It helps them to get to know their new surroundings, make new friends, meet their teachers and learn the rules in close contact with their Form Tutor and Year Head. Our aim is to make first years feel confident and happy coming to school each day. The college is reputed for its high level of pastoral care which supports students in achieving their best. For students who experience small difficulties integrating in First year we offer them the Transition programme which helps them cope with the change. We provide a course for all students and their parents on Cyber bullying and internet/social media safety. Book Rental Scheme The college operates a very popular book loan scheme. This gives students the opportunity to rent most of their text books for a very reasonable charge. The books remain the property of the college and are always in excellent condition. Policies & Procedures The college operates policies that are fair and consistent, promoting equality for all and active participation in learning. These policies will be outlined to parents on information evenings and in the student journal. All policies are referred to Parents Council, Student Council and Staff prior to ratification by the Board of Management and publication. See policies here. School Canteen The school canteen delivers hot lunches, rolls and drinks and is an area for all students to have lunch. St. Kevin’s College promote healthy eating for students. Breakfast Club The student canteen also hosts a breakfast club before school serving cereals, tea and toast. Evening Study Students preparing for State Examinations are encouraged to attend supervised Evening Study held on four evenings per week. Extra–Curricular St Kevin’s aim to provide a wide of range of experiences to our students both inside and outside the classroom. We have a strong sporting tradition offering Gaelic football, Hurling, Basketball, Soccer, Rugby, Athletics to name just a few. We have a number of debating teams, a book club, Art installations at holiday times, Healthy eating/Keep fit “boot camps”. We run an annual international school tour and numerous day trips to reward students for excellence in subject areas. Our Transition Years go hillwalking and on many outdoor pursuit activities such as canoeing and sailing. We promote cultural activities whenever possible with students attending plays in the city’s theatres whenever possible both for subject related and general education purposes. Religion Our Mission Statement provides for education in the Catholic tradition although we accept students from all faiths and none. This provides for healthy and lively debate among our students during religion classes and contributes to the holistic development of all students. We hold religious services and Mass throughout the year led by our chaplain, Catriona Keegan, with contributions made by all students and staff. St Kevin’s college is a community which welcomes all our partners to participate in the spiritual life of the school

Mtm Educational Consultancy

mtm educational consultancy

London

For more than 35 years, MTM Consulting has supported schools (state and independent), universities and other education providers to remain in business and to develop and thrive, whatever the economic climate. We are all about providing solid data, insightful analysis and clear recommendations to enable organisations to plan for future stability and success and to uphold their responsibilities to parents who entrust them with their children’s education. In fact, we’ve worked with more than 500 schools and researched more than 250,000 parents. Our feasibility studies, supply and demand analyses and stakeholder research projects are all designed to help school business leaders to understand the potential of their organisation’s market, where they stand against their competitors, what the market wants and what it does not want. MTM equips education decision-makers with the information and insight they need to make the right choices for the future of their organisations. Education business expertise MTM’s team are all education business specialists with many years of experience. We understand the challenges and opportunities of the education sector and we want to use our expertise to help schools and other education providers to find the right course and achieve success. We are friendly and approachable We want to help We enjoy designing bespoke market research, marketing and business strategies to meet individual clients’ specific needs We encourage questions We communicate throughout We present or report on our findings and recommendations in a way that best suits each client We love to provide all the detail our clients need We follow up to see if we can help further We keep in touch Meet MTM’s expert team… Evidence-based decision-making MTM Consulting’s support of its education clients is based on facts, expertise and experience. Our market research projects focus on providing the data and information required to make crucial decisions on resourcing and activities to: improve recruitment and increase the school roll minimise student attrition and improve retention and raise the organisation’s profile in its target market and the education sector in order to attract families, teaching and non-teaching staff, leaders and governors who will bring their skills and work as a team to ensure the organisation’s future success MTM uses UK-wide demographic information and a combination of qualitative and quantitative research methods to acquire exactly the data required to inform clients of the realities of their organisation’s situation. Of course, we don’t expect our education clients to be experts in market research themselves – through a series of friendly, collaborative discussions our team members are able to work with clients to ascertain the information that would be of greatest benefit to them in their decision-making. We ensure that the pricing of our products is transparent, and realistic in relation to education organisations’ budgets. In fact, we have recently revisited our offer in order to break down projects into distinct elements to improve affordability, particularly with smaller organisations in mind. We also offer subscription packages and the opportunity to spread payments over time. MTM’s suite of market research projects is infinitely customisable to suit the needs of individual clients and can be combined to create a totally bespoke market research project designed to meet clients’ needs exactly. Real-world insight, analysis and recommendations for success MTM is a long-established education market research company, which has a true understanding – built over three decades – of education, coupled with unparalleled skills and experience to support education business leaders to make the decisions that will lead their organisations to be steadfast and successful in the long-term, for the benefit of their stakeholders, staff and students. Our researchers have at their fingertips many years’ worth of sector- and country-wide data and are adept at using this to benchmark our clients’ performance. This helps business leaders to develop a real understanding of their organisation’s position and to see ‘the bigger picture’ and the potential in their market. Sometimes it is not just about what the data shows, but what it doesn’t show – our experts are able to draw attention to the gaps in an education organisation’s performance that can be crucial when making decisions on areas of future development. MTM works with a team of business professionals, all with proven track records in their fields, who work with our clients to maximise the opportunities revealed by market research and analysis. Business, marketing and international expertise is on offer to ensure that the client is able to develop a practical action plan – and a set of key performance indicators that will allow it to be assessed and scrutinised – as the organisation heads towards achieving its objectives. Our business professionals are collaborative team-workers, but they also have the strength and experience to draw our clients’ attention to areas of weakness and aims that are unachievable. We know that facing up to realities makes for a healthier business in the long term and ensures that funds and resources are focused on attainable goals. Supporting education It is our great pleasure to see our education clients succeed. There can be no better business to be in than education, and MTM is a staunch supporter of parents’ right to choose the environment in which their children are taught – state or independent, small or large… We work with education providers of all kinds and we are firm believers in the importance of a breadth of offering to suit all families. Early Years: MTM’s Feasibility Studies provide vital market information to schools and groups considering opening a new nursery or re-shaping their existing provision. Independent schools: MTM’s market research, business and marketing strategy projects are designed to help schools to be successful and sustainable in the long-term so that they are able to offer their pupils the education they deserve for the duration of their school careers State schools: MTM offers great insights into pupil and parent satisfaction and staff wellbeing to help schools to engage with the school community and ensure that educational resources are being maximised. School groups: MTM is able to advise groups (independent and state academies) on the potential success of new acquisitions and to help streamline the business of education for efficiency and to ensure maximum resources are available for education. Higher education: universities and higher education providers turn to MTM to help them to understand the opinions of their students on the quality of education they are receiving and the potential effect on their next steps in education and employment. Long-standing relationships with education clients We maintain very strong relationships with our clients, many of whom we have worked with on a regular basis for decades. To see real examples of MTM projects, please read a selection of our case studies. Over the past three decades, MTM has worked with big and small names in independent and state education, early years providers, higher education providers and education suppliers and investors. Rather than engaging MTM as a supplier, we like to think we are part of the team, offering information, skills and experience to support education organisations to maximise their business potential and provide a secure learning experience for their students well into the future. Communication with our clients is on-going and we constantly ask which aspects of our service they have most appreciated, and which could be developed. We act on our clients’ feedback and hone our products and services to make sure that they offer our clients exactly what they need.

