Incident Management Scenario, Matt Parker Information Assurance & Cyber Safety

Size: px
Start display at page:

Download "Incident Management Scenario, Matt Parker Information Assurance & Cyber Safety"

Transcription

1 Incident Management Scenario Please take your seat at a table towards the front Thank you

2 Incident Management Scenario Matthew Parker Information Assurance & Cyber Security Engagement Programme The National Archives

3 Risks and data loss On your tables please discuss the following 3 questions: 1) What are the most important bits of information or information assets within your organisation? 2) Where do the technical risks to your information come from? 3) Where do the cultural risks to your information come from?

4 The scene Your name is Max Breach You work for a small marketing company in Leeds You have just arrived for work on Monday morning You ve made a coffee and start checking your s

5 New unread 10:05am Dear Max I just received a call from Steve Beer a new HR administrator who said he left his work bag in Wetherspoons after a few drinks on Friday night. He went back on Sunday but according to the bar staff there was no sign of it. Steve told me that the bag contained 10 staff record files, including names, address, payroll information and national insurance numbers. The bag also contained a personal USB stick which had a backup of our customer relationship management system I've done some digging and Steve has been working unsupervised despite only being with us for two months, he has limited experience and has had no training. I m not sure what to do!! Please advise Debbie Bone Helpdesk Manager

6 i) What do you need to find out? Dear Ma I just received a call from Steve Beer a new HR administrator who said he left his work bag in Wetherspoons after a drinking session on Friday night. He went back after work on Monday but according to the bar staff there was no sign of it. Steve told me that the bag contained 10 staff record files, including name, address, family member details and key life events. The bag also contained a personal USB stick which had Directors expenses claims, their bank details and NI numbers. I've done some digging and Steve has been working unsupervised despite only being with us for two months and has limited experience and no training. I'm really scared about this getting out and not sure about next steps Please advise Debbie Bone Helpdesk Manager

7 Sent messages - 10:15am Debbie, Thanks for your , cc'ing in our SIRO. Key things we need to find out: - Do we still have a copy of the CRM on our system? - Why did it take until Sunday for Steve to return to the pub? - Who are the colleagues whose data might have been lost? - What harm could come to them? - Were there any protections on the USB (i.e. encryption)? - Are there wider consequences to consider such as loss of customer confidence? - Did Steve report this to his manager or the police and who should be responsible for this information? You, me and the SIRO to meet in 15 minutes ok? Max Breach

8 New unread 10:16am Hey Max I've just seen on Twitter that a member of the public has found a USB stick in a local pub and is threatening to give the CRM backup to a rival marketing firm!! The story has been picked up by the local and national media who are asking me for a comment and people on twitter are offering cash for a copy of our CRM!!! Please help!! Jo Scare Press and Communications

9 New unread am Max, Debbie forwarded me your , sorry about all this mate! I'm not in the office but if you have a look on my desk you'll find a notebook with the names of the 10 people in the missing files By the way, the USB wasn't encrypted and it was a complete backup of our CRM system. There was other stuff in the bag like my office pass, an emergency contact list and my iphone. Complete disaster! Hope this helps a bit! Cheers, Steve

10 ii) What actions do we need to take?

11 Emergency breach meeting Time: 10:35 am Attendees: Max, SIRO, Jo, Debbie Actions: Comms team to prepare lines to take with the media Remove Steve s notebook and contact the 10 staff Inform the ICO Inform the 10 staff members whose records have been lost Establish whose information might have been lost in the CRM and consider contacting them Suspend Steve s access rights and introduce him to management Talk to other members of Steve s team and check this attitude to home working and data security is not part of a wider trend Inform security about the missing staff pass

12 iii) What could have prevented it?

13 Steve Beer incident report Preventative steps Questions to ask: Do we have controls on storing information on USBs? Do we have comprehensive home-working and clear desk policies and are they being followed? Do staff know when and how to report losses? Are line managers aware of the risks and do they allow new starters to work unsupervised? Are staff aware of the consequences of a data loss? Can we implement better induction training? Are there issues with our organisational culture? Are we prepared for the speed of social media?

14 In your organisation Would this have happened in your organisation? Why/why not? What do you do differently? What could you do differently?

