• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

80 History courses in Llandudno

Definitive WANs for engineers

5.0(3)

By Systems & Network Training

WAN TRAINING COURSE DESCRIPTION A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory WHAT WILL YOU LEARN * Describe the seven-layer model and realise how it applies to the real world. * Evaluate and describe WAN technologies. * Describe the architecture of WANs in the core. * Use WANS to interconnect LANS. WAN TRAINING COURSE DETAILS * Who will benefit: Technical staff wishing to find out more about how their WAN works. * Prerequisites: Intro to data communications & networking * Duration 5 days WAN TRAINING COURSE CONTENTS * Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. * WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. * History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay * The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. * Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. * Service provider technologies The transport plane, SDH, SONET, DWDM. * WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. * Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. * ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. * The Internet VPNs, IPSEC, QOS. * What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? * MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. * Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.

Definitive WANs for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP TRAINING COURSE DESCRIPTION A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. WHAT WILL YOU LEARN * Demonstrate the threats to WiFi networks. * Secure WiFi networks. * Configure: WPA2 RADIUS 802.1x EAP * Pass the CWSP exam. CWSP TRAINING COURSE DETAILS * Who will benefit: Technical network staff. Technical security staff. * Prerequisites: Certified Wireless Network Associate. * Duration 5 days CWSP TRAINING COURSE CONTENTS * WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. * Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. * Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. * 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. * 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. * SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. * WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. * 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. * Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. * WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. * WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. * VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. * Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Professional Diplomatic Protocol Management

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- The protocol is one of the most modern terms in terms of language but very old in terms of history as the word protocol is a development of the word of the conventions and understandings this is in the world of politics and at the international level, but within the field of business management has become the formulation of protocols is one of the important and necessary skills and very necessary for people who wish to They must take administrative duties. Through this course, we are going to introduce the rules and practices of gentle behaviour, the best practices for communication with others, and good reception, since all such related matters represent a large portion of our personality.

Professional Diplomatic Protocol Management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Definitive VSAT

5.0(3)

By Systems & Network Training

VSAT TRAINING COURSE DESCRIPTION This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. WHAT WILL YOU LEARN * Explain how VSAT is used * Describe the hardware required for VSAT operation. VSAT TRAINING COURSE DETAILS * Who will benefit: Anyone working with VSAT. * Prerequisites: None. * Duration 2 days VSAT TRAINING COURSE CONTENTS * Introduction History of PMR * VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions * VSAT Users What is a VSAT? VSATs - Usage VSATs - Users * VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount

Definitive VSAT
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA TRAINING COURSE DESCRIPTION This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. WHAT WILL YOU LEARN * Describe wireless networking and IoT technologies. * Explain basic RF communications. * Plan wireless solutions. * Describe how to implement wireless solutions. * Use best practices in implementing wireless solutions. CWISA TRAINING COURSE DETAILS * Who will benefit: Anyone working with IoT technologies. * Prerequisites: RF fundamentals. * Duration 4 days CWISA TRAINING COURSE CONTENTS * Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. * Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. * Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. * RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. * Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. * Mobile communications networks Mobile networks, LTE, 5G, Use cases. * Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. * Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. * Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. * Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. * Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. * Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Git and GitHub for engineers

5.0(3)

By Systems & Network Training

GIT AND GITHUB COURSE DESCRIPTION This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. WHAT WILL YOU LEARN * Install git. * Add and edit files in a repository. * Create branches and perform merges. * Handle merge conflicts. GIT AND GITHUB COURSE DETAILS * Who will benefit: Anyone requiring version control. * Prerequisites: None. * Duration 1 day GIT AND GITHUB COURSE CONTENTS * Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. * GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. * Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. * Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. * Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. * Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. * Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. * Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.

