At the end of the course, trainees will be able to: » Define information security and identify why it’s important. » Identify types of information that need to be secured. » Appreciate different threats in relation to information and distinguish between threats. » Comply with organisational procedures and best practice to maintain information security.
At the end of the course, trainees will: » Recognise the purpose and identify the key principles underpinning the Act » State who the Act applies to » Explain the provisions for making and handling requests under the Act » Identify the criteria, fees and time-scales relating to FOI requests
This course on Workstation Setup looks at how you can setup your workstation so that you can be as comfortable as possible and so that it can help you avoid any future health problems. At the end of the course, trainees will: » Understand the importance of setting up your workstation. » Identify correct use of DSE equipment.