Displaying results 151 - 160 of 162

… the campaign using the digital toolkit available on ProtectUK  Promoting the summer campaign is also a powerful way of using communications as an extra layer of protective security at no extra cost.    The toolkit …
… with neighbouring businesses and contacts can improve your protective security and preparedness to deal with an … sites are nearby, or have shared use of the site being protected, are also likely to play an important part in … The Human Rights Act 1998 Health and Safety Acts  The Data Protection Act 2018  The Fire Safety Order 2005  The Fire …
… or Buckingham Palace. Further advice can be found here: ProtectUK NPSA   1   These are UAV’s which are produced as … chance’. Use the scale below as a reference when reading ProtectUK Insights.   … Threat from Drones in the UK …
… new staff with the information they require. How are data protection risks being managed? In addition to the above, … to staff and visitors. For further information, see: ProtectUK - Advice for security managers during a heightened … The Human Rights Act 1998 Health and Safety Acts The Data Protection Act 2018 Employment Rights Act 1996 Your actions …
… generally if you cannot see the item then you are better protected from it. Think about what you can hide behind. …
… location) should be used as the basis for determining the protective security requirements and identifying appropriate protective security measures.  The temporary nature of an … an event, it is essential to understand the principles of protective security. The measures should cover deterring, …
… sites are nearby, or have shared use of the site being protected, are also likely to play an important part in …
… sites are nearby, or have shared use of the site being protected, are also likely to play an important part in … Safety Order 2005  The Fire (Scotland) Act 2005 The Data Protection Act 2018  Employment Rights Act 1996 It is …
… receiving of visitors etc.). Risk Assessment Regarding protective security and resilience, the best way to manage … resulting business impact. This will help to answer: What protective security and resilience improvements need to be … states the presence of an attack vulnerability, appropriate protective security measures should be applied to reduce the …