15 What happened next? 1. Steve never made it back into the office 2. The member of the public decided to hand the bag back rather than sell the information on 3. A man was apprehended after trying to access the office with Steve's missing staff pass 4. The breach was reported to the ICO who issued a strong warning for the lack of encryption and inadequate home working policy

16 THANK YOU! For training enquiries and for more information: Follow us on

Essex International Jamboree 2016. General Staff Roles. HR Directorate

Essex International Jamboree 2016. General Staff Roles. HR Directorate Essex International Jamboree 2016 General Staff Roles HR Directorate Welcome to EIJ 2016 One Team One Jamboree. That is our vision for staff at Essex International Jamboree. Whatever your experience, whatever

More information

DAN'S VAN: AN ACCIDENT STORY PART TWO

DAN'S VAN: AN ACCIDENT STORY PART TWO 'S VAN: AN ACCIDENT STORY PART TWO CHARACTERS: Dan Davis, a 28-yr-old independent construction contractor Tanya, Dan's wife, an assistant manager at Kmart Female recorded voice at Nationwide Richard, a

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

Communication skills at work an introduction

Communication skills at work an introduction 1 Communication skills at work an introduction this chapter covers... This chapter is an introduction to the Applied business communications and personal skills Unit it explains how all the parts of the

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Welcome to The National Archives. museum. bookshop. cyber cafe. All you need to know to help you find your way around. WiFi

Welcome to The National Archives. museum. bookshop. cyber cafe. All you need to know to help you find your way around. WiFi Welcome to The National Archives All you need to know to help you find your way around museum e bookshop cyber cafe WiFi The National Archives is a centre of expertise in creating, managing and preserving

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

LEAVING HOME & ARRIVING IN THE UK DON T LEAVE HOME WITHOUT:

LEAVING HOME & ARRIVING IN THE UK DON T LEAVE HOME WITHOUT: CHECKLISTS: THE ESSENTIALS LEAVING HOME & ARRIVING IN THE UK DON T LEAVE HOME WITHOUT: Your passport or national identity card & your travel tickets Your medical certificate Your SAWS work card (if you

More information

Information Management Policy

Information Management Policy Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

2011 staff survey. Plans and changes to the staff survey for 2011 June 2011

2011 staff survey. Plans and changes to the staff survey for 2011 June 2011 2011 staff survey Plans and changes to the staff survey for 2011 June 2011 ICO Vision By 2012 we will be recognised by our stakeholders as the authoritative arbiter of information rights, delivering high-quality,

More information

CREATIVE S SKETCHBOOK

CREATIVE S SKETCHBOOK Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are

More information

Review of the Regulation of Alcohol Advertising: tell us what you think

Review of the Regulation of Alcohol Advertising: tell us what you think Review of the Regulation of Alcohol Advertising: tell us what you think Review of the Regulation of Alcohol Advertising: tell us what you think This document asks you what you think about the way alcohol

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Department of Public Health S A N F R A N C I S C O

Department of Public Health S A N F R A N C I S C O This guide provides the step-by-step instructions for: Requesting mobile device access to your DPH Office 365 email account Setting up an Android device to sync with Office 365 Setting up an Apple device

More information

How To Get A Credit Card From The Irs

How To Get A Credit Card From The Irs This is a transcript of a call between a Pindrop Security employee, identifying himself as R. Williams, and a phone fraudster identifying himself as S. Parker. Pindrop identified one of the phone numbers

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

Example Interview Transcript

Example Interview Transcript Ms Bossy DeBoss Namey Mc Name Thank you for coming to see us for your interview today, Namey. How was your journey, did you have any trouble finding us? My journey was fine thank you, Ms DeBoss. The instructions

More information

Emergency calls LEARNING OUTCOMES

Emergency calls LEARNING OUTCOMES TOPIC 1 THEME 11 Emergency calls LEARNING OUTCOMES To understand key questions asked by the operator and control assistant when making a 999 call To give clear information in response to questions RESOURCES

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Good CAD / Bad CAD. by Tony Richards

Good CAD / Bad CAD. by Tony Richards Good CAD / Bad CAD by Tony Richards Looking for a new computer-aided dispatch and/or records management system? Trying to figure out exactly what you should be looking for? What distinguishes good from

More information

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31 THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Data Security Breach Management - A Guide

