Factsheets and Online Resource

ICT

Internet and Email Access Policy
In order to protect the firm, its employees, and customers and suppliers, all members of staff should be given a copy of the firms policy regarding acceptable use of IT resources - particularly internet and e-mail access. This will form part of the contract of employment - to the extent that any breaches of the policy could result in disciplinary action, and in some cases dismissal.
 
Accounting Package Selection
Selecting the right accounting package can be difficult, particularly as there are so many options on the market. Price and functionality vary so widely as to make objective comparisons very difficult without spending a number of days on the selection process.
 
e-commerce - a Guide to Trading Online
According to the latest UK statistics, total weekly UK online retail sales currently exceed £7bn.
 
Data Security - Access
Many businesses are now completely reliant on the data stored on their Network Servers, PCs, laptops, and mobile devices. Here we look at some of the issues to consider when reviewing the security of your computer systems with respect to access controls, and to ensure compliance with Principle 7 of the Data Protection Act.
 
Data Security - Backup
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices and in the cloud. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the issues to consider when reviewing the security of your computer systems and data.
 
Data Security - Data Loss Risk Reduction
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, and mobile devices. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the issues to consider when reviewing the security of your computer systems, and how to minimise the risks of data loss.
 
Data Security - Data Protection Act
Many businesses are totally reliant on the data stored on their PCs, laptops, networks and mobile devices. Some of this data is likely to contain either personal information and/or confidential company information. Here we look at some of the key compliance issues surrounding data protection and the Data Protection Act (the Act).
 
Bring your own device (BYOD)
BYOD refers to the policy by which employees can use their own personal mobile devices (such as phones, tablets, laptops) to access company networks/systems. We consider guidelines on creating a policy.
 
Data Security - Cloud and Outsourcing
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices or in the cloud. Some of this data is likely to contain either personal information and/or confidential company information.