Education And Skills Training & Development

education and skills training & development

Doncaster

Welcome to the Education and Skills Training & Development Ltd's privacy notice. Education and Skills Training & Development Ltd respects your privacy and is committed to protecting your personal data. This privacy notice will inform you as to how we look after your personal data when you visit our website (regardless of where you visit it from) and tell you about your privacy rights and how the law protects you. This privacy notice is provided in a layered format so you can click through to the specific areas set out below. Please also use the Glossary to understand the meaning of some of the terms used in this privacy notice. 1. IMPORTANT INFORMATION AND WHO WE ARE 2. THE DATA WE COLLECT ABOUT YOU 3. HOW IS YOUR PERSONAL DATA COLLECTED 4. HOW WE USE YOUR PERSONAL DATA 5. DISCLOSURES OF YOUR PERSONAL DATA 6. INTERNATIONAL TRANSFERS 7. DATA SECURITY 8. DATA RETENTION 9. YOUR LEGAL RIGHTS 10. GLOSSARY 1. Important information and who we are Purpose of this privacy notice This privacy notice aims to give you information on how Education and Skills Training & Development Ltd collects and processes your personal data through your use of this website, including any data you may provide through this website when you sign up to our newsletter, purchase a product or service, take part in a competition or enrol yourself or one of your employees onto one of our courses. This website is not intended for children and we do not knowingly collect data relating to children. It is important that you read this privacy notice together with any other privacy notice or fair processing notice we may provide on specific occasions when we are collecting or processing personal data about you so that you are fully aware of how and why we are using your data. This privacy notice supplements the other notices and is not intended to override them. Controller Education and Skills Training & Development Ltd is the controller and responsible for your personal data (collectively referred to as "COMPANY", "we", "us" or "our" in this privacy notice). We have appointed a data protection officer (DPO) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the DP] using the details set out below. Contact details Our full details are: Full name of legal entity: Education and Skills Training & Development Ltd Name or title of DPO : James Hart Email address: james.hart@education-and-skills.com Postal address: 5C Oxford House, Sixth Avenue, Doncaster DN9 3GG Telephone number: 01302 802220 You have the right to make a complaint at any time to the Information Commissioner's Office (ICO), the UK supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so please contact us in the first instance. Changes to the privacy notice and your duty to inform us of changes This version was last updated on 1st July 2018 and is reviewed annually. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your relationship with us. Third-party links This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the privacy notice of every website you visit. 2. The data we collect about you Personal data, or personal information, means any information about an individual from which that person can be identified. It does not include data where the identity has been removed (anonymous data). We may collect, use, store and transfer different kinds of personal data about you which we have grouped together follows: · Identity Data includes first name, maiden name, last name, username or similar identifier, marital status, title, date of birth, national insurance number and gender. · Contact Data includes billing address, delivery address, email address and telephone numbers. · Financial Data includes bank account and payment card details. · Transaction Data includes details about payments to and from you and other details of products and services you have purchased from us. · Technical Data includes internet protocol (IP) address, your login data, browser type and version, time zone setting and location, browser plug-in types and versions, operating system and platform and other technology on the devices you use to access this website. · Profile Data includes your username and password, purchases or orders made by you, your interests, preferences, feedback and survey responses. · Usage Data includes information about how you use our website, products and services. · Marketing and Communications Data includes your preferences in receiving marketing from us and our third parties and your communication preferences. We also collect, use and share Aggregated Data such as statistical or demographic data for any purpose. Aggregated Data may be derived from your personal data but is not considered personal data in law as this data does not directly or indirectly reveal your identity. For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature. However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this privacy notice. We do not collect any Special Categories of Personal Data about you (this includes details about your race or ethnicity, religious or philosophical beliefs, sex life, sexual orientation, political opinions, trade union membership, information about your health and genetic and biometric data). Nor do we collect any information about criminal convictions and offences. If you fail to provide personal data Where we need to collect personal data by law, or under the terms of a contract we have with you and you fail to provide that data when requested, we may not be able to perform the contract we have or are trying to enter into with you (for example, to provide you with goods or services). In this case, we may have to cancel a product or service you have with us but we will notify you if this is the case at the time. 3. How is your personal data collected? We use different methods to collect data from and about you including through: · Direct interactions. You may give us your Identity, Contact and Financial Data by filling in forms or by corresponding with us by post, phone, email or otherwise. This includes personal data you provide when you: · apply for our products or services; · enrol on one of our courses – government funded or not · create an account on our website; · subscribe to our service or publications; · request marketing to be sent to you; · enter a competition, promotion or survey; or · give us some feedback. · Automated technologies or interactions. As you interact with our website, we may automatically collect Technical Data about your equipment, browsing actions and patterns. We collect this personal data by using cookies, server logs and other similar technologies. We may also receive Technical Data about you if you visit other websites employing our cookies. · Third parties or publicly available sources. We may receive personal data about you from various third parties and public sources as set out below: · Technical Data from the following parties: (a) analytics providers such as Google based outside the EU; (b) advertising networks based inside the EU; and (c) search information providers based inside OR outside the EU. · Contact, Financial and Transaction Data from providers of technical, payment and delivery services based inside OR outside the EU. · Identity and Contact Data from data brokers or aggregators based inside OR outside the EU. · Identity and Contact Data from publicly availably sources such as Companies House and the Electoral Register based inside the EU. · Achievement of prior qualifications from the Learner Records Service and Department of Education via the ESFA or Student Loans Company 4. How we use your personal data We will only use your personal data when the law allows us to. Most commonly, we will use your personal data in the following circumstances: · Where we need to perform the contract we are about to enter into or have entered into with you. · Where it is necessary for our legitimate interests (or those of a third party) and your interests and fundamental rights do not override those interests. · Where we need to comply with a legal or regulatory obligation. Generally we do not rely on consent as a legal basis for processing your personal data other than in relation to sending third party direct marketing communications to you via email or text message. You have the right to withdraw consent to marketing at any time by contacting us. Purposes for which we will use your personal data We have set out below, in a table format, a description of all the ways we plan to use your personal data, and which of the legal bases we rely on to do so. We have also identified what our legitimate interests are where appropriate. Note that we may process your personal data for more than one lawful ground depending on the specific purpose for which we are using your data. Please contact us if you need details about the specific legal ground we are relying on to process your personal data where more than one ground has been set out in the table below.

