The Food Hygiene Regulations 2006 are considered to be the most important food safety and hygiene regulations in the UK. These regulations go one step further than the Food Safety Act 1990 as they specify that ALL food businesses have a legal obligation to make sure that food they prepare and serve to the public is safe and hygienic.
The Health and Safety (First Aid) Regulations 1981 Emergency First Aid at Work
The course covers the latest fire safety regulations and the roles and duties of employees and their responsibilities on Fire Safety. The course is designed to meet and comply with the Regulatory Reform (Fire Safety) Order 2005.
We have developed the non-licensed training to cover work for land remediation contractors working on asbestos-contaminated sites. Including: Interpretation of CAR Regulations to asbestos-contaminated land. This will include 'litter-picking' surface contamination and form contaminated soil. Site segregation, decontamination procedures and air monitoring expectations.
We have expanded our asbestos awareness courses to specifically cover the awareness of asbestos in soils, made-ground and construction and demolition materials. Essential for geotechnical engineers, plant operators, civil engineering contractors and ground workers. The content of this course is designed to provide anyone whose work could foreseeably expose them to asbestos with sufficient knowledge to avoid putting themselves or others at risk, in line with regulatory requirements laid out in Control of Asbestos Regulations 2012, and specifically for those working on land with potential asbestos-contamination.
This Emergency First Aid at Work (RQF) Level 3 Award qualification meets the requirement of the Health and Safety (First Aid) Regulations 1981, where a person is required to become a qualified ‘First Aider’ (EFAW) in their workplace.
COSHH Training Liverpool – Under the Control of Substances Hazardous to Health Regulations, 2002, every business needs a COSHH assessment, and if the business employs five or more employees, the assessment needs to be documented.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition