Employee Surveillance and the Law
|
|
- Allyson Brooks
- 3 years ago
- Views:
Transcription
1 One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace 4 November 2015 Central London Book online at
2 About the Conference Employee surveillance and monitoring is a complex and controversial area of law in which the line between what is deemed as proportionate and unacceptable can often seem blurred. With advances in technology and its increasing affordability, employers are now able to monitor and track the work and movements of their workforces in ways which were previously unavailable to them. Aside from simply enabling employers to monitor the competence of their workforce and in some scenarios, ensure their safety and wellbeing, surveillance and monitoring technology can go much further in protecting business interests and in extreme cases, revealing illegal or criminal activity taking place within the organisation. As organisations start leveraging the marketing benefits of social media, the number of workers being sacked over social media posts is rising. Many employers are simply ill prepared for the pitfalls which lie in wait as a result of their employees online behaviour. This can expose an organisation to the legal risks associated with defamation and confidentiality breaches aswell as the potential to leak confidential company information. Many organisations now have in place systemic workforce monitoring systems which can provide detailed data for monitoring audio and electronic c o m - munications and activity. GPS trackers are now widely used on staff devices and company vehicles. CCTV surveillance can now be accessed via a smartphone and body worn video cameras in ID tags are increasingly being adopted and made mandatory by organisations as a way of safeguarding mobile staff. Health surveillance along with drug and alcohol screening and testing are also providing employers with sensitive personal and medical data on employees. Who should attend? Anyone interested in the subject of employee monitoring and surveillance including; HR, security and risk professionals data privacy and information security managers general and corporate counsel company secretaries and heads of legal departments small business owners/directors. the workplace are legally robust
3 However, as the sophistication of surveillance technology has evolved, so too have the risks associated with using it. Companies can face lawsuits and hefty fines if they do not fully understand and comply with the restrictions imposed by data protection, human rights and privacy laws. The same technologies which are producing detailed and sensitive employee data can leave employers in hot water in they do not have adequate policies in place to ensure the secure access and storage of such information. New laws may pose significant problems for employers in the event of a security breach involving personal information if they do not notify those concerned within a required period. On top of this, growing evidence indicates that extensive use of monitoring and surveillance within the workforce can distress the employee relationship, damaging trust and confidence. Benefits of attending Pinpoint the risks posed to your business from inappropriate use of social media Understand the challenges posed by surveillance and monitoring in the workplace Learn about the methods used for monitoring and surveillance in the workplace and how to lawfully incorporate these into your own procedures Feel confident that your internal procedures for handling personal data in the workplace are legally robust Gain insight into the repercussions of failing to comply with laws governing this area Question expert speakers on your key areas of concern and interest Employee Surveillance and the Law will explore the technologies which are now being used to safeguard and monitor employees both within the workplace and when travelling. The programme will examine the key pieces of legislation which protect the privacy and human rights of the employee and will discuss how employers can strike the right balance between legally safeguarding their business interests and keeping employees onside by educating and empowering them. Interested in speaking and sponsorship opportunities? Conferences can act as a valuable promotional platform in today s economy, creating micro marketplaces where delegates can meet, make new contacts and do business. For more information about the event, speaking and sponsorship opportunities contact Caroline Fuller on caroline@quaynote.com tel +44 (0)