Wrexham Foyer

wrexham foyer

Denbighshire,

In this document the expression ‘we’ refers to, ClwydAlyn Housing Limited, Tir Tai Limited, PenArian Limited and Tai Elwy Limited, that provides housing and related services across North Wales. Each entity is the controller of its own personal data although data may be processed by other Group members on its behalf This privacy notice sets out how ClwydAlyn collects and uses information about you. Please read this privacy notice carefully to understand how we will use your personal information. If you have any questions or queries in relation to this privacy notice, you can contact our Data Protection Officer at: datacontroller@clwydalyn.co.uk 72 Ffordd William Morgan, St Asaph Business Park, St Asaph, Denbighshire, LL17 0JD 0800 1835757 (freephone from a landline) or 01745 536800 This privacy notice explains: What information we may collect about you How we use your information Contacting you Sharing your information Our legal basis for collecting, holding and using your information Security and storage of your information Your rights 1.What information we may collect about you The information we collect about you depends on why we are dealing with you. For example, if you make a housing application or become one of our tenants, we will need more information from you than if you are merely making an enquiry. We may collect the information about you in the following circumstances: If you call our Contact Centre When you call our contact centre we collect Calling Line Identification (CLI) information. We use this information to help improve its efficiency and effectiveness. We record calls for training and monitoring purposes. Additionally, our call handlers will make a record of your call in order to manage your query. We may need to share information with other organisations within or outside ClwydAlyn in order to respond to your call, for example so that we can organise maintenance or repairs or other support. We will usually tell you if it is necessary for us to pass information on to other organisations. If you email us Any email sent to us, including any attachments, may be monitored and used by us for reasons of security and for monitoring compliance with office policy. Email monitoring or blocking software may also be used. Please be aware that you have a responsibility to ensure that any email you send to us is within the bounds of the law. If you make a complaint to us When we receive a complaint from a person we make up a file containing the details of the complaint. This normally contains the identity of the complainant and any other individuals involved in the complaint. We will only use the personal information we collect to process the complaint and to check on the level of service we provide. If a complainant doesn’t want information identifying him or her to be disclosed to any person that the complaint is about, we will try to respect that. However, it may not be possible to handle a complaint on an anonymous basis. Similarly, where enquiries are submitted to us we will only use the information supplied to us to deal with the enquiry and any subsequent issues and to check on the level of service we provide. If you use our services We hold the details of the people who request and use our services so that we can provide these services and for other closely related purposes. For example, we use information about our service users to develop and improve our services and to make sure we are delivering services to different groups fairly. If you apply for housing or become a tenant, there is certain information that we require in order to process your application and manage your tenancy. If you do not provide us with this information, we will not be able to progress your application. When you visit our websites We automatically collect certain information when you visit one of our websites. Please see Use of Cookies below for more information about this. When you use our customer portal, you are able to view information held in our housing management system, including personal details, account statements, tenancy information, repair history and pay your rent / service charges. Please note that we use a third party provider, Verseone to support our customer portal. Information we receive from others We work closely with other organisations, such as local councils, police forces, voluntary sector organisations, other housing providers and our contractors, and we may receive information about you from them. If you visit our premises We may ask you to sign in and out if you visit staff or residents at our premises. Access is controlled for the purposes of building and occupant security. Access is recorded to assist with fire and other evacuation procedures. Furthermore, your image may be captured on CCTV to monitor and collect visual images for the purpose of security and the prevention and detection of crime. If you use our Wi-Fi or computer to access our IT systems, access and activity may be monitored to prevent misuse of Group property, according to our IS Corporate policies. Job applicants When individuals apply to work for us, we will only use the information they supply to us to process their application and to monitor recruitment statistics. Where we want to disclose information to a third party, for example where we want to take up a reference or obtain a ‘disclosure’ from the Criminal Records Bureau we will not do so without informing them beforehand unless the disclosure is required by law. Personal information about unsuccessful candidates will be held for 12 months after the recruitment exercise has been completed; it will then be destroyed or deleted. We retain de-personalised statistical information about applicants to help inform our recruitment activities, but no individuals are identifiable from that data. Once a person has taken up employment with us, we will compile a file relating to their employment. The information contained in this will be kept secure and will only be used for purposes directly relevant to that person’s employment. Once their employment with us has ended, we will retain the file in accordance with the requirements of our retention schedule and then delete it. If you are a member of one of our Boards, Committees or Panels We may ask for personal details for managing and statistical purposes. 2.How we use your information We process your personal information primarily in connection with managing our housing services. If you are a tenant, this includes managing your tenancy and dealing with any applications, queries or complaints that you make. Examples of how we use your information include: to confirm your identity to assess your suitability to access any of our services to manage your tenancy, care or support to ensure our properties are appropriately maintained and in accordance with legal obligations, such as periodic gas safety checks to notify you about important changes to our services to let you know about other relevant services, both ours and those of other parties whose products and services we have agreed should be made available to you (see the section below on 'Contacting you' for more information about this) to update and correct our records to carry out statistical and market analyses, including benchmarking exercises, to enable us to understand you better and improve our services, and in accordance with our operating Regulations to develop, test and improve our systems to ensure that content of our website is presented in the most effective manner for you and for your computer to administer our website and for internal operations, including troubleshooting, data analysis, testing, research, statistical and survey purposes to comply with other legal obligations, such as Health and Safety laws or safeguarding vulnerable people We may combine information we receive from other sources with information you give to us for the purposes set out above (depending on the types of information we receive). 3.Contacting you We will use your contact information to send you important information via letters, emails, text messages, or otherwise to telephone you. We may record telephone calls for security and training purposes. We may use the information we hold about you in order to provide you with information about our services which we feel may interest you. You can opt out of receiving marketing communications at any time, although please note that we will continue to send you important messages about your tenancy. If you have changed your mind about being contacted for marketing purposes, please contact our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800 to update your preferences. 4.Sharing your information We do not sell your information to any third party, but in certain limited circumstances we may disclose your personal information to: any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 736 of the UK Companies Act 1985; and/or other third parties in the following circumstances: if we are under a duty to disclose or share your personal data in order to comply with any legal obligation; in order to enforce or apply our terms and conditions and other agreements; to protect the rights, property, or safety of ClwydAlyn, our customers, or others; to investigate or prevent a crime. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction; to obtain any professional advice; and/or with your consent. 5.Our legal basis for collecting, holding and using your information Data protection law sets out various lawful legal bases (or ‘conditions’) which allow us to collect, hold and use your personal information: Where you have entered into a contract or contracts with us, we may need to use your information to provide you with our services. An example of this is where you have a tenancy with us. Where we are under a legal obligation which requires us to process your personal information. For example, notifications of Health and Safety incidents. We will sometimes use your personal information based upon your consent. We will always tell you where this is the case and ask you to agree before we process your information. An example of using your personal information with your consent is publishing your image as part of a photograph on our website. Finally, sometimes it is necessary to process your personal information for the purposes of our own legitimate interests. We will only do so where these interests are not overridden by the interests and fundamental rights or the freedoms of the individuals concerned. An example of this is when we may contact you about your experience of contacting our Customer Services Team or a recent repair to your property. Data protection law recognises certain "special categories" of personal information, which is information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information for uniquely identifying a person, information concerning health, and information concerning a person's sex life or sexual orientation. Information about criminal offences and records is placed in a similar category. These special categories of personal information are considered particularly sensitive and so we will only collect and use this information where you have given us your explicit consent or where we consider it necessary to do so. 6.Security and storage of your personal information The information about you that we collect may be transferred to, and stored at, a destination outside the European Economic Area (EEA). It may also be processed by staff operating outside the EEA who work for one of our suppliers. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. We will generally keep personal information about you no longer than is needed for as per our Retention Policy. 7.Your rights You have the right to request from us access to your own personal information. This is sometimes known as a 'subject access request'. You also have the right to ask us not to process your personal data for direct marketing purposes. We will tell you if we intend to use your data for this purpose or if we intend to disclose your information to any third party for this purpose. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data or by contacting our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800. From 25 May 2018, you will have additional rights to request from us: That any inaccurate information we hold about you is corrected That your information is deleted That we stop using your personal information for certain purposes That your information is provided to you in a portable format That decisions about you are not made by wholly automated means Many of the rights listed above are limited to certain defined circumstances and we may not be able to comply with your request. We will tell you if this is the case. If you choose to make a request to us, we will aim to respond to you within one month. We will not charge a fee for dealing with your request.

