Account
Basket
NL
SELECT A STORE:
EUROPE
Belgium
Denmark
Deutschland
España
Finland
France
Ireland
Italia
Luxembourg
Netherlands
Sweden
WORLDWIDE
Asia Pacific
United Kingdom
USA
€ EUR
Please enter more than 3 characters
00 800 48 484 484
Shop
Shop By Category
Books
Standards
Training courses
E-learning & staff awareness
Toolkits
Tools
Software
Penetration testing
Consultancy
Apply for a corporate account
Get 20% off our best-selling cyber security products
Shop by Product
Business continuity (BCM)
CGEIT
CISA
CISM
CISSP
COBIT®
CRISC
Cyber Essentials
Cyber resilience
Cyber security
DORA
GDPR / Data Protection
Information security
ISO 9001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 31000
ISO 38500
ISO 50001
IT governance
ITIL
Management system standards
NIS Directive
PCI DSS
Penetration testing
Risk management
Information
Resources
Blog
Free green papers
Free webinars
Case studies
Press releases
All resources
Information pages
Business Continuity
CGEIT
CISA
CISM
CISSP
COBIT®
CRISC
Cyber Essentials
Cyber Resilience
Cyber Security
Digital Operational Resilience Act
Europrivacy
GDPR / Data Protection
Information Security
ISO 9001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 38500
ISO 50001
IT Audit
IT Governance
ITIL®
IT Management Frameworks
IT Service Management
IT Standards
NIS Directive
PCI DSS
Penetration Testing
Project Management
SOC Audits
Training
Shop by category
Classroom and Live Online Courses
Self-Paced Online Courses
Combination Training Courses
Exam vouchers
Shop all training
Shop by subject
BCM & ISO 22301
CGEIT, CISA, CISM, CISSP, CISMP and CRISC
Cyber Security
DORA
GDPR
ISO 27001
ITIL
Microsoft
PCI DSS
Risk Management
Training information pages
BCM & ISO 22301
CGEIT
CISM
CISA
CISMP
CISSP
CRISC
Cyber Security
GDPR / Data Protection
ISACA courses
ISO 27001
ITIL
PCI DSS
Training solutions
Training Overview
Classroom Training
Live Online Training
Self-paced Online Training
In-House Training
Elearning Training
Training FAQs
Value of Training Certifications
Why Choose IT Governance
Speak to a training expert
Staff Awareness
Useful links
GRC eLearning platform
IT Governance training 2020 brochure
Why choose IT Governance
Speak to an e-learning expert
Request a customised e-learning quote
Speak to an in-house training expert
Shop by product
Complete Staff Awareness E-Learning
Cyber Security for Remote Workers
GDPR
GDPR: Email Misuse
Cyber security
Information security and ISO 27001
PCI DSS
Phishing
Social media
eLearning Get A Little Help
Shop all e-learning
Staff awareness information pages
Data Protection Staff Awareness
Staff awareness overview
E-learning
E-learning FAQs
Training aids
Security awareness programme
In-house training
Featured products
GDPR Staff Awareness E-learning Course
Cyber Security E-Learning Course
Information Security & ISO27001 E-Learning Course
Phishing E-learning course
Tools & software
Shop Tools & Toolkits
Cyber Essentials
GDPR / Data Protection
ISO 50001
ISO 14001
ISO 20000
ISO 22301
ISO 27001
ISO 9001
ITIL
Management System Standards
OHSAS 18001
PCI DSS
Project Governance
Shop all tools
Shop Software
Cyber Risk Management Software
Privacy Management Software
Software Bundles
Shop all software
Shop Templates
GDPR
ISO 27001
All templates
Tools & software information pages
CyberComply portal
Documentation toolkits
Tools & software solutions
Why choose IT Governance
Toolkit FAQs
Featured products
EU GDPR Documentation Toolkit
ISO 27001 Documentation Toolkit
Compliance Manager
Data Flow Mapping Tool
Consultancy
Useful links
Consultancy services
Consultancy case studies
International consultancy
Why Choose IT Governance
Speak to a consultancy expert
Shop Consultancy
Business continuity management
Cyber essentials
Cyber security
GDPR / Data Protection
ISO 27001
Penetration testing
PCI DSS
Shop all consultancy
Consultancy information pages
Cyber essentials
Cyber incident response management
Cyber security
GDPR / Data Protection
ISO 20000
ISO 22301 / Business continuity management
ISO 27001
ISO 50001
IT governance
ISO 9001
ITSM & ITIL®
PCI DSS
SOC audits
Supply chain audit
Consultancy services information pages
Bespoke consultancy
FastTrack™ consultancy
Live online consultancy
Packaged solutions
Featured products
GDPR Gap Analysis
DPO as a service (GDPR)
ISO27001 Gap Analysis
Cyber Incident Response Management
Security testing
Shop Security testing
Certified ethical hacker (CEH)
Cyber essentials
Penetration testing
PCI DSS
Useful links
Security testing overview
Penetration testing
Cyber security testing
PCI DSS
Security testing training
Why choose IT Governance
Speak to a security testing expert
Security testing information pages
Ethical hacking
Penetration testing services
Penetration testing & compliance
PCI DSS services
PCI DSS testing
Speak to a penetration testing expert
Speak to a PCI DSS expert
Featured products
Web application penetration test
Wireless network penetration test
Certified ethical hacker (CEH) training course
PCI DSS staff awareness course
Strengthen your email security practices with 50% off e-learning | Shop now
Version: 2.0. Issue date: 01/01/17.
Acceptable Use Policy
This acceptable use policy sets out the terms between you and us under which you may access our websites (
www.itgovernance.eu
) (
our site
). This acceptable use policy applies to all users of, and visitors to, our site.
Prohibited uses
You may use our site only for lawful purposes. You may not use our site:
In any way that breaches any applicable local, national or international law or regulation.
In any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect.
For the purpose of harming or attempting to harm minors in any way.
To transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material, or any other form of similar solicitation (spam).
To knowingly transmit any data, or send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware, or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware
You also agree:
Not to reproduce, duplicate, copy or resell any part of our site in contravention of the provisions of our terms of website use.
Not to access without authority, interfere with, damage or disrupt:
any part of our site;
any equipment or network on which our site is stored;
any software used in the provision of our site; or
any equipment or network or software owned or used by any third party.
Suspension and termination
We will determine, at our discretion, whether there has been a breach of this acceptable use policy through your use of our site. When a breach of this policy has occurred, we may take such action as we deem appropriate.
Failure to comply with this acceptable use policy constitutes a material breach of the terms of use upon which you are permitted to use our site, and may result in our taking all or any of the following actions:
Immediate temporary or permanent withdrawal of your right to use our site.
Immediate temporary or permanent removal of any posting or material uploaded by you to our site.
Issue of a warning to you.
Legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
Further legal action against you.
Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.
We exclude liability for actions taken in response to breaches of this acceptable use policy. The responses described in this policy are not limited, and we may take any other action we reasonably deem appropriate.
Changes to the acceptable use policy
We may revise this acceptable use policy at any time by amending this page. You are expected to check this page from time to time to take notice of any changes we make, as they are legally binding on you. Some of the provisions contained in this acceptable use policy may also be superseded by provisions or notices published elsewhere on our site.
top
Risk Assessment
Workshop
- 22 Oct