4 Employee Surveillance and the law Programme (subject to change) November 2015 Fr21st Refreshments, registration and exhibition Conference organiser`s opening remarks Welcome from the Chair Session One: Computers, devices and social media Introduction to workplace monitoring and surveillance A look at how and why workplace monitoring and surveillance has evolved in recent years Internet and surveillance What activities are slowing your network down? Recognising excessive personal use of company internet and Laws protecting employer Laws protecting employee Information Commissioners Office (ICO) guidelines Implementing your IT internet and policy Social media Defining what is acceptable use for your business Raising awareness of what constitutes inappropriate behaviour? Challenges around imposing contractual obligations on employees concerning social media Spotting problems and removing damaging information - how can employers capture evidence of inappropriate use? What should be included in a social media policy and should an employer keep records of its use? Consulting employee representatives What is a workplace monitoring system and are they permissible by law? Tracking an employee s digital footprint Technology available to employers - defining what is an appropriate and effective system Digital surveillance and monitoring software Smart cards Biometric scanners Questions Refreshment Break
5 Employee Surveillance and the law Programme (subject to change) November 2015 Fr21st Session Two: Tracking and camera surveillance technology CCTV, camera and vehicle surveillance systems How have camera surveillance systems evolved in recent years and what is the capability of the latest technology? Laws governing the collection, storage and access of personal data collected from surveillance camera systems Understanding proportional use and when surveillance camera systems could be deemed as excessive Installing tracking devices in company vehicles Challenges around using forward and internal facing CCTV in company vehicles Tracking technology and privacy laws Safety v Privacy Issues - what should companies be aware of when using traveller tracking technology and where do the privacy boundaries lie? Itineries for free time on business trips - safeguarding employee or intrusion? Session Three: Understanding relevant laws and regulations The Laws Which laws come into effect? Laws governing the use, storage and access of personal data Leaked data and security breaches Interpreting Laws Can employee monitoring data be used as forensic evidence in court? Recent cases from Employee Appeal Tribunals - what is the law favouring? Implications of the Perry V Imperial College Healthcare NHS Trust ruling How do privacy laws differ elsewhere in the world and how might this impact managing overseas offices? Investigating former employees who have set up in competition Surveillance by the employee - to what extent can employees secretly record disciplinary and grievance proceedings? Questions and discussion Lunch
6 Employee Surveillance and the law Programme (subject to change) November 2015 Fr21st Session Four: Targeted surveillance Privacy impact assessments What is a privacy impact assessment? Defining purpose and benefits Possible adverse consequences Monitoring alternatives Can monitoring be justified? Covert Surveillance and recordings Understanding proportionate and disproportionate targeted monitoring Who should authorise covert monitoring and on what grounds? Recap of the key laws and regulations governing this area Intercepting unaccessed communications - considerations for RIPA and LBP regulations Using private investigators - obligations under the DPA Submitting video surveillance evidence Using covert surveillance on malingering employees - lessons learned from recent case law Drug and alcohol testing How is the Human Rights Act and employee privacy concerns balanced with the safety and deterrence benefits of random drug and alcohol testing? Do workplace accidents and near misses constitute grounds for mandatory drug and alcohol testing? What are the legal implications of failing to effectively implement an existing drug and alcohol policy? Questions Refreshment Break
7 Employee Surveillance and the law Programme (subject to change) November 2015 Fr21st Session Five: Learning from monitoring and surveillance scenarios This session will explore a range of scenarios focusing on the surveillance and monitoring of employees within the workplace. Whilst fictitious in nature, the scenarios have been devised to highlight the complexities of the law governing this area. A panel of experts will discuss and debate potential legal, disciplinary and unintended consequences which might arise from each incident. The audience will be invited to participate with questions. Scenario One - Over stepping the mark on social media Scenario Two - The disgruntled former employee Scenario Three - Breach of personal information Scenario Four - Covert surveillance on a malingering employee Chair s closing remarks Close of conference