Git and GitHub for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£797

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)

4.9(27)

By Nia Williams Miss Date Doctor Dating Coach London, Couples Therapy

A training course for those lacking in confidence and suffering from low self-esteem. Confidence and self-esteem issues can have a very detrimental effect on progressing in your dating life and having healthy relationships. This course will consist of a full assessment of your history. emotions, self-belief, dating history, and insight into how to build your confidence and forge a stronger self-belief pattern and supporting you to become a better and more confident person able to face the ups and downs and challenges of daily life and believing in yourself and knowing you can overcome any obstacle in dating, relationships or daily life. Confidence can be lost when we face negative situations but can be regained with indoctrination and social awareness and emotional intelligence education. https://relationshipsmdd.com/product/how-to-have-confidence-package/ [https://relationshipsmdd.com/product/how-to-have-confidence-package/]

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)
Delivered in-person, on-request, onlineDelivered Online & In-Person in London & 2 more
£1200

Complete JavaScript

5.0(3)

By Systems & Network Training

COMPLETE JAVASCRIPT TRAINING COURSE DESCRIPTION A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. WHAT WILL YOU LEARN * Read JavaScript. * Write JavaScript. * Debug JavaScript. COMPLETE JAVASCRIPT TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to learn JavaScript. * Prerequisites: None. * Duration 3 days COMPLETE JAVASCRIPT TRAINING COURSE CONTENTS * CORE JAVASCRIPT * Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. * Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. * Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. * Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. * Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. * Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. * Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. * Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. * Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. * JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. * Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. * CLIENT SIDE JAVASCRIPT * JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. * The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. * Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. * Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. * Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. * Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. * The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. * Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. * Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. * The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. * Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. * Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. * HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.

Complete JavaScript
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Definitive Kamailio for engineers

5.0(3)

By Systems & Network Training

KAMAILIO TRAINING COURSE DESCRIPTION Kamailio (formerly known as OpenSER) provides a scalable SIP server suitable for small through to carrier grade installations. This course will teach you how to install, configure and troubleshoot the Kamailio product. WHAT WILL YOU LEARN * Install Kamailio. * Control Kamailio. * Configure Kamailio. * Troubleshoot Kamailio. KAMAILIO TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kamailio. * Prerequisites: Definitive SIP for engineers. UNIX fundamentals. * Duration 3 days KAMAILIO TRAINING COURSE CONTENTS * What is Kamailio? What is SER? SER history, OpenSER, versions. Kamailio. Supported platforms, SIP review. Hands on Simple SIP telephony without a SIP server. * Installing Kamailio Downloading Kamailio, Installation from source, package installation, CVS, default passwords Hands on Kamailio installation. * Controlling Kamailio Starting, stopping and controlling Kamailio. Starting Kamailio automatically at boot time. Hands on Controlling the server * First configuration Basic configuration. Hands on SIP telephony with Kamailio. * Monitoring Logs, xlog, openserctl, syslog. Hands on Logging. * Kamailio architecture Kamailio core, Kamailio modules, file locations, persistent data storage, database structure. Hands on Database integration. * Core configuration Keywords, values, parameters, functions, routing blocks, constructs. Hands on Advanced Kamailio configuration. * Module configuration Overview of modules available, AAA integration, least cost routing. Redirects Hands on Configuring modules. * Architectures DNS integration, peering, OSP, NAT traversal, SIP to GSM. Hands on peering. * Asterisk integration Altering tables to work with Asterisk, Asterisk as a voicemail system. Design issues, High availability. Hands on Integrating Kamailio with Asterisk.

Definitive Kamailio for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Introduction to Java programming

5.0(3)

By Systems & Network Training

JAVA TRAINING COURSE DESCRIPTION A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. WHAT WILL YOU LEARN * Describe the Java architecture. * Write Java applets and applications. * Debug Java programs. * Examine existing code and determine its function. * Use multimedia extensions, the awt, multithreading, exceptions within Java JAVA TRAINING COURSE DETAILS * Who will benefit: Those wishing to program in Java. * Prerequisites: Complete C programming * Duration 5 days JAVA TRAINING COURSE CONTENTS * Review of UNIX fundamentals * What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. * C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. * OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. * Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. * Multimedia applets Images, sounds, fonts, colours and animation. * Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. * Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames… * Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. * More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. * Security and Java Types of attack, the security manager, craplets, securing the network. * Integrating legacy code with Java

Introduction to Java programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697
123...8

Educators matching "History"

Show all 8
Snowdonia Adventures

snowdonia adventures

Anglesey.