Data Security Breach Management - A Guide DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process

More information

Family Law. Lesson: Family Violence. CLB 5-6 Instructional Package

Family Law. Lesson: Family Violence. CLB 5-6 Instructional Package Lesson: Family Violence CLB 5-6 Instructional Package Family Law: Family Violence (CLB 5-6) CLB Outcomes CLB 5-III: Getting Things Done CLB 6-IV: Comprehending Information CLB5-II: Reproducing Information

More information

How To Deal With An Allegation Of Sexual Abuse In A School

How To Deal With An Allegation Of Sexual Abuse In A School 1 Model Allegations Management Policy for Knowsley Schools and Education Settings July 2015 Introduction 1. All schools and education settings have a duty to promote and safeguard the welfare of children

More information

Jared Roberts (PelotonU)

Jared Roberts (PelotonU) p.1 Jared Roberts (PelotonU) Jared Roberts: Hello Dave. David Cutler: Hey, is this Jared? Jared: Yes, it is, how are you doing? David: I'm doing great, Jared. Thank you so much for speaking with me, I

More information

>> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the

>> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the >> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the necessary tools and information 1 in order to become

More information

Tabletop Exercises. Scenario 1 Water Damage PHASE 1

Tabletop Exercises. Scenario 1 Water Damage PHASE 1 Scenario 1 Water Damage PHASE 1 You are the owner of a small beauty salon, which has three employees, including yourself. On Saturday evening, after you have locked up and gone home for the weekend, an

More information

ISS Student Data Storage Policy Security: Internal Only

ISS Student Data Storage Policy Security: Internal Only Student Data Storage Policy Security: Internal Only Author: Mark Barrow Version: 1.2 Date: 11 September 2015 +44 (0)20 7133 4511 m.barrow@londonmet.ac.uk London Metropolitan University Tower Building 166

More information

TRAINING PROGRAMME: TRAINING EXERCISES. With Respect Dignity in Homecare

TRAINING PROGRAMME: TRAINING EXERCISES. With Respect Dignity in Homecare TRAINING PROGRAMME: TRAINING EXERCISES With Respect Dignity in Homecare Exercise 1 What is dignity? You have been called to the hospital as your loved one has been involved in a serious car accident. When

More information

To reduce drink driving re-offending. Target group: Recidivist drink drivers

To reduce drink driving re-offending. Target group: Recidivist drink drivers To reduce drink driving re-offending Target group: Recidivist drink drivers Provide a community based combined education and therapy group. That encourages clients to engage in meaningful discussion that

More information

2015: A Year in Mobile. Report on Trends in Enterprise App Use and Development

2015: A Year in Mobile. Report on Trends in Enterprise App Use and Development 2015: A Year in Mobile Report on Trends in Enterprise App Use and Development April 2016 2015: A Year in Mobile April 2016 2 Report on Trends in Enterprise App Use and Development This report is the first

More information

Disciplinary Skills SAMPLE PAGES

Disciplinary Skills SAMPLE PAGES Disciplinary Skills SAMPLE PAGES Delegate Manual 9.00 Welcome and Setting the Scene 10.45 BREAK Knowledge/Skill Checklist Getting to Know You Exercise COURSE OUTLINE Disciplinary Procedure Overview Consequences

More information

How YOU Can Generate A Consistent Stream Of Warm Leads & Sales From Twitter & Facebook... With NONE of the

How YOU Can Generate A Consistent Stream Of Warm Leads & Sales From Twitter & Facebook... With NONE of the How YOU Can Generate A Consistent Stream Of Warm Leads & Sales From Twitter & Facebook... With NONE of the W A H T PROOF Joanna 43% increase in UK event attendees JC significant increase in warm leads

More information

.J"" ~~ 4-/' r-2 ::t St{)

.J ~~ 4-/' r-2 ::t St{) INV-1111, 1112, 1113- Hosted Private Cloud V1 o~ ~o,..._e-z.j"" ~~ 4-/' r-2 ::t St{) t;;.x: t--) I (3 I 7 1 May 2013 - Ron emailed to say he needed the Moodie demo up and running ASAP. He said he also

