Debt Collection – An Overview
Risks and Challenges of Indemnity Policies in Secured Lending
NDAs – an overview
A Non-Disclosure Agreement (NDA), also referred to as a Confidentiality Agreement, is a legal mechanism used primarily in employment or business contexts to safeguard confidential information. NDAs are versatile instruments applicable across various scenarios, but their core principle remains the same: one or both parties agree not to disclose specified confidential information. NDAs can either be standalone documents or be incorporated into broader agreements. For example, there may be non-disclosure clauses in an employment contract or a Settlement Agreement, to ensure that proprietary or sensitive information remains confidential. Types of…
ISO 9001 LawNet Quality Standard accreditation
We are proud to announce that once again we have retained our ISO 9001 LawNet Quality Standard accreditation for another year following an outstanding audit. Earlier this month we were audited against the internationally renowned ISO-9001 quality mark standard, which is a requirement of our membership of LawNet (a mutual and member-owned organisation of approximately 70 law firms ranging in size from six to 50+ partners with a network of over 2,000 solicitors). This accreditation comprises the ISO standard interpreted for the law firm environment by LawNet and takes account of the Solicitors…
Companies must be on track for Covid-safe workplace
Companies anticipating a return to the workplace in July, if the Government’s route map stays on track, should be planning how to protect workers and customers once the country is released from the current Covid-related restrictions. Although the Government may decide that it is safe to relax regulations and recommendations around social distancing and large groups, the virus will still be circulating, and individuals could become infected or pass the virus on to others in the workplace. Planning ahead and involving staff in the planning process is the best approach. …
Blog: Five tips for businesses dealing with unpaid invoices
In this blog we suggest 5 tips for businesses dealing with unpaid invoices The coronavirus pandemic has caused financial difficulties for many and could be making the problem of late payments worse for both small businesses, the self-employed and freelancers. Carrying the weight of unpaid invoices really can make doing business challenging. The Forum of Private Business indicates that 1 in 4 businesses fall into insolvency as a result of late payment of invoices. While business owners need to worry about paying suppliers, staff members, rent and bills, unpaid invoices…
Blog: Homeworking and the importance of cybersecurity risk management
Having staff working remotely has presented significant challenges for many businesses, but one of the most difficult to address is the increased cybersecurity risk. As many companies did not have sufficient opportunity to prepare for the transition to homeworking, they may not have identified potential cybersecurity issues. Moreover, it is now much harder to monitor staff and ensure they are following safe practices. Cybercriminals have wasted no time in exploiting these weaknesses, and businesses are encountering threats regularly. Here we look at the cybersecurity risks that homeworking may present to…
Why Big Brother needs to watch out when it comes to employee monitoring
The ‘Big Brother’ surveillance scenario envisaged by George Orwell has long since become reality. The ability to watch citizens outlined in the futuristic novel Nineteen Eighty-Four, published in 1949, is now firmly fact, not fiction. Rolling back to 2013, the British Security Industry Association estimated that the number of CCTV surveillance cameras in the UK numbered some 4 to 6 million and recent estimates put London in the top three cities worldwide having the highest number of cameras by population. This race towards technological surveillance and monitoring saw a further boost during…
How secure is your password?
The need for cybersecurity is more crucial today than ever, with individuals and companies alike relying heavily on hardware and cloud-based servers to store and retrieve secured data, particularly when working remotely during COVID-19 lockdowns. We live in an evolving digital age with consistent advancements in technology, but as technology grows and develops, so do cyberattacks. A brute force attack method is simply trying every possible combination there could be. The colour-coded chart from Hive Systems provides an indication of just how long it would take a hacker to crack…