Displaying results 31 - 40 of 143
… and windows of buildings. Of equal importance is adequate protection of building services and critical internal …
… … This research took place before the Centre for the Protection of National Infrastructure (CPNI) evolved to … to examine the ‘say-do gap’ (Ingram and Reed, 2016). Protection motivation theory might be a fruitful lens of …
Keywords:
Counter Terrorism Policing
, Consequences
, Unintended Consequences
, Research
, Awareness
… associated with relevant legislation such as the Data Protection Act. Will the system be pro-actively monitored or … describing how it is managed in compliance with the Data Protection Act and General Data Protection Regulation (GDPR). If a system of ‘contracted-in’ …
Keywords:
Security Specialists
, Register
, RSES
, Counter Terrorism
, NaCTSO Competent Person Scheme
, NaCTSO CPS
, Competent Person Scheme
, Martyn's Law
, Qualification
, Course
, Business
, Security
, Preparedness
… operating system are promptly installed check the security protection of your home and business Wi-Fi networks. Change … at: www.thinkuknow.co.uk Child Exploitation and Online Protection Centre (CEOP): www.ceop.police.uk … IT security …
… The Terrorism (Protection of Premises) Act requires an assessment of the … numbers please refer to the following factsheet: Terrorism (Protection of Premises) Act 2025: Assessment of the number …
Keywords:
Martyn's Law
, Premises
, Events
, Terrorism Act
, Protection
, Legislation
, Enhanced Tier
, Standard Tier
… 27005 – Information Security, Cybersecurity and Privacy Protection – Guidance on Managing Information Security Risks …
… must comply with the same requirements relating to public protection procedures and notification as at standard tier … place, so far as reasonably practicable, appropriate public protection measures that could be expected to reduce both … premises and their immediate vicinity; document the public protection procedures and measures in place, or proposed to …