More information

Scenario 1 ~ Water Damage. Phase 1

Scenario 1 ~ Water Damage. Phase 1 Phase 1 On Friday evening, after you have locked up and gone home for the evening, an internal pipe running between the suspended ceiling and the floor of a flat above bursts. You arrive at your business

More information

The Auto Liability Program Video Transcript

The Auto Liability Program Video Transcript Introduction Hi, I'm Ed Finnegan and I run the auto liability program for the State of Georgia. As a state employee, we have some information that will be beneficial and potentially save you money, time,

More information

Intern Handbook. Initiated by. In association with. Oak Wood Primary & Secondary Schools

Intern Handbook. Initiated by. In association with. Oak Wood Primary & Secondary Schools Intern Handbook Initiated by In association with Oak Wood Primary & Secondary Schools Handbook Contents Page 1 What is EmployAbility?... 1 2 The history of EmployAbility... 2 3 What does my working day

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

The How, What, When and Why of On-Boarding

The How, What, When and Why of On-Boarding The How, What, When and Why of On-Boarding An ebook By Debbie Edmondson Cohesion Recruitment What is On-boarding? On-boarding is a really key part of your engagement process, and needs organisational buy-in

More information

Social media and employment law do s and don ts

Social media and employment law do s and don ts Social media and employment law do s and don ts August 2014 @heenanrachael @capsticksllp Social Media Today s Session Social Media HR Hotspots Recruitment and social media What the Tribunals think Managing

More information

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private

More information

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department Internal Audit Report 2009-08 Introduction. The Municipality depends heavily on technology and automated information systems, and their disruption for even a few days could have a severe impact on critical

More information

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses 2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Digital Design Class Overview/Rules

Digital Design Class Overview/Rules Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures

More information

INFORMATION GOVERNANCE STAFF HANDBOOK

INFORMATION GOVERNANCE STAFF HANDBOOK INFORMATION GOVERNANCE STAFF HANDBOOK Contents Why do YOU need to know about Information Governance (IG)?... 2 Keeping Information Safe... 2 Confidentiality... 2 Deciding to Communicate Important Information...

More information

Ad Sales Scripts. Would you be willing to meet with me in person to discuss this great opportunity?

Ad Sales Scripts. Would you be willing to meet with me in person to discuss this great opportunity? Successful Cold Call to Business Hi, this is Steve at Waterway Car Wash. Good afternoon, Steve. My name is (first and last name) and I am calling on behalf of (name of yearbook), the yearbook publication

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

NHS Fife. Your Business @ Risk - Information Governance and Security Survey

NHS Fife. Your Business @ Risk - Information Governance and Security Survey NHS Fife Your Business @ Risk - Information Governance and Security Survey Prepared for NHS Fife September 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability

More information

www.britishcouncil.org/learnenglish

www.britishcouncil.org/learnenglish Series 2 Episode 8: Happy New Year Introduction This support pack accompanies: This support pack contains the following materials: Before you listen Comprehension Task Grammar Task Vocabulary Task Audio

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

ACT ONE. (The phone rings. He answers.)

ACT ONE. (The phone rings. He answers.) YAKUP ALMELEK ACT ONE The action unfolds in the suite of a five-star hotel. There may or may not be a door between the two connecting rooms. There should be be a desk, a computer, a fax and a photocopier

More information

Data Center & Helpdesk Services Documentation

Data Center & Helpdesk Services Documentation Data Center and Helpdesk Services Service Levels of Understanding Last updated 03/26/2008 LH DCHS SERVICE LEVELS OF UNDERSTANDING Purpose Data Center and Helpdesk Services (DCHS) provide Service Levels

More information

THE PERSONAL SERVICE FOR IT

THE PERSONAL SERVICE FOR IT WHO WE WORK WITH THE PERSONAL SERVICE FOR IT bluelogic.co.uk info@bluelogic.co.uk +44 (0) 113 273 9040 Blue Logic Computer Systems Ltd, Bramley Grange, Skeltons Lane, Thorner, Leeds, LS14 3DW welcome to

More information

PS177 Remote Working Policy

PS177 Remote Working Policy PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection

More information

GRADUATE INTERNSHIP - IT (Full-time - 11 Month Contract)