8 Registration form Employee Surveillance and the Law Complete all relevant sections of this form and either: Or register online at Title Name Position Organisation Address Tel Fax Additional requirements - please describe them here Delegate fees o Employee Surveillance and the Law Conference: VAT = 420 o Employee Surveillance and the Law + Cyber Risk and Insurance : VAT = 714 Fees include 1 or 2 day access to the event(s), available conference papers, lunch, refreshments and drinks reception. How to pay o Invoice Please send an invoice to o Cheque I enclose a cheque made payable to Quaynote Communications o Credit card Please debit from my AMEX/Eurocard/Delta/Mastercard/Switch/Visa Card No Expiry Date Switch Issue No Signature- Terms and conditions This booking form constitutes a legally binding agreement. Payment must be paid in full prior to the event. Cancellations must be confirmed in writing one month before the day of the conference and will be refunded minus an administration fee of 100 GBP. We regret that no refund can be made after that date for whatever reason. Substitutions will be accepted if notified in writing prior to the event. Database protection The personal information that you provide will be held on a database by Quaynote Communications Ltd. If you do not want to receive information about other products from Quaynote please write to database manager, 30 Fairfield Road, London, N8 9HG. UK. For further information caroline@quaynote.com or telephone +44 (0)
Employee Surveillance and the Law
One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace Supported by 4 November 2015 Central London Book online at www.regonline.com/employeesurveillance
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationRoyal Air Force Club
11 th Annual Legal Day Friday, 22 nd January, 2010 This will once again be held at the Royal Air Force Club Piccadilly, London. This year, there is no specific theme for the seminar. Rather, the ISSG has
More informationData Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
More informationTemplate for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
More informationSocial Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
More informationData Protection Policy
Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order
More informationDRUG AND ALCOHOL ABUSE POLICY AND PROCEDURE
DRUG AND ALCOHOL ABUSE POLICY AND PROCEDURE Issue Number: 1.0 Issue Date: 07.04.14 Review Date: 31.04.17 Reference: SPTA/HR/HR CONTENTS 1. Introduction 2. Scope 3. Aims of the policy 4. Health and Safety
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationMonitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
More informationSECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
More informationParliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
More informationTerms & Conditions for Client Organisations to Open Enrolment Programmes
JBS Executive Education Limited Executive Education Terms & Conditions for Client Organisations to Open Enrolment Programmes 1 Important information about this contract 1.1 This contract is made between
More informationwork Privacy Your Your right to Rights Know
Your right to Privacy Know Your Rights www.worksmart.org.uk at work Everyone has the right to a private life even when they re at work. But new technology is making it easier than ever for employers to
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
More informationTERMS OF SUPPLY FOR EDQM (COUNCIL OF EUROPE) EVENTS
1. GENERAL PROVISIONS These terms of supply apply only to the events organised by the European Directorate for the Quality of Medicines & HealthCare (EDQM), Council of Europe, Strasbourg, France, herein
More informationDate Amendments/Actions Next Compulsory Review Date
CTC KINGSHURST ACADEMY STAFF DISCIPLINARY POLICY AND PROCEDURE POLICY REFERENCE: POL017S Policy History Policy Ref & Version Date Amendments/Actions Next Compulsory Review Date POL017S V1.0 1 st September
More informationSTREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT
STREAMLINE HR BUSINESS PARTNERING & STRATEGY DEVELOPMENT CAPITALIZE ON EXPERT KNOWLEDGE TO GAIN MAXIMUM VALUE ON THESE VITAL ISSUES Understand the basic questions you need to consider when developing an
More informationOliver Brettle London. Employee Monitoring in the UK and Generally: Concerns Beyond the EU Data Protection Directive
Oliver Brettle London Employee Monitoring in the UK and Generally: Concerns Beyond the EU Data Protection Directive 6 th Annual Privacy Law Symposium April 27, 2006 The Focus Part I an overview on data
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationPolicy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationData Subject Access Request Procedure
Data Subject Access Request Procedure Policy ID IG07 Version: 2.0 Ratified by: Executive Committee Name of originator/author: Justin Dix, Governing Body Secretary Name of responsible committee/individual:
More informationDISCIPLINARY POLICY AND PROCEDURE
DISCIPLINARY POLICY AND PROCEDURE Date of Publication: April 2013 Agreed by: Vice Chancellor s Executive March 2013 Page 1 of 13 Policy 1.0 Introduction The purpose of the disciplinary policy and procedure
More informationSearching, screening and confiscation. Advice for headteachers, school staff and governing bodies
Searching, screening and confiscation Advice for headteachers, school staff and governing bodies February 2014 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice
More informationStrategic Presentation Skills Workshop
Strategic Presentation Skills Workshop London, 9 September 2015 Knowledge and skills for growth Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional
More informationNHS Lancashire North CCG. Competition Dispute Resolution Policy and Process
NHS Lancashire North CCG Competition Dispute Resolution Policy and Process V1.4 Version No Amended by Date reviewed Date approved Next Date for Review 1.1 March 2009 March 2010 1.2 B Thomas 29.07.13 August
More informationInnovative Advertising
Innovative Advertising for Digital Broadcasting & Media AFRICA 2nd - 4th June 2015 Johannesburg, South Africa Supporting Partner: KEY THEMES AND ISSUES AROUND THIS TOPIC The changing dynamics of advertising
More informationThe guidance 2. Guidance on professional conduct for nursing and midwifery students. Your guide to practice
The guidance 2 Guidance on professional conduct for nursing and midwifery students Your guide to practice The Nursing & Midwifery Council Vision, mission and values Our vision To safeguard the public by
More informationSelf assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
More informationUNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
More informationINFORMATION REQUIRED FOR EMPLOYEE HANDBOOK
INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK Registered Company Name Company Trading Name Address Email Address Contact number We have enclosed a standard employee handbook. You should read through the details
More informationROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff)
APPROVED BY COUNCIL September 2002 ROYAL HOLLOWAY University of London DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) Disciplinary Policy and Procedure September 2002
More informationMobile Phone Regulations in Council - A Guide to Enforcement
Mobile Telephone Policy 1. Introduction The purpose of this policy is to: (i) (ii) facilitate the effective management of Council mobile telephone utilisation specify guidelines for the appropriate use
More informationWorkforce Performance Management Policy and Procedure
Workforce Performance Management Policy and Procedure Workforce Performance Management Policy and Procedure Page: Page 1 of 19 Recommended by Approved by Executive Management Team Workforce Committee Approval
More informationInspiring Education, Achieving Our Dreams LANCASHIRE CHILDREN S SERVICES AUTHORITY
Inspiring Education, Achieving Our Dreams LANCASHIRE CHILDREN S SERVICES AUTHORITY MANAGING ALCOHOL/DRUG ABUSE POLICY AND PROCEDURE FOR SCHOOL STAFF (REVISED JANUARY 2013) Policy Leader: Paul Slater Policy
More informationKeir Hardie Primary School & Children s Centre. Use of Photographic Images of Children
Keir Hardie Primary School & Children s Centre Use of Photographic Images of Children Reviewed: Autumn 2015 Date of Next Review: Autumn 2016 Use of Photographic Images of Children This policy was reviewed
More informationNHS Constitution The NHS belongs to the people. This Constitution principles values rights pledges responsibilities
for England 21 January 2009 2 NHS Constitution The NHS belongs to the people. It is there to improve our health and well-being, supporting us to keep mentally and physically well, to get better when we
More informationNEW ZEALAND PSYCHOLOGICAL SOCIETY MEMBERS INSURANCE COVER As the insurance brokers to the NZ Psychological Society, Rothbury-Wilkinson Insurance
NEW ZEALAND PSYCHOLOGICAL SOCIETY MEMBERS INSURANCE COVER As the insurance brokers to the NZ Psychological Society, Rothbury-Wilkinson Insurance Brokers Ltd have arranged an insurance policy designed to
More informationGovernance. Information. Bulletin. Welcome to the nineteenth edition of the information governance bulletin
Welcome to the nineteenth edition of the information governance bulletin Our regular bulletin about information governance and the work of the IG transition programme Publication Gateway Reference: 02465
More informationCongress on the Future of Firefighter Safety
Friday 09 October 2015 Caledonian Club, London Congress on the Future of Firefighter Safety How best to safeguard our firefighters when protecting the public and property Organised by Programme monitored
More informationSecurity Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
More informationSocial Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
More informationGuidance on health and character
Guidance on health and character Who is this document for?... 2 About the structure of this document... 2 Section 1: Introduction... 4 About us (the HPC)... 4 How we are run... 5 About registration...
More informationDRUGS AND ALCOHOL POLICY
DRUGS AND ALCOHOL POLICY Date of last review: April 2015 Review period: 2 years Date of next review: April 2017 Owner: Head of HR Type of policy: Network LGB or Board approval: Board Policy Agreed by Ark
More informationG21 Provide hairdressing consultation services
Provide hairdressing consultation services Level 3 Hairdressing Trainer Guidance Notes The Learning Support Unit you have recently purchased makes reference to Key/Core Skill Opportunities. From September
More informationData Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
More informationBusiness Process Management. How to Thrive During the Economic Downturn. 27-29 November 2016, Doha - Qatar ISO 29990
