This employment agreement (also known as an employment contract or service agreement) can be used when hiring a new member of staff to determine the key terms of employment including employment conditions, rights, responsibilities and duties of both the company and the employee.
This policy is used to ensure the company's 3rd party suppliers (such as those providing technology software to the company) adhere to certain security standards as required by ISO27001 or SOC2 for instance. Everything after the Introduction can and should be copy and pasted into supplier legal agreements, or else the supplier agreements should reflect this policy. The company may not have such stringent requirements on suppliers processing non-critical data as defined by the company.
Keep it simple. The key element here is that you are recommending them, and you are willing to back it up with a story or two. Don't write too much. Each paragraph should be just 2 or 3 sentences long. If the recipient wants to know more, then your contact details are attached so they can get in touch.
Articles of association are a multi-page document which outline agreed rules and restrictions relating to the way a company is governed, operated, and owned. Use this particular model from the BVCA if you would like to form an article to set out a company’s constitution and to govern the internal management of
company’s affairs. Note: These articles are subject to the requirements of the Companies Act 2006.
This Board Resolution template can be used to change your company name. The language is standard and only requires filling in a few fields.
This Cryptographic Controls Policy details when encryption is required and how encryption keys (private and public) should be managed. It links to a Password Policy and Security Policy, which are typically other policies used as part of an overall Information Security Management System (ISMS), such as those required for ISO27001 and SOC2.
This grievance policy outlines how an employee can raise issues and grievances that may occur within the company. It outlines who they should let know, how to raise the issue and the procedure that would occur once the issue is raised. This document may be used in conjunction with the ISO27001 certification.
This Letter of Intent (LOI) can be used for any commercial transaction, such as confirming interest in a software product with a client. It is purposely kept lightweight and simple, where the key commercial terms can be filled in. It is not a legally binding document, but makes reference to a potentially future "Formal Agreement".
The objective of this policy is to protect the integrity and availability of the Organisation���s information by means of effective antivirus measures. It can be used as part of the ISO27001 certification.
Keep it simple. The key element here is that you are recommending them, and you are willing to back it up with a story or two. Don't write too much. Each paragraph should be just 2 or 3 sentences long. If the recipient wants to know more, then your contact details are attached so they can get in touch.
This policy is used to ensure the company's 3rd party suppliers (such as those providing technology software to the company) adhere to certain security standards as required by ISO27001 or SOC2 for instance. Everything after the Introduction can and should be copy and pasted into supplier legal agreements, or else the supplier agreements should reflect this policy. The company may not have such stringent requirements on suppliers processing non-critical data as defined by the company.
This Letter of Intent (LOI) can be used for any commercial transaction, such as confirming interest in a software product with a client. It is purposely kept lightweight and simple, where the key commercial terms can be filled in. It is not a legally binding document, but makes reference to a potentially future "Formal Agreement".
The objective of this policy is to protect the integrity and availability of the Organisation���s information by means of effective antivirus measures. It can be used as part of the ISO27001 certification.
This grievance policy outlines how an employee can raise issues and grievances that may occur within the company. It outlines who they should let know, how to raise the issue and the procedure that would occur once the issue is raised. This document may be used in conjunction with the ISO27001 certification.
This Cryptographic Controls Policy details when encryption is required and how encryption keys (private and public) should be managed. It links to a Password Policy and Security Policy, which are typically other policies used as part of an overall Information Security Management System (ISMS), such as those required for ISO27001 and SOC2.
This Board Resolution template can be used to change your company name. The language is standard and only requires filling in a few fields.
Articles of association are a multi-page document which outline agreed rules and restrictions relating to the way a company is governed, operated, and owned. Use this particular model from the BVCA if you would like to form an article to set out a company’s constitution and to govern the internal management of
company’s affairs. Note: These articles are subject to the requirements of the Companies Act 2006.
This employment agreement (also known as an employment contract or service agreement) can be used when hiring a new member of staff to determine the key terms of employment including employment conditions, rights, responsibilities and duties of both the company and the employee.