GRADUATE INTERNSHIP - IT (Full-time - 11 Month Contract) GRADUATE INTERNSHIP - IT (Full-time - 11 Month Contract) Page 2 Page 3 Page 6 Page 7 Page 8 Advertisement Job Description Person Specification Conditions of Service Summary and Staff Benefits Information

More information

IT Services. Service Level Agreement

IT Services. Service Level Agreement IT Services Service Level Agreement Contents 1 Purpose... 3 2 IT Services Objectives... 3 3 IT Helpdesk... 3 3.1 Issues... 3 3.2 Service Requests... 4 3.3 Development Requests... 4 4 Priorities... 4 5

More information

Give em The Pickle! Business is not what we sell, it s who we

Give em The Pickle! Business is not what we sell, it s who we Give em The Pickle! Business is not what we sell, it s who we serve Presented by Mark Warren Texas Association of Counties www.county.org June, 2013 This presentation is about instilling great customer

More information

INTERVIEW TIPS PREPARING FOR INTERVIEWS

INTERVIEW TIPS PREPARING FOR INTERVIEWS INTERVIEW TIPS PREPARING FOR INTERVIEWS These pre-interview essentials could make the difference between your next career step or a career full stop! Make sure you know the exact address and time of the

More information

Job Description. Management Assistants, Team Administrators and Business Support Apprentice. Head of Integrated Governance

Job Description. Management Assistants, Team Administrators and Business Support Apprentice. Head of Integrated Governance Job Description Job Title: Reference No: Organisation: Department: Business Support Manager NHS Vale of York Clinical Commissioning Group Corporate and Governance Base: West Offices, Station Rise, York,

More information

Okay, good. He's gonna release the computers for you and allow you to log into NSLDS.

Okay, good. He's gonna release the computers for you and allow you to log into NSLDS. Welcome to the NSLDS hands-on session. My name is Larry Parker. I'm from the Department of Education NSLDS. Today, I have with me a whole host of folks, so we're gonna make sure that if you have any questions

More information

HR ADVISORY BULLETIN 1. Discipline & Grievance

HR ADVISORY BULLETIN 1. Discipline & Grievance HR ADVISORY BULLETIN 1 Discipline & Grievance V1 January 2012 Protect DISCLAIMER The information contained within this pamphlet is for guidance only. The purpose of this pamphlet is to provide information

More information

ESOL Customer Service Training: Unit 1 1: 1 Student Book. Unit 1: Talking With Your Customer

ESOL Customer Service Training: Unit 1 1: 1 Student Book. Unit 1: Talking With Your Customer ESOL Customer Service Training: Unit 1 1: 1 Unit 1: Talking With Your Customer ESOL Customer Service Training: Unit 1 1: 2 What are your goals? Note to Instructor: If you have permission, use Stand Out

More information

S E R V E R C E N T R E H O S T I N G

S E R V E R C E N T R E H O S T I N G S E R V E R C E N T R E H O S T I N G Managed Hosting Multi Tenant Platform Microsoft Dynamics CRM 2013 Service Level Agreement Server Centre Hosting Limited Master Version - 2.1 Server Centre Hosting

More information

Small Business Owners: How You Can-and Must-Protect Your Business From The IRS If You Have Payroll Tax Problems!

Small Business Owners: How You Can-and Must-Protect Your Business From The IRS If You Have Payroll Tax Problems! E N O, B O U L A Y, M A R T I N & D O N A H U E, L L P SPECIAL SMALL BUSINESS TAX REPORT Inside this Special Report Small Business Owners: How You Can-and Must-Protect Your Business From The IRS If You

More information

General Meeting Credentialing / Registration Assistant. Assist WCPT staff with onsite registration of General Meeting delegates

General Meeting Credentialing / Registration Assistant. Assist WCPT staff with onsite registration of General Meeting delegates Volunteer Job Descriptions General Meeting Credentialing / Registration Assistant Assist WCPT staff with onsite registration of General Meeting delegates Responsibilities: Ensure delegates know which credentialing

More information

Outlook 2010 Conversations

Outlook 2010 Conversations Outlook 2010 Conversations Let's start with your Inbox in Outlook 2010. For a long, long time your Inbox has been a lengthy, chronological list of all the emails you have received. We know that for many

More information

How to Best Help your Son Succeed at School and Maintain Your Sanity in the Process! Tips for Year 10-11 Parents

