Resource Centre

Laurence Moore

Internet and Email Access Policy

In order to protect the firm, its employees, customers and suppliers, all members of staff should be given a copy of the firm’s policy regarding acceptable use of IT resources – particularly internet, email access, and data protection policies. It may also be necessary to have a separate Bring Your Own Device (BYOD) policy covering the use of personal devices and to what extent (if any) these are permitted to connect to corporate information systems.

Bring Your Own Devices

Some employees will often prefer to use their own personal mobile devices to access company networks/systems. However, this is potentially a security loophole which places the organisation at risk from reputational damage and legal proceedings.

Business Structures

Having made the decision to be your own boss, it is important to decide the best legal and taxation structure for your enterprise. The most suitable structure for you will depend on your personal situation and your future plans. The decision you make will have repercussions on the way you are taxed, your exposure to creditors and other matters.

Could I really make a go of it?

Many people wonder deep down if they could really make a go of running their own business. It is not for everyone but the following is a list of attributes that successful business owners have. You do not need all of these characteristics but ‘go-getters’ have the majority of the qualities.

Data Security - Access

Many businesses are now completely reliant on the data stored on their Network Servers, PCs, laptops, mobile devices and cloud service providers or internet service providers. Some of this data is likely to contain either personal information and/or confidential company information.

3 4 5 6 7