ISO 9001:2008 Certified ISO 29990:2010 Certified (Certificate No:1007049195) ISO 29990 (Certificate No: 1078694951) Business Process Management 27-29 November 2016, Doha - Qatar 05Jun16 The PMI Registered
More informationData protection. Wi-Fi location analytics
Data protection Wi-Fi location analytics ICO lo Wi-Fi location analytics Data Protection Act Contents Introduction... 2 Overview... 2 What the DPA says... 2 What is Wi-Fi analytics?... 3 Conduct a privacy
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours
ADVANCED INVESTMENT ADVISORY AGREEMENT DRAFTING BE AN EXPERT! CPD 7 hours A BOUTIQUE COURSE FOR SMALL* INTERACTIVE GROUPS *The capacity of this course is limited to a maximum of 10 delegates Invesco Perpetual
More informationEducation programme standards for the registered nurse scope of practice Approved by the Council: June 2005
Education programme standards for the registered nurse scope of practice Approved by the Council: June 2005 1 Introduction The Nursing Council of New Zealand ( the Council ) governs the practice of nurses,
More informationLawlink NSW: Guide to the Workplace Video Surveillance Act
Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act
More informationVolcker Rule Breakfast Briefing
Volcker Rule Breakfast Briefing Venue: Date: Pinners Hall, 105-108 Old Broad Street, London, EC2N IEX 7 April 2014 Volcker and cross-border bank resolution Speakers include: Barnabas Reynolds Head of the
More informationINFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
More informationReparation Protocol i
Reparation Protocol i ii Contents: Aims and Objectives of Reparation 5 1 Health and Safety 6 2 Risk Management 6 3 Safeguarding 6 4 Code of Conduct 7 5 Information Sharing 8 6 Reparation Process 8 7 Expectation
More informationtechnical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
More informationGuide for Local Government Pension Scheme employers and admission bodies
Preparing for automatic enrolment Guide for Local Government Pension Scheme employers and admission bodies June 2013 A Introduction This guide is intended to highlight key aspects of the automatic enrolment
More informationThis Constitution establishes the principles and values of the NHS in England.
NHS Constitution 1 Introduction The NHS is founded on a common set of principles and values that bind together the communities and people it serves patients and public and the staff who work for it. This
More informationPrivacy at work. Published by Unite the Union General Secretary Len McCluskey. Updated 2013
Privacy at work Privacy at work Published by Unite the Union General Secretary Len McCluskey Updated 2013 Unite House 128 Theobald s Road Holborn London WC1X 8TN Tel: 020 7611 2500 2 This guide book is
More informationSUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE
SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE 1. INTRODUCTION 1.1 The Procedure has been established to help and encourage members of staff to achieve
More informationMONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
More informationSubject Access Request (SAR) Procedure
Subject Access Request (SAR) Procedure East and North Hertfordshire Clinical Commissioning Group Page 1 of 16 DOCUMENT CONTROL SHEET Document Owner: Chief Finance Officer Document Author(s): Anne Ephgrave
More information1.5 Company means Mega Jump Ltd (Company Number 09569385) whose registered address is Meteor House, Manor Way, Borehamwood.
TERMS & CONDITIONS 1.1 Activity means indoor trampolining activities including, but not limited to MegaFit, MegaRobics, MegaTots, Soft Play, MegaBeat, Basketball Slam Dunk, Dodgeball, Foam/Air Pit, Free
More informationUniversity of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
More informationContents. Answering the questions... 14. Domains tested in the midwifery CBT... 13 Midwifery CBT plan... 13 Structure of the midwifery CBT...
1 Contents Introduction... 3 Overview of the test of competence... 3 Applying for the test of competence... 4 Computer based test... 4 Candidate rules... 4 Confidentiality... 5 Taking the CBT... 5 Grounds
More informationUK Data Risks Incident RoadMap
Data breach summary steps Hiscox s data breach Experts Knowing what to do in the event of a data breach ( security incident ) can make the situation much less daunting when it may seem like your house
More informationIf you are unclear about the implications of Auto Enrolment you will find our Guide to Auto Enrolment a good starting point.
The Pay Check Auto Enrolment Service A service designed for Pay Check clients who are looking for a first class pension solution that is simple to administer, cost effective and guarantees full compliance
More informationISM. Effective Telephone Techniques. An intensive and highly practical 1 day course. Communication works for those, who work at it.
Effective Telephone Techniques An intensive and highly practical 1 day course Communication works for those, who work at it. - John Powell The trainer was extremely good, thank you all very much - Sushim
More informationThere are both sponsorship and exhibition opportunities at the meeting, detailed in the document below.