Moderntronics

moderntronics

Harrow,

In these terms and conditions (“Conditions”) the following expressions shall have the following meanings: “Business Day” means any day other than Saturday, Sunday or a public holiday. “Business Hours” means the hours detailed in Condition 32 below. “Contact Hours” means Monday to Friday (inclusive) from 07:00 hours to 17:00 hours but excluding bank holidays. “Contract” means any contract between MT and the Customer for the supply of Hardware and/or Software (with the associated Licence) and/or services which is subject to these Conditions. “Customer” means any person, firm or company who enters into a Contract with MT to which these Conditions apply. “Force Majeure” means any event outside the reasonable control of either Party affecting its ability to perform any of its obligations (other than as to payment) under these Conditions. “Goods” means all or any tangible or intangible goods or intellectual property including but not limited to Hardware and Software which are provided to a Customer in accordance with these Conditions. “Hardware” means any hardware provided by MT to the Customer. “MT” means MODERNTRONICS Ltd. or its servants and agents as the case may be. “Insolvency Event” means any one of the following in relation to the Customer: (i) a notice being issued to propose a resolution for winding up or dissolution, or such a resolution being passed; (ii) a petition for a winding up or an administration or bankruptcy order being presented, or such an order made; (iii)any steps being taken with a view to a voluntary arrangement or other assignment, composition or arrangement with all or any creditors or any moratorium, readjustment, rescheduling, forgiveness or deferral of all or any indebtedness; (iv) suspension of payments to all or any creditors and/or ceasing business; (v)an encumbrancer taking possession of all or any assets; (vi) an administrator or receiver being appointed over the Customer or all or any of its assets; (vii)any action anywhere similar or analogous to any of the foregoing; or MT reasonably believing that any of the foregoing is imminent. “Licence” has the meaning attributed to it in Condition 23 below. “Minimum Term” means the term set out in Condition 17 below. “Party” means MT or the Customer and “Parties” means both of them. “Response Time” means two Working Hours from an initial call to the hotline under Condition 26 or 28 below. “Seminar” means any seminar provided by MT. “Service Operator” has the meaning given to that term in Condition 28 below. “Site” means https://www.moderntronics.com and all subdomains including (but without limitation) “Software” means software or software updates or upgrades provided by MT and licensed to the Customer under Condition 23 below. “Training Sessions” means any training session provided by MT. “Working Hours” means the hours between 9:00 to 17:00 on any Business Day 2. Interpretation In these Conditions, the following rules apply: A person includes a natural person, corporate or unincorporated body (whether or not having separate legal personality). A reference to a Party includes its personal representatives, successors or permitted assigns. A reference to a statute or statutory provision is a reference to such statute or provision as amended or re-enacted. A reference to a statute or statutory provision includes any subordinate legislation made under that statute or statutory provision, as amended or re-enacted. Any phrase introduced by the terms including, include, in particular or any similar expression shall be construed as illustrative and shall not limit the sense of the words preceding those terms. A reference to writing or written includes faxes and e-mails. 3. General Information These Conditions apply when MT: sells and delivers Hardware; sells and delivers Licences; sells and delivers Software; or provides repairs or any other services to the Customer. They will also apply to other business transactions unless MT agrees that alternative special conditions apply. These Conditions apply to the exclusion of any other conditions that may be proposed by a Customer or implied by law (insofar as such exclusion is lawful). Part II Specific Provisions for the Use of the Online Shop Customers purchasing Goods from the Site, must read all Parts of these Conditions, which apply to them in full. 4. Consumers The Goods and services provided by MT are designed only for sale to and use by businesses in the course of their business activities. MT does not knowingly sell to any person dealing as a consumer or supply anything for personal use. 5. Customer’s Status By placing an order on the Site, the Customer warrants that he or she is: legally capable of entering into binding contracts and, where the Customer is an individual, that he or she is at least 18 years old; and is dealing in a business capacity and purchasing Goods and/or services for the purpose of his business and not for personal use. Part III General Conditions for the Provision of Goods and Services 6. Formation of Contract Quotations provided by MT to the Customer are not binding on MT. The Customer’s order constitutes an offer to MT to buy the Goods or services. All orders are subject to acceptance by MT. The offer will be deemed accepted, and a Contract formed, when MT sends the Customer confirmation that the Goods have been dispatched (“Dispatch Confirmation”) or, in the absence of a Dispatch Confirmation, when the Goods are delivered. The Contract will only relate to those Goods whose dispatch is confirmed to the Customer by a Dispatch Confirmation or if no Dispatch Confirmation is sent, those Goods which are actually dispatched. MT is not obliged to supply any Goods which may have been part of the Customer’s order until the dispatch of such Goods has been confirmed in a separate Dispatch Confirmation. Subject to Condition 17 below, an order for services will be deemed to have been accepted, and a Contract formed, when MT sends the Customer confirmation that the services ordered will be provided (“Service Confirmation”) or, in the absence of a Service Confirmation, when the services begin to be provided. Oral representations will only be binding upon MT if they are expressly confirmed in writing by MT to the Customer. 7. Price Unless MT expressly specifies prices to the Customer, MT’s current list of prices applicable at the time of the acknowledgement of order will apply. Unless otherwise agreed in writing, all prices are exclusive of value added tax, postage, freight, insurance, forwarding fees, installation and commissioning, travelling expenses and subsistence, which will be added as appropriate. MT will charge overtime for work outside of their normal Business Hours at up to 150% of the hourly rate from time to time applicable during Business Hours. Subject to Condition 16 below, prices are liable to change at any time, but changes will not affect orders in respect of which MT has already sent the Customer a Dispatch Confirmation or a Service Confirmation as the case may be. The Site contains a large number of products and it is always possible that, despite MT’s efforts, some of the products listed may be incorrectly priced. MT will normally verify prices as part of dispatch procedures so that, where a product’s correct price is less than our stated price, MT will charge the lower amount when dispatching the product to you. If a product’s correct price is higher than the price stated on our site, MT will normally, at our discretion, either contact you for instructions before dispatching the product, or reject your order and notify you of such rejection. MT is under no obligation to provide any Goods or services to the Customer at an incorrect (lower) price, even after MT has sent a Dispatch Confirmation or a Service Confirmation in relation to those Goods or services if such incorrect price could reasonably have been expected to be recognised by the Customer as an error. 8. Delivery and Availability The Customer’s order for Goods will be fulfilled by the delivery date in the Dispatch Confirmation or, if no delivery date is specified, then within 30 days of the date the Customer made his order (where such an order leads to a Contract). The period for delivery or performance of the Contract will normally commence on MT’s acknowledgement of the order. However, if the Customer is required to do anything before MT can effect delivery, MT will, as soon as practicable, notify the Customer accordingly. The time within which MT must deliver any Goods will run from the date on which MT receives notice from the Customer that it has duly complied with such notification from MT. Unless otherwise agreed in writing, any periods mentioned in the acknowledgement of order for services and Software development are based on a preliminary estimate of the required workload and therefore are approximate only. Time of delivery and performance is not of the essence. If MT fails to meet any delivery or performance dates set out in the acknowledgement of order and is solely responsible for such failure, the Customer may terminate the Contract but only after MT has been given an opportunity to rectify the situation and subsequently fails to meet the revised set of delivery or performance dates provided by MT to the Customer in writing. Unless MT has been deliberately or grossly negligent, all further claims of the Customer on the basis of the delay in performance are excluded. If MT cannot deliver or perform its obligations under the Contract due to Force Majeure or a failure of the Customer to cooperate or any other act, default or omission of the Customer, then MT will be entitled to perform its obligations under the Contract once the issue has been resolved, provided the issue occurred while MT was still allowed to deliver or perform and MT shall have no liability whatsoever for any delay or its failure to perform its obligations. 9. Agreed Performance Unless specified otherwise in writing, the agreed performance in respect of any repairs provided by MT, at the Customer’s request will be to adjust the relevant unit(s) to MT’s applicable standard specifications for that unit. Where the relevant unit(s) cannot be repaired to MT’s applicable standard specification due to the Customer limiting the repairs required or the time and money to be invested MT may exceed the Customer’s request if MT considers, at its sole discretion, that such additional repairs are reasonable and will ensure the proper functionality of the unit in question. The agreed performance levels for MT’s maintenance and care services are as set out in Conditions 26 and 28 below; for all other services the agreed performance levels will be as set out in the acknowledgement of order. 10. Refunds Where the Customer returns Goods (at the Customer’s cost) because he or she claims that the Goods are defective, MT will examine the returned Goods and will notify the Customer of its findings within a reasonable period of time. If MT (in its sole discretion) deems that the Goods are defective, MT may at its option repair, replace or provide a refund in respect of such defective Goods. MT will process any repair, replacement or refund as soon as practicable and, in the case of any refund, within 30 days of the day MT confirmed to the Customer that the Customer was entitled to the same. Such refunds will be made in full, including a refund of any delivery charges for sending the item to the Customer. 11. Import Duty If the Customer orders Goods for delivery outside the UK, they may be subject to import duties and taxes which are levied when the delivery reaches the specified destination. The Customer will be responsible for payment of any such import duties and taxes. Please note that MT has no control over these charges and cannot predict their amount. Customers should contact their local customs office for further information before placing an order. Customers must comply with all applicable laws and regulations of the country for which the Goods are destined. The Customer will indemnify and keep indemnified MT in respect of all costs, proceedings, losses and liabilities resulting from any breach by the Customer of any such laws. 12. Retention of Title to Property The Goods will be at the Customer’s risk from the time of delivery. Property in and title to all Goods will remain with MT until MT has received payment for the full price of all the Goods (and/or all other goods and/or services supplied by MT to the Customer under any other contract whatsoever).. The Customer may sell or use Goods in which title is retained during the course of their normal business, but may not give such Goods by way of pledge or pledge these Goods as security. Until the property in and title to the Goods passes to the Customer: the Customer shall keep the Goods properly stored, protected and insured and separate from all or any other goods whether belonging to MT, the Customer or any third party; MT shall be entitled at any time forthwith to revoke the Customer’s power to deal with the Goods; and such power shall automatically cease if an Insolvency Event shall occur in respect of the Customer; and the Customer shall not make any modification to the Goods, the Software or their packaging or alter, remove or tamper with any marks, numbers or other means of identification used on or in relation to the Goods. Upon termination of the Customer’s power to deal with the Goods, the Customer shall place the Goods at the disposal of MT and MT are hereby irrevocably authorised without the need for consent of any third party but using only such force as may be necessary, to enter upon any premises of the Customer or any third party for the purpose of removing the Goods. If third parties claim title to Goods with retained title, the Customer will inform MT without delay, will notify the person making the claim of MT’s title and will support MT in enforcing its rights, including taking all the necessary steps required to preserve MT’s rights, including commencing litigation at the Customer’s own expense. If the Customer breaches the Contract, e. g. by delaying payment, the Customer will be obliged to return the Goods with retained title if requested by MT, in return for which MT will not terminate the Contract. 13. Payment Where services, maintenance or care are provided on an ongoing basis, MT will invoice the Customer for these at the beginning of the billing period or as soon as reasonably practicable thereafter. The Customer will pay MT’s invoices in full within 30 days from the date of the relevant invoice. Depending on the scope of an order, payments for such services, maintenance or care are due either upon placement of the order by the Customer or upon partial delivery of the same of between 40 to 50% of their respective order value. BACS or cheque are the only methods of payment accepted. Invoices for Seminars and Training Sessions will be issued at the beginning of the respective session and payment is due immediately and without deduction. 14. Delay of Payment Where a Customer fails to pay an invoice by the due date, MT will be entitled to charge the Customer interest on all monies outstanding from the due date until the actual date of payment (both before and after judgment) at a rate of 8% above the base rate of the Bank of England calculated on a daily basis. 15. Setting-Off and Refusal of Payment The Customer cannot exercise any right of set-off in respect of amounts owed to or by MT. 16. Change of Pricing by MT for Ongoing Maintenance or Care MT may increase its prices for maintenance and services by giving the Customer written notice 2 months prior to the end of the Minimum Term. The Customer has 4 weeks from the date of receipt of the written notice from MT to object to the change. Where the Customer so objects, the Customer will be entitled to give notice to MT to terminate the Contract as of the date of the proposed price increase. 17. Automatic Extension of Contract Where services, maintenance or care are performed on an ongoing basis the Contract will come into effect upon acceptance by MT of the first order from the Customer for Software maintenance. The Contract will initially run until the date specified at “Minimum Service Duration” as set out in the “MT Service Product List” or until the expiry date where an expiry date is stipulated in the Contract (“Minimum Term”). Subject to one of the Parties serving written notice of termination on the other at least three months prior to the expiry of the Minimum Term, the Contract will be extended automatically. In the case of Software Licences supplied without a time limit, the Contract will extend until December 31st of the current year. The subsequent extension periods will begin on January 1st and end on December 31st of the respective year. In the case of Software Licences supplied with limited validity (e.g. a licence for 1-year) the extension is based on the terms and conditions set out in the description of the respective licence (e.g. extension by one further year). Unless otherwise agreed in writing, any extension to a Contract will be on the basis of MT’s current price list as at the date of such extension. 18. Delivery Obligations and Shipping The conditions for EXW (ex works) (MT’s premises or such other place referred to in the relevant order) as set out in the Incoterms 2010 apply to delivery of any Goods. Claims for any transport damages and any replacement of damaged Goods, remain with the Customer who is responsible for adhering to the mode and period for the filing of any claims with carriers, shippers and insurers. 19. Scope of Warranty (Material Deficiencies and Deficiencies in Title) MT warrants that the Hardware is free from defects in workmanship and material as at the time of transfer of risk; and warrants that the Software does not contain any flaws which void or substantially reduce its value or suitability for the usual or contracted purpose. Where MT is not the author of the Software, MT does not warrant that such Software will run without interruptions or errors, nor that MT will be capable of resolving all Software errors, nor that the Customer will be capable of achieving all of the functions included in the Software in all of the combinations chosen by the Customer, nor that these will meet the Customer’s requirements. MT will only warrant the quality and/or durability of Goods if it has expressly agreed in writing with the Customer that it will do so. The warranty period is 1 year. Where MT is the author of the Software such Software is subject to MT’s standard warranty. 20. Obligation to Inspect and Serve Notice of Defects The Customer must inspect the Goods upon delivery or repair and must notify MT in writing of any failure by MT to meet the specification within 7 days of delivery or repair or (where the failure was not apparent on reasonable inspection) within a reasonable time being no more than 1 month after discovery of the failure. Where the Customer fails to provide such notice MT will have no liability under its warranty. 21. Liability Subject only to Condition 21 d), MT shall not be liable to the Customer in contract, tort (including without limitation negligence) and/or breach of statutory duty for any loss or damage which the Customer may suffer by reason of any act, omission, neglect or default (including negligence) in the performance of the Contract by MT, its servants or agents, in a sum which is greater than GBP 200,000 per incident or series of connected incidents. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect loss of any kind resulting from these Conditions, its performance or any breach of its terms. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect economic loss of any kind including (but without limitation) loss of business opportunity, reputation, goodwill resulting from these Conditions, its performance or any breach of its conditions. Notwithstanding any other provision herein, nothing in these Conditions shall operate so as to limit or exclude MT’s non-excludable liability in respect of death or personal injury caused by the negligence of MT to exclude the application of Section 12 of the Sale of Goods Act 1979 and to exclude liability for fraudulent misrepresentation. MT’s liability for loss of data is limited to the effort required to restore the data from proper backups provided by the Customer. 22. Third Party Rights If any third party claims or takes action against the Customer, because Goods delivered by MT, or their use in accordance with the instructions provided by MT, purportedly violate their commercial rights or proprietary rights, then the Customer will inform MT of the same. MT agrees that they will assist the Customer in defending such claims. Where the claim is made to the Customer within 12 months of the date of delivery, MT will indemnify the Customer against claims provided that the Customer: appoints MT to defend the claims or to settle the dispute, and promptly notifies MT of any such claim, keeps the Customer informed of all information received and provides such reasonable assistance to MT as it shall reasonably require, does not defend the action itself without coordinating such defence with MT, and does not at any time admit liability or otherwise settle or compromise or attempt to settle or compromise the said claim or action except upon the express instruction of MT, the alleged breach of rights is not based on alteration of the delivered item used by the Customer, and does not use the item delivered by MT in conjunction with other items and/or in a fashion that breaches any such rights, in a situation where the use of the item as delivered by MT would not have breached the rights of the person who has filed the claim. MT may at any time and at its own expense acquire on behalf of the Customer the right to continue to use the Goods, to replace the Goods or alter them in such a fashion that the rights of others are no longer breached. If this is not possible, the Customer shall return or destroy the Goods if required to do so by MT who will reimburse the purchasing price for the Goods less depreciation. If the Customer refuses to do so, MT will no longer defend the claim or provide the Customer with any further support. The Customer has no further rights in case of disputes over proprietary rights with third parties and MT shall have no liability therefore unless MT could be blamed for acting deliberately or with gross negligence. Part IV Special Conditions for Delivery of Software 23. Conditions of Use for Delivered Software In the case of delivery of Software to the Customer, MT hereby grants the Customer a simple, non exclusive and non-transferable, licence to use the Software (“Licence”) . The validity of the Licence is not time limited, unless otherwise specified to the contrary in the terms and conditions of the Licence. MT, grants the Customer the use of such Software in the form of the object code and the user documentation with the use being restricted to one electronic data processing system at any one time and only for the tasks for which it is intended. Unless permitted by law, the Customer will not decompile the Software or perform reverse engineering. The Customer may duplicate the Software but only to the extent that this is required for the permitted use, and in order to allow it to perform data backup. Upon delivery of any Software, including updates and upgrades, the Customer will immediately produce a backup copy. MT may terminate the Licence granted to the Customer pursuant to this Condition 23 with immediate effect if the Customer is in breach of the conditions for the use of the Software for a period of 30 days from the date of a written notice of such a breach from MT or any third party. On termination of this Contract howsoever arising, the Customer will return to MT within 30 days all Software together with any related materials owned and licensed by MT and shall delete all copies and partial copies of the Software however stored within 7 days of service of the notice. Proof of such deletion must be provided to MT without delay. On receipt of prior written consent from MT, the Customer may retain a copy of the Software for the purposes of archiving. 24. Delivery of Software MT will only install the Software if this has been expressly agreed in writing between the Customer and MT. MT is able to provide telephone consultancy and support concerning questions relating to the application of the respective Software products as well as the solution of problems that may occur as provided for in Condition 26 below. 