How to Best Help your Son Succeed at School and Maintain Your Sanity in the Process! Tips for Year 10-11 Parents How to Best Help your Son Succeed at School and Maintain Your Sanity in the Process! Tips for Year 10-11 Parents OR What you can do to help your boy (a) Enjoy school (b) Succeed at school (c) Achieve his

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights

More information

Business Emails Tips and Useful Phrases

Business Emails Tips and Useful Phrases Business Emails Tips and Useful Phrases Cross off any tips below which are usually bad ideas. Starting business emails Opening greeting 1. You should usually write Dear Mr/ Ms + full name if you know the

More information

n Starter n The Paper Flow n What? When? n Create a System n Conclusion n Questions for Assessment

n Starter n The Paper Flow n What? When? n Create a System n Conclusion n Questions for Assessment Lesson getting Organized A G E N D A n Starter n The Paper Flow n What? When? n Create a System n Conclusion n Questions for Assessment Objectives Students will examine ways to organize information and

More information

Review of DBS Data Retention Policy

Review of DBS Data Retention Policy Review of DBS Data Retention Policy October 2015 Contents Distribution of Report... 3 EXECUTIVE SUMMARY... 4 Key Observations and Recommendations... 4 DETAILED FINDINGS: DATA RETENTION POLICY REVIEW...

More information

SCRIPT Series: Stalked (Season 2) Version: 2/27/14 Julie D Aprile EP 2 Hannah Perryman

SCRIPT Series: Stalked (Season 2) Version: 2/27/14 Julie D Aprile EP 2 Hannah Perryman 1. COLD OPEN COLD OPEN 2. SHE MADE FRIENDS WITH THE GIRL DOWN THE BLOCK. 3. Hannah Perryman STK202I006a 14:15:51:00 She was going to try to kill me, and you know what? She could possibly do it. 4. BUT

More information

Sure did, sis! The bank upped my credit card limit to $5000. I ve maxed it out already!

Sure did, sis! The bank upped my credit card limit to $5000. I ve maxed it out already! JOSH Hey Josh, did you score a new game? Sure did, sis! The bank upped my credit card limit to $5000. I ve maxed it out already! He got this new phone too. You can download awesome apps for it and surf

More information

BYOD BRING YOUR OWN DISASTER?

BYOD BRING YOUR OWN DISASTER? BYOD BRING YOUR OWN DISASTER? Síobhra Rush, Session Chair Leman Solicitors, Ireland BYOD - INTRODUCTION! Agenda! What is BYOD?! Why should businesses consider it?! Potential downsides to BYOD! An explanation

More information

The new normal delivering information about oral chemotherapy in the clinic

The new normal delivering information about oral chemotherapy in the clinic The new normal delivering information about oral chemotherapy in the clinic RCN Nursing Research Conference 2013, Belfast Dr Anne Arber & Dr Anki Odelius University of Surrey, Guildford UK Background Multiple

More information

WE ARE HERE TO HELP. ICB Group has resources to support your loss control, claims management, safety and

WE ARE HERE TO HELP. ICB Group has resources to support your loss control, claims management, safety and ICB ICB Introduction WE ARE HERE TO HELP. ICB has resources to support your loss control, claims management, safety and will help to protect your business and increase your bottom line. This resource portfolio

More information

Work experience. ICT Service Desk

Work experience. ICT Service Desk Work experience ICT Service Desk Kent County Council (KCC) is one of the largest councils in the country and provides more than 300 services for around 1.6 million residents, visitors and people working

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

ISS Student Data Storage Policy Security: Internal Only

ISS Student Data Storage Policy Security: Internal Only Student Data Storage Policy Security: Internal Only Author: Mark Barrow Version: 1.2 Date: 11 September 2015 +44 (0)20 7133 4511 m.barrow@londonmet.ac.uk London Metropolitan University Tower Building 166

More information

sponsor me to Give up chocolate? Wax your chest? Shave your head? Give up your car? The possibilities are endless. dress up/dress down

sponsor me to Give up chocolate? Wax your chest? Shave your head? Give up your car? The possibilities are endless. dress up/dress down FUNDRAISING Ideas and Inspiration THE SUN FLOWER JAM At The Sunflower Jam, every penny counts Whatever you choose to do to raise money, remember that we are here to support and help you along the way Before

