Compliance Bites are short videos on specific compliance issues, such as insider trading, special category data, tipping off and whistleblowing.
Category | Topic/Issue | Learning Outcome | Compliance Bite | Launch Date |
Protecting Data | Data Protection | What is GDPR | What is the GDPR? | May-23 |
Personal data and special category data | Special category data | May-23 | ||
GDPR Principles 1 | GDPR Principle 1 | May-23 | ||
GDPR Principles 2 | GDPR Principle 2 | May-23 | ||
GDPR Principles 3 | GDPR Principle 3 | May-23 | ||
GDPR Principles 4 | GDPR Principle 4 | May-23 | ||
GDPR Principles 5 | GDPR Principle 5 | May-23 | ||
GDPR Principles 6 | GDPR Principle 6 | Coming Soon | ||
GDPR Principles 7 | GDPR Principle 7 | Coming Soon | ||
Legal bases for data processing | GDPR legitimate interests | May-23 | ||
Legal bases for data processing | GDPR consent | May-23 | ||
Legal bases for data processing | Lawful bases | Coming Soon | ||
Rights of data subjects | Individual rights | Coming Soon | ||
DSARs | GDPR SARs | May-23 | ||
International tranfer of data | GDPR International transfers | May-23 | ||
Responsible use of social media | Responsible use of social media | May-23 | ||
Info Security | What is information security | What is information security? | May-23 | |
What is information security | Information security on the move | May-23 | ||
Information classification | Information classification | May-23 | ||
Phishing | Spot a phishing attempt | May-23 | ||
Phishing | Business email compromise | May-23 | ||
Malware and ransomware | Malware and ransomware | May-23 | ||
Video conferencing | Video conferencing | May-23 | ||
Password protection | Password protection | May-23 | ||
Zero trust model | Zero trust cybersecurity model | May-23 | ||
Multi-factor authentication | Multi-factor authentication | May-23 | ||
Fighting Crime | AML/CTF | What is money laundering | Three stages of money laundering | May-23 |
Money laundering red flags | Money laundering red flags | May-23 | ||
Money laundering red flags | High-net worth individuals | May-23 | ||
Terrorist financing red flags | Terrorist financing red flags | May-23 | ||
Unexplained wealth order | Unexplained wealth orders | May-23 | ||
Money laundering offences in the UK | Preventing tipping off | May-23 | ||
Modern Slavery | Forced labour red flags | Forced labour indicators | May-23 | |
Sanctions | What are sanctions | What are sanctions? | May-23 | |
Behaving Ethically | Bribery | Bribery and its consequences | What is bribery? | May-23 |
Gifts and hospitality | Gifts and hospitality | May-23 | ||
Facilitation payments | Facilitation payments | May-23 | ||
Conflicts of interest | What are conflicts of interest? | May-23 | ||
Conflicts of interest | Corrupt hiring practices | May-23 | ||
Competition | What is competition law | Anti-competitive agreements | May-23 | |
Horizontal agreements | Horizontal agreements | Coming Soon | ||
Vertical agreements | Vertical agreements | Coming Soon | ||
Abuse of dominant position | Abuse of dominant position | May-23 | ||
Fraud | What is fraud? | What is fraud? | Coming Soon | |
The fraud triangle | The fraud triangle | Coming Soon | ||
Identity fraud | Identity fraud | Coming Soon | ||
Corporate fraud | Corporate fraud | Coming Soon | ||
Customer fraud | Customer fraud | Coming Soon | ||
Supplier fraud | Supplier fraud | Coming Soon | ||
Insider fraud | Insider fraud / Employee fraud | Coming Soon | ||
Abuse of position | Abuse of position | Coming Soon | ||
False representation | False representation | Coming Soon | ||
MAR | Insider trading | What is insider trading? | May-23 | |
Reporting | Whistleblowing | What is whistleblowing? | May-23 | |
Staying Safe | Health | Health hazards | Setting up DSE | May-23 |
Safety | COSHH | COSHH | May-23 | |
Electricity | Electricity | Coming Soon | ||
Fire | Fire | May-23 | ||
Manual handling | Manual handling | Coming Soon | ||
Noise | Noise | Coming Soon | ||
Slips and trips | Slips and trips | Coming Soon | ||
Stress | Stress | Coming Soon | ||
Transport | Transport | Coming Soon | ||
Work equipment | Work equipment | Coming Soon | ||
Building Resilience | Equality | Types of discrimination | Direct discrimination | May-23 |
Indirect discrimination | May-23 | |||
Victimisation | May-23 | |||
Nine protected characteristics | The nine protected characteristics | May-23 | ||
Unconscious bias | Unconscious bias | May-23 | ||
Stereotyping | May-23 | |||
Harassment | What is harassment? | May-23 | ||
The three characteristics of harassment | May-23 | |||
The 4D Bystander Intervention Model | May-23 | |||
Managing Risk | Risk | Management of Risk Framework | The management of risk framework | May-23 |
Three lines of defence model | The three lines of defence model | May-23 |