Dear Prospective Exhibitor! We would like to extend to you an invitation to join us at the Society for Experimental Biology s Annual Main Meeting 2011 taking place from the 1 st 4 th July 2011 in Glasgow,
More informationProfessor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC
Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationStaff Disciplinary Procedure. 1. Principles
Staff Disciplinary Procedure 1. Principles This procedure is to help ensure consistent and fair treatment for all staff and to ensure compliance with natural justice. The supervisor/manager will make preliminary
More informationApplication for a Company Licence
Private Security Personnel Licensing Authority For more information visit www.pspla.govt.nz Application for a Company Licence Under the Private Security Personnel and Private Investigators Act 2010 1 What
More informationInformation Governance Strategy. Version No 2.1
Livewell Southwest Information Governance Strategy Version No 2.1 Notice to staff using a paper copy of this guidance. The policies and procedures page of LSW Intranet holds the most recent version of
More informationThe potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
More informationSocial Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
More informationCowbit St Mary s Church of England Primary School. Procedure for the Safe use of Photographs and Electronic Images
Cowbit St Mary s Church of England Primary School Procedure for the Safe use of Photographs and Electronic Images 1. Introduction Cowbit St Mary s School needs and welcomes positive publicity. Children
More informationYour Professional Indemnity Solution.
Pinsure Your Professional Indemnity Solution. 18 Henfield Business Park, Shoreham Road, Henfield, West Sussex, BN5 9SL Tel. 01273 494914 ~ Fax. 01273 494964 Email: pinsure@pinsure.co.uk Web: www.pinsure.co.uk
More informationBusiness Improvement in Universities
Business Improvement in Universities Transforming back-of-house functions to maximise efficiency gains 24th & 25th September, 2014, Rydges Melbourne Key Speakers Benefits of attending Peter Marshall Chief
More informationEmployment Law India. 6 July 2016. JSB Group Limited 2016 Learning Development Consulting
Employment Law India 6 July 2016 JSB Group Limited 2016 WINNER 2014 Queen s Awards for Enterprise: International Trade Table of contents Administration notes... 3 Terms and conditions... 4 Venue details...
More informationAlcohol and Drugs Policy. Committee responsible for review. Agreed date Autumn 2013
Alcohol and Drugs Policy Committee responsible for review Resource Agreed date Autumn 2013 Review date Autumn 2016 Contents Page Introduction 3 The need for compliance 3 Management responsibilities 4 Individual
More informationDrug and Alcohol Policy
Drug and Alcohol Policy 1. Introduction 1.1 As a responsible employer, ARK Academies recognises the need for a constructive and preventative strategy designed to encourage early identification of alcohol
More informationData Protection Act, 2005 - Summary Of Consequences
DATA PROTECTION ACT 1998 UNDERTAKING Data Controller: Caerphilly County Borough Council/ Cyngor Bwrdeistref Sirol Caerffili Penallta House Tredomen Park Ystradmynach Hengoed Mid Glamorgan CF82 7PG I, Chris
More informationEXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS
10 th Annual National Congress 2 Separately Bookable Days 18 th & 19 th September 2012, Cliftons Centre, Melbourne NATIONAL CAREER PROGRESSION CONGRESS FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS
More informationGuidance on professional conduct. For nursing and midwifery students
Guidance on professional conduct For nursing and midwifery students 1 We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. We exist to safeguard the
More informationKey Advances in Stroke Rehabilitation
Conference on Key Advances in Stroke Rehabilitation 12th June 2013 Organised by: Congress Centre, London United Kingdom Limited spaces available Key Advances in Stroke Rehabilitation About the conference
More informationPredictive Analytics & Filtering for Finance
Predictive Analytics & Filtering for Finance 25 28 January, 2016 London Objectives: Scope and Purpose The application of regime-switching models and filtering techniques gain in importance in financial
More informationSAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY
SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY Our setting will work with children, parents and the community to ensure the rights and safety of children and to give them the very best start in life.
More informationMerthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
More informationA FORUM FOR DEBATE, A CATALYST FOR CHANGE
7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes
More informationGlasgow Kelvin College. Disciplinary Policy and Procedure
Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version
More informationUse of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013
Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:
More informationStamford Bridge Chelsea, London Thursday 17 June 2010
Presented by MODELLING Stamford Bridge Chelsea, London Thursday 17 June 2010 WORLD 2010 PEDESTRIAN MODELLING DATA COLLECTION TRANSPORT MODELLING Sponsors 09.00 Registration 10.00 Morning Plenary TRANSPORT
More informationAcceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
More informationAppointment as Non-executive Director Auckland International Airport Limited
PO Box 73020 Auckland Airport Manukau 2150 New Zealand. Appointment as Non-executive Director Following our recent discussions, I am very pleased to confirm my invitation to you to join the Board of (Auckland
More informationDATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More information