Search alphaZ documents
      
      
      
          
      
      
      Products meeting the search criteria
            
      
      
                
          
  		  	 
            
              
                
                  
                  Simple to use but comprehensive and intuitive issues register. This register can be used to log all issues including all aspects of investigation and action taken or completed in conjunction with/with..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  This register supports compliance with ISO 27001:2022. This register provides a comprehensive listing and analysis of all Information Security risks and treatments and is intended to be useful an..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Construction Design and Management (CDM) and includes the General Guidance document GG-1-15_Construction Design and Management.Talk Description;•	Your Duties under CDM If you are..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Data Protection and includes the General Guidance document GG-1-16 Data ProtectionTalk Description;•	Definition of data protection •	Compliance •	Personal informat..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Management System and ISO Compliance and including the IMS1 IMS Manual, the GG-1-09 Integrated Management System (IMS) general guidance document as well as the GG-1-12 ISO Standa..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Emeregency Lighting and including the GG-1-20 General Guidance on emergency lighting. Talk Description;•  What is emergency lighting?•  Emergency lighting requirem..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on General Information Security and including GG-8-01 Information Security General.Talk Description;•	General Information Security – guidance, employee responsibilities•	D..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Data Backup and including the General Guidance document - GG-8-02 Data Backup.Talk Description;•	Guidance for workers on data backup requirements to maintain information sec..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Software and Malware and including the General Guidance document - GG-8-03 Software and Malware.Talk Description;•	Guidance on the use and installation of software to maintain in..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Access Control and User Authentication and including the General Guidance document -  GG-8-04 Access Control and User Authentication.Talk Description;•	Guidance on control o..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Secure Project Management and Outsourcing and including the General Guidance document -  GG-8-05 Secure Project Management and Outsourcing.Talk Description;•	Guida..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Secure Project Management and Outsourcing and including the General Guidance document -  GG-8-06 Information TransferTalk Description;•	Guidance on the secure transfer ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Information Classification and Protection and including the General Guidance document -  GG-8-07 Information Classification and ProtectionTalk Description;•	Guidance on the ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Training talk on Managing Users and including the General Guidance document -  GG-8-08 Managing UsersTalk Description;•	Guidance on managing user accounts –new starters, leavers and change o..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  This form can be used for any design or development work to record activities and changes in the design process.The document has 2 parts: - Design Input Review- Project Planning, Design Controls ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  To assist with control and documentation of changes that occur with regards to any design and development work. This form is to document and authorise change as well as maintain a record of controlled..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  This form allows you identify and record your information assets in order to protect them. Can include software systems, organisational knowledge, and key documents. This form is only mandatory for in..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Form for recording minutes of design review meeting. The form captures information on project/design number, date, items for discussion and required actions. Each action can be assigned a respons..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Form to record and assess a supplier’s continuity management arrangements.The appraisal form includes the following sections:- Scope- Continuity Management Assessment- Continuity Arrangements- Review ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  This form is for recording customer enquiries, details can be added such as contact number and email. Form covers:- Services/product enquiry- Requirements This file has two versions, with ve..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Policy-procedure on management of files, documents and records detailing the arrangements in place to manage own and externally supplied documents, files and records covering;-  Management o..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Policy-procedure detailing the arrangements in place to detect and prevent any technical vulnerability and the control in place within the organisation.Procedure covers;Management of Risks Associated ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  Policy-procedure detailing the arrangements in place to manage the classification of information used within the organisation and how it is protected.Procedure includes;Management of Risks associated ..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  General guidance on the Construction Design and Management regulations 2015 (CDM).Topics include;Duties under CDMPrincipal DesignerDesignerPrincipal ContractorContractorWorker[Information Classificati..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  General guidance to all employees on general information security to increase awareness and ensure everyone knows what their responsibilities are.Topics covered; Purpose of an Information Securit..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  General guidance to all employees on general information security to increase awareness and ensure everyone knows what their responsibilities are.Topics covered; Definition of BackupWhat is inclu..
                  
               
  			     
           
         
                
          
  		  	 
            
              
                
                  
                  General guidance to all employees on on the use and installation of software on computer systems and electronic devices to maintain the required level of information security.Topics covered; Defi..