25. Prerequisites for Running the Delivered Software The proper running of Software systems supplied will only be guaranteed if the Hardware and operating system components used correspond to the reference systems of the respective manufacturer(s), as well as having been approved and certified. Unless otherwise agreed in the Contract, the Customer shall ensure that the provisions in this Condition 25 are complied with. Part VMaintenance and Care Application Software 26. Scope of Performance of MT Services for Application Software For the Software products, unless otherwise expressly agreed in writing, MT will provide the following services, denoted by Service Level “SW-Service STANDARD” and Service Level “SW-Service E-STANDARD”: Right to use Software and documentation updates: MT grants the Customer a non-transferable, non-exclusive Licence to use the Software and any documentation or updates. The right of use is not limited in validity, unless otherwise specified in the terms and conditions of the Licence. Software and documentation updates: MT will supply the Customer with the current version of the Software as specified in the Contract. This will be done as specified by the manufacturer of the Software. The documentation will be supplied in the form determined by the manufacturer of the Software. The installation of Software updates will be performed by suitably qualified personnel of the Customer. Alternatively for an additional charge, MT may install the Software updates on behalf of the Customer. Where the Customer has adapted the Software, the Customer will be liable for the additional cost of performing the same adaptation to the new version of the Software or alternatively the Customer may perform the necessary adaptation himself. Hotline (Service Level “SW-Service STANDARD” only) MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. E-mail Hotline (Service Level “SW-Service E-STANDARD” only) MT is able to provide e-mail consultancy and support in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours Wherever possible, qualified consultancy will be provided by MT within the Response Time. MT Hotline: E-mail: hotline@MT.com Internet: http://www.MT.com/customersupport Software error messages Where Software problems occur which MT is unable, for whatever reason, to resolve, the Customer may send a written error message to MT. The purpose of such an error message is to identify the error in the Software and enable the manufacturer to resolve the error. MT shall liaise with the manufacturer(s) of the Software products to resolve any Software errors as promptly as possible. Restoration of any data, regardless of the cause of the data loss, is not the responsibility of MT. 27. Obligation of the Customer to Co-operate Pre-conditions for the provision of the services by MT to the Customer are that the Customer has legally acquired the Software and holds a corresponding Licence to use it. In addition, the Software must be in the same condition that it was in when it was delivered. The services exclusively relate to the current release and delivered version of the Software. If earlier Software versions are used, a one-time update service which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Services will not be performed for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). If the operating system for the Hardware is not included in the Contract, the Customer must update the operating system to the most recent version (e. g. by purchasing updates) if this is required in order to use the new versions of the application Software. Hardware and Operating Systems 28. Scope of Performance of MT Maintenance and Care Services for Hardware and Operating System For Hardware products and the operating system, unless otherwise agreed in writing, MT will provide the following services, denoted by Service Level “HW-Service SPECIAL”: The scope of performance is briefly set out in the “Special Description” for each product listed in the attached “MT Service Product List”. The exact scope of performance will be determined in accordance with the attached description of performance issued by the respective MT service operator (“Service Operator” including but not limited to Hewlett-Packard, Fujitsu Siemens and Silicon Graphics). The following shall also apply: Hotline MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Hardware products and operating system, as well as the resolution, (in so far as it is reasonably practicable to do so) of any problems which may occur. This service will be performed by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. Where queries arise outside of the Contact Hours, the Customer should address such queries directly to MT’s Service Operator Response time for Hardware failures MT will use reasonable endeavours to solve a query within the Response Time. The Response Time shall be deemed to have been initiated either as soon as the customer service personnel arrives on the relevant site, or as soon as remote diagnosis is started, where either is required to resolve the problem. The appropriate Response Time will be determined in accordance with the attached description of performance issued by the respective MT Service Operator. 29. Services Not Included Unless otherwise agreed in writing, the following services will not be provided by MT to the Customer: a) Repair/re-acquisition of devices that have been damaged as a result of: incidents of war of any type civil wars, nuclear energy, deliberate action of the Customer (not of his subcontractors) b) Repair/re-acquisition that is required because of repair work or alterations of devices carried out by the Customer or any third party without the prior written consent of MT. c) Work required due to interface problems between MT’s devices and those of other manufacturers and suppliers. d) Customer service which is required because a product that is not covered under this Contract has caused an error. e) Customer service that has become necessary because devices have been used under adverse conditions (e.g. including contaminations and deviations from recommended room temperature and relative humidity) or in conjunction with accessories or (device-specific) consumables (e.g. including foreign disks, disk stacks, cassettes, printer paper and print heads of any type) (“Device Specific Consumables”) which do not meet the manufacturer’s specifications. f) Replacement of Device-Specific Consumables. g) Data backup. h) Calibration work that is not related to repair. 30. Restoration of Data/Programs The restoration of data and programs upon repair or replacement of a defective hard disk is limited to starting the copying program (Restore) used to restore the last full data backup. 31. Obligation of the Customer to Cooperate a) Hardware service Pre-conditions for the provision of Hardware services by MT are that the Hardware has been acquired legally and has been installed properly at the Customer’s site. In addition the Hardware affected must correspond to the current revision and be in proper condition when including in the Contract. These pre-conditions shall be met immediately after the expiry of the warranty period specified in the Contract. If the Hardware is included in the Contract at a later date, these pre-conditions must first be confirmed by a takeover inspection of the Hardware by MT, which will be independently invoiced and paid for by the Customer, and if required the pre-conditions will be achieved by MT undertaking the required repair work. b) Operating System Service Pre-conditions for the provision of operating system services are that the Customer has legally acquired the Software and has been granted the necessary corresponding Licence to use it. In addition the Software must be in the same condition as when it was delivered to the Customer. The services exclusively relate to the current release and version of the Software. If earlier Software versions are used, a one-time “Update Service” which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Operating System services will not be provided for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). Part VI Generally Applicable Conditions 32. Prices and Fees for Special Services The following items are not included in the payment for services under Conditions 26 and 28 above and will be invoiced separately in accordance with MT’s current price list: Services performed outside Working Hours on the express request of the Customer. Services to correct errors caused negligently by the Customer or by any unauthorised third party as a result of improper treatment, unsuitable operating media, unauthorised manipulations, Software manipulations, non-adherence to operating conditions or otherwise. ices required due to faulty handling, excessive vibration, chemical influence, excessive dust burden or non-adherence to the properties set forth in the unit specifications. Unreasonable wait times and delays in the performance of services which are caused by the Customer. Services to remedy failures caused by Force Majeure. 33. Backup of Customer Data Prior to the commencement of any service work undertaken by MT, the Customer will backup all data in such a way that it may easily be restored by MT in the event that it is lost in the service process. 34. Change of Installation/Application Site Where maintenance and care services are provided on an ongoing basis by MT, the Customer will immediately inform MT in writing of any change to the installation or application address. If such a change results in an increase in MT’s expenses. MT reserves the right to either increase the prices charged to recover the additional expense incurred or alternatively MT may serve notice on the Customer to terminate the Contract where the new address is outside United Kingdom. 35. Miscellaneous Service Conditions and Obligations of the Customer to Co-operate MT may appoint authorised third parties to provide services. The Customer may only transfer title to services to third parties with the prior written consent of MT. Where defective components or devices are replaced by MT, these will become the property of MT. Extension of the products included in the maintenance agreement may be included in this Contract with the consent of the Customer. On request, MT will offer to the Customer a corresponding extension of the Contract, provided maintenance for the respective product is available. Where MT has to perform any services, the Customer shall accurately and without delay provide MT with any/all information that is required to perform such services. The Customer will provide MT with the name of a competent and appropriately qualified contact person and will provide the name of an appropriate substitute in order for the Hardware and Software to be maintained. Any contact(s) will have participated in the respective Seminars and/or Training Sessions held from time to time by MT or alternatively will have acquired comparable knowledge. These contacts will be available to MT’s technicians on site or will have access to the MT’s hotline as applicable. Consumables and Auxiliaries (which shall include documentation, application programs, data, telephone lines for transmission of voice and data) are not included in the scope of performance and shall be provided by the Customer in the vicinity of the system, such consumables and auxiliaries will be provided during Working Hours or, with prior consultation, outside of these hours. Additionally, the Customer will provide to MT computing time and consumables as required. 36. Specifically Ordered Service Days If service days are ordered for call-off within a specified period, such orders are binding. The services will become due for payment once they have been performed or by the end of the defined time period at the latest. Specifically ordered service days to be called off within a defined time period, can still be called off during a time of three months beyond the expiry of such defined time period. Thereafter they are lost. The claim to payment is thereby unaffected. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