More information

How To Do A Deal With A Computer Program

How To Do A Deal With A Computer Program Part 2 A day in the life of an organized agent CRM in real life We will now walk through a scenario made possible by using a CRM solution to its maximum potential. It is important to note that there are

More information

Sincerest regards J. Kent B. Chairman of the Board of Trustees

Sincerest regards J. Kent B. Chairman of the Board of Trustees Testimonials Dear Bill, I wanted to tell you how pleased I am with your help in getting my old roof replaced. Your professionalism and knowledge of the roofing business gave me confidence to select you

More information

A leading provider of HR related professional services.

A leading provider of HR related professional services. A leading provider of HR related professional services. Employment Law Robust and pragmatic support. V Learning Employment law training for managers and HR professionals. Vista HR Resourcing support, resolution

More information

Your Fundraising Toolkit

Your Fundraising Toolkit Your Fundraising Toolkit Thank you for deciding to join forces with Tiny Tickers in the fight for a better start for tiny hearts! All the funds you raise for Tiny Tickers will help give babies with congenital

More information

Counselor Chat Tuesday, January 10,2012

Counselor Chat Tuesday, January 10,2012 Chat Tuesday, January 10,2012 Vinnie_ASI Today's chat topic: Using LinkedIn to Get Sales Leads 01:15 Is anywhere here? 01:59 Is anyone here? Hi and welcome to today's chat. The topic: Using LinkedIn to

More information

Cyber Security and Data Security Courses

Cyber Security and Data Security Courses dsdsds Cyber Security and Data Security Courses Overview 01905 317173 @FriendlyNerdUK www.friendlynerd.co.uk Cyber Basics (half-day) To provide a basic foundation of cyber security knowledge for general

More information

Developed by. Emma Oettinger, Anti-Money Laundering Policy Officer Law Society of England & Wales

Developed by. Emma Oettinger, Anti-Money Laundering Policy Officer Law Society of England & Wales A TEACHING EXERCISE FOR LAW SCHOOLS, POST-GRADUATE PROFESSIONAL EDUCATION PROGRAMS AND CONTINUING PROFESSIONAL DEVELOPMENT FOR LAWYERS ON ANTI-MONEY LAUNDERING OBLIGATIONS, LEGAL ETHICS AND PROFESSIONAL

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

CHAPTER 9 System Backup and Restoration, Disk Cloning

CHAPTER 9 System Backup and Restoration, Disk Cloning CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the

More information

ACCOUNT MANAGER HANDBOOK

ACCOUNT MANAGER HANDBOOK ACCOUNT MANAGER HANDBOOK INTRODUCTION An account manager or key account manager performs sales and relationship-building activities and assists in managing the account. An organization hiring an account

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Your local Safer Neighbourhood Team. For general enquiries please call Dorset Police on 101. If a crime is in progress, or life in danger, dial 999.

Your local Safer Neighbourhood Team. For general enquiries please call Dorset Police on 101. If a crime is in progress, or life in danger, dial 999. SNT newsletter West Moors, St Leonards and St Ives SNT October 2015 Safer Neighbourhoods is a commitment by Dorset Police to improving the quality of life within our communities by working together with

More information

TABLETOP EXERCISE FACILITATOR S GUIDE:

TABLETOP EXERCISE FACILITATOR S GUIDE: TABLETOP EXERCISE FACILITATOR S GUIDE: ACTIVE SHOOTER EVENT Preparis INTRODUCTION Hello, my name is and I would like to welcome all of you to today s tabletop exercise. I want to thank you for taking the

More information

MACMILLAN READERS INTERMEDIATE LEVEL RICHARD CHISHOLM. Meet Me in Istanbul. ~ l\lacl\iillan

MACMILLAN READERS INTERMEDIATE LEVEL RICHARD CHISHOLM. Meet Me in Istanbul. ~ l\lacl\iillan MACMILLAN READERS INTERMEDIATE LEVEL RICHARD CHISHOLM Meet Me in Istanbul ~ l\lacl\iillan Contents 1 Journey to Istanbul 5 2 The American Bar 8 3 A Shock 12 4 'I Saw Her' 16 5 A Disappointing Day 19 6

More information