End Users Resources
Our founder, Wes Harper is proud to be part of The Worshipful Company of Security Professionals (WCoSP).
The Worshipful Company of Security Professionals is the 108th Livery Company of the City of London. It is a non-profit making organization providing education and health services to members of the security profession.
Security & Counter Terror Expo is the UK's leading national security event. It is a world-class showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe.
Waitrose & Partners is using body worn cameras in a trial of its new in-home delivery service. Drivers enter a customer’s home while they are out and put their groceries away. All delivery drivers will wear Edesix cameras, which will record their movements when they enter a customer’s property.
Under the GDPR, in order to maintain security organisations should evaluate the risks inherent in their processing activities and implement measures to mitigate those risks, such as encryption.
If you were celebrating the Chinese New Year last week, you’ll probably know that 2018 is a Dog Year, according to the 12-year Chinese astrology cycle.
It’s also the year of GDPR: on 25 May the countdown that started nearly two years ago will end and the Regulations will come into effect.
Security & Counter Terror Expo is the UK's leading national security event. It is a world-class showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe.
Surveillance Systems and Data Protection
Robert Wassall, Solicitor and Managing Director DataHelp shares his Top Tips for security installers who have a need to understand how data protection law applies to the systems they install for their customers.
What’s the ‘missing link’ of information security?
This guide offers an overview of what the Data Protection Act (DPA) requires in terms of security. It aims to help Corporate Security Directors and other heads of security decide how best to manage the security of the personal (and other) data their businesses hold by emphasising the importance of putting into place management/organisational security measures, as well as physical and technical/cyber security measures.