Courses matching "Retention"

Show all 679

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online
£2,380

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395

55354 Administering Office 365

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - Planning and Provisioning Office 365 Overview of Office 365 Core Services of Office 365 Requirements for an Office 365 Tenant Planning a Pilot and Deployment Creating an Office 365 Tenant Adding Custom Domains and Managing DNS Settings Lab: Provisioning Office 365 2 - Managing Users and Groups in Office 365 Managing User Accounts and Licences Managing Passwords and Authentication Create and Managing the Different Types of Groups in Office 365 Managing Users and Groups with PowerShell Managing Users and Groups in the Azure AD Admin Center Role Based Access and Administrative Roles Planning and Configuring Directory Synchronization Lab: Managing Users and Groups in Office 365 Lab: Planning and Configuring Directory Synchronisation 3 - Deploying and Configuring Tools and Applications for Office 365 Planning Network Configuration for Office 365 Tools and Applications Using the Office Configuration Tool Click to Run Installation Use and Control Managing Centralized Deployment of Tools, Applications and Add-ins Reporting Lab: Deploying and Configuring Tools and Applications for Office 365 4 - Planning and Managing Exchange Online What is Exchange Online Managing Exchange Online Mailboxes Managing Office 365 Groups in Exchange Online Configuring Exchange Online Permissions Managing Exchange Online using PowerShell Plan and Configure Mail Flow Plan and Configure Email Protection Lab: Planning and Managing Exchange Online 5 - Planning and Managing SharePoint Online What is SharePoint Online Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups SharePoint Online Architecture Configure SharePoint Online Configure and Control External Sharing Managing SharePoint Online Site Collections Managing SharePoint Online using PowerShell Lab: Planning and Managing SharePoint Online 6 - Planning and Managing Microsoft Teams What is Microsoft Teams How Microsoft Teams integrates with other Office 365 Services Create and Manage Organization Wide Settings Create, Manage and Assign Microsoft Teams Policies Plan and Configure External and Guest Access Managing Microsoft Teams using PowerShell Lab: Planning and Managing Microsoft Teams 7 - Planning and Managing Other Office 365 Services Yammer Planner Visio Bookings Delve Forms Power Platform Stream Sway Viva Scheduler Add-ins, including Find Time and Junk Reporter Lab: Planning and Managing Office 365 Services 8 - Security and Compliance in Office 365 Overview of Security and Compliance Features in Office 365 Extending Security and compliance Features with Additional Licences Using the Microsoft Defender Portal and Secure Score Using the Office 365 Compliance Portal and Compliance Score Plan and Configure Retention Labels and Policies Plan and Configure Data Loss Prevention Policies Create and Assign Sensitivity Labels Configure Safe Attachments and Safe Links Policies Plan and Configure Multi Factor Authentication Lab: Configure Security and Compliance in Office 365 9 - Reporting, Monitoring and Troubleshooting Office 365 Monitoring Office 365 Service Health Troubleshooting Administrative Access in Office 365 Troubleshoot Directory Synchronization Troubleshooting Exchange Online Troubleshooting SharePoint Online Troubleshooting Microsoft Teams Troubleshooting Office 365 Security and Compliance Lab: Reporting, Monitoring and Troubleshooting in Office 365

55354 Administering Office 365
Delivered Online
£2,975

Staff Retention Workshop - Part 1 & 2

By The Development People

This 2 x 2.5 hour workshop is for healthcare managers & leaders that want to explore staff retention, how it is effecting their organisation, and consider what they can do to improve.

Staff Retention Workshop - Part 1 & 2
Delivered OnlineFlexible Dates
£119 to £214.20

Building your Team: Recruitment and Retention Techniques for your toolbox

5.0(1)

By Let’s Do Business Group

Join the free Building Your Business webinar on 11 December 2024 designed specifically for construction professionals in Essex to help you attract top candidates and team members, and improve your employee retention to help your business grow.

Building your Team: Recruitment and Retention Techniques for your toolbox
Delivered Online
FREE

Staff Retention Techniques

By OnlineCoursesLearning.com

Introduction: Staff retention is a growing concern, but by having a proper staff retention strategy in place you'll be able to keep your top employees. Recruiting and training a new employee is time-consuming and costs a great deal of revenue - it's much more beneficial to the business to keep current employees satisfied in their job. Understanding your employees and having proper retention strategies in place is key to retaining employees long-term. This course on staff retention will look at the four main trends that contribute to employees leaving their jobs, including compensation and benefits, career growth, flexible working schedules, and training and development, and how you can create a strategy to improve these areas and retain your employees. You Will Learn: What the main factors are that lead to employees leaving their jobs and what you can do to prevent this. How to come up with a competitive compensations and benefits plan. How to encourage career advancement and growth opportunities in your company. The benefits of flexible working, both to the employer and employee. How to implement various training and development techniques and the benefits of encouraging training in the workplace. Benefits of Taking This Course: You will learn what drives employees to leave and with this knowledge be able to implement preventative measures. You will learn how implementing employee retention programmes can help reduce unnecessary turnover costs. You will gain insight into retaining a positive and motivated body of staff. You will learn the benefits that retaining your staff can bring to your business. Your knowledge will allow you to formulate an effective retention plan that works for your employees and business. Course Modules/Lessons Module 1: Staff Retention Techniques Introduction Module 2: Compensation and Benefits Module 3: Career Advancement and Opportunities for Growth Module 4: Flexible Work Schedules Module 5: Training and Development

Staff Retention Techniques
Delivered Online On Demand
£50

Talent Management & Employee Retention Techniques

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Talent Management & Employee Retention Techniques Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Talent Management & Employee Retention Techniques Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Talent Management & Employee Retention Techniques Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Talent Management & Employee Retention Techniques Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Talent Management & Employee Retention Techniques? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Talent Management & Employee Retention Techniques there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Talent Management & Employee Retention Techniques course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Talent Management & Employee Retention Techniques does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Talent Management & Employee Retention Techniques was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Talent Management & Employee Retention Techniques is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 1: Introduction Unit 1: Welcome to the Course 00:05:00 Unit 2: Course Highlights 00:03:00 Unit 3: Quick Activity 00:02:00 Section 2: Core Concepts Unit 1: What does Talent Management Mean 00:06:00 Unit 2: Steps for Talent Management Process 00:05:00 Unit 3: Meaning of Talent Acquisition 00:06:00 Unit 4: 4 Tips to Hire the Best Employees 00:06:00 Unit 5: Training & Developing Employees + Quick Tips 00:05:00 Unit 6: Why Companies Spend Million Dollars in Training & Development 00:04:00 Unit 7: Why Employee Retention is Important for a Company 00:03:00 Unit 8: Employee Retention Techniques 00:07:00 Section 3: Best Employee Retention Strategies That Actually Work Unit 1: Why These Strategies Are So Useful 00:01:00 Unit 2: 1st Retention Strategy 00:06:00 Unit 3: 2nd Retention Strategy 00:11:00 Unit 4: Quick Activity - Here's How to Use It 00:01:00 Section 4: Employee Benefits & Retention Strategies Used by World's Top Companies Unit 1: Section Introduction 00:01:00 Unit 2: How Google Takes Care of its Employees 00:12:00 Unit 3: How Microsoft Retains it's Employees 00:06:00 Unit 4: Key Takeaway 00:04:00 Section 5: Practical Tips to Retain Employees in Your Organisation Unit 1: Offer Quick Incentives 00:03:00 Unit 2: Show Career Growth 00:02:00 Unit 3: Praising & Rewarding 00:02:00 Unit 4: Make it Convenient 00:03:00 Unit 5: Sponsor Education 00:02:00 Section 6: Bonus Section: Building a Strong Relation with Employees Unit 1: 3 Words to Retain Your Best Employees 00:03:00 Section 7: Conclusion Unit 1: Conclusion 00:01:00 Resources Resources - Talent Management & Employee Retention Techniques 00:00:00 Assignment Assignment - Talent Management & Employee Retention Techniques 00:00:00

Talent Management & Employee Retention Techniques
Delivered Online On Demand1 hour 50 minutes
£10.99

SHRM-CP/SHRM-SCP Certification Preparation

By Nexus Human

Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SHRM-CP/SHRM-SCP Certification Preparation
Delivered Online
£3,475

Employee Engagement and Retention Strategies

4.5(3)

By Studyhub UK

Imagine transforming your workplace into a thriving hub of motivated and engaged employees. 'Employee Engagement and Retention Strategies' offers a blueprint to achieving just that. This immersive course begins by laying the groundwork on the significance of employee engagement and its profound impact on organizational success. You will be guided through the nuances of fostering a motivating work environment, understanding that the heart of productivity and innovation lies in how valued and involved employees feel. As you progress, the course delves into the analytical aspect of engagement - understanding employee sentiment through surveys and data analysis. This insight is pivotal in crafting tailored engagement strategies. In the realms of leadership and team building, you will uncover techniques to inspire and manage teams for optimal engagement. The journey through this course further empowers you with the skills to support employee development and career growth, recognising that the growth of individuals fuels the advancement of the entire organisation. With a focus on recognition, rewards, and incentives, you will learn how to create a culture of appreciation and achievement, key elements in retaining top talent. Learning Outcomes Understand the essentials of employee engagement and its organisational impact. Create and maintain a motivating work environment. Effectively utilise employee engagement surveys for strategic insights. Apply leadership and management skills to boost employee engagement. Design and implement effective recognition and reward systems. Why choose this Employee Engagement and Retention Strategies course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Employee Engagement and Retention Strategies course for? HR professionals aiming to enhance engagement strategies. Team leaders and managers seeking to boost team morale. Organisational development consultants. Business owners focused on employee retention. Professionals in employee relations and personnel management. Career path Human Resources Manager - £30,000 to £50,000 Employee Engagement Specialist - £28,000 to £45,000 Organisational Development Consultant - £35,000 to £60,000 Team Leader/Manager - £32,000 to £48,000 Compensation and Benefits Manager - £33,000 to £55,000 Talent Acquisition Specialist - £27,000 to £42,000 Prerequisites This Employee Engagement and Retention Strategies does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Employee Engagement and Retention Strategies was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Employee Engagement and Its Impact Introduction to Employee Engagement and Its Impact 00:15:00 Module 02: Understanding Motivation and Creating a Motivating Work Environment Understanding Motivation and Creating a Motivating Work Environment 00:19:00 Module 03: Employee Engagement Surveys and Data Analysis Employee Engagement Surveys and Data Analysis 00:18:00 Module 04: Leadership and Management for Employee Engagement Leadership and Management for Employee Engagement 00:19:00 Module 05: Building Effective Teams for High Engagement Building Effective Teams for High Engagement 00:20:00 Module 06: Employee Development and Career Growth Employee Development and Career Growth 00:17:00 Module 07: Recognition, Rewards, and Incentives Recognition, Rewards, and Incentives 00:21:00

Employee Engagement and Retention Strategies
Delivered Online On Demand2 hours 9 minutes
£10.99