Mark Handford manages the day to day running of the business, and the company employs a core team of highly experienced and qualified instructors to help deliver courses and adventure activities. Mark holds the following qualifications: Winter Mountain Leader Summer Mountain Leader Rock climbing Instructor RYA Powerboat 2 Coastal endorsement Rescue 3 Europe Swiftwater & Flood Rescue Technician (SRT) Rescue 3 Europe Swiftwater & Flood Rescue Boat Operator (SFRBO) Qualified competent person for inspection of PPE by Helix Tactical BCU Performance Award Sea Kayak (3 Star) & White Water Kayak (3 Star) LCML training Rescue Emergency Care Level 2 1st Aid (REC) Mark is also a National Navigation Award Scheme Gold Level Course Provider and Tutor Course Provider and is the NNAS course moderator for North Wales and Anglesey. He also has membership of the following organisations British Mountaineering Council Mountain Training Association Snowsport Scotland Canoe Wales, The National Governing Body for paddlesports in Wales Fédération Internationale des Patrouilles de Ski National Coasteering Charter Mountain Rescue UK Mark has a long history with mountain rescue. In the UK he was a team member of Ogwen Valley Mountain Rescue Organisation as a trainee in October 2005 and then as a full team member from 2006-2011. Mountain Rescue in Nepal Whilst in Nepal in 2003/4, Mark was a volunteer member of the Nepalese Himalayan Rescue Association and volunteer outreach worker for Medicins Sans Frontiers in Manang, Nepal. Lowland Rescue Association Mark was a founding member and training officer for the first Lowland Rescue Team in Wales, Mon-SAR from 2015 – 2017 and has the following qualifications Lowland Rescue Search Technician Search Party Leader Instructor Search Manager and Planner Lowland Rescue Search Technician Assessor TAQA – Training, Assessment & Quality Assurance, Level 3 IQA – Internal Quality Assurance, Level 4 SARMAN software qualified for search management Specialist Search Dogs Mark is a qualified, assessed by David Jones and Gavin Roberts, cadaver search dog handler with his spaniel ‘Missy’. He has delivered presentations at seminars for land and water search with search dogs, as well as conducted ongoing searches in the UK for missing persons. Mark has also attended IKAR conferences for continued professional development. Whilst working as a consultant for International Rescue Training Centre Wales, he also help develop the Dangerous Dogs Handling course and delivered it to numerous candidates in the UK and also to environment agency and council officers in Northern Ireland. Also whilst at IRTCW he also helped organise, deliver and present at two specialist water search seminars, the first at Hawley Lake by Gibraltar Barracks and then at Trent Lock, Nottingham. Rafting in Nepal In 2003 he was part of a team providing the first commercial white water rafting expeditions with Equator Expeditions, undertaking an expedition on the mighty Sunkoshi River as well as the upper and lower sections of Bohte Koshi.

Wrexham Foyer

wrexham foyer

Denbighshire,

In this document the expression ‘we’ refers to, ClwydAlyn Housing Limited, Tir Tai Limited, PenArian Limited and Tai Elwy Limited, that provides housing and related services across North Wales. Each entity is the controller of its own personal data although data may be processed by other Group members on its behalf This privacy notice sets out how ClwydAlyn collects and uses information about you. Please read this privacy notice carefully to understand how we will use your personal information. If you have any questions or queries in relation to this privacy notice, you can contact our Data Protection Officer at: datacontroller@clwydalyn.co.uk 72 Ffordd William Morgan, St Asaph Business Park, St Asaph, Denbighshire, LL17 0JD 0800 1835757 (freephone from a landline) or 01745 536800 This privacy notice explains: What information we may collect about you How we use your information Contacting you Sharing your information Our legal basis for collecting, holding and using your information Security and storage of your information Your rights 1.What information we may collect about you The information we collect about you depends on why we are dealing with you. For example, if you make a housing application or become one of our tenants, we will need more information from you than if you are merely making an enquiry. We may collect the information about you in the following circumstances: If you call our Contact Centre When you call our contact centre we collect Calling Line Identification (CLI) information. We use this information to help improve its efficiency and effectiveness. We record calls for training and monitoring purposes. Additionally, our call handlers will make a record of your call in order to manage your query. We may need to share information with other organisations within or outside ClwydAlyn in order to respond to your call, for example so that we can organise maintenance or repairs or other support. We will usually tell you if it is necessary for us to pass information on to other organisations. If you email us Any email sent to us, including any attachments, may be monitored and used by us for reasons of security and for monitoring compliance with office policy. Email monitoring or blocking software may also be used. Please be aware that you have a responsibility to ensure that any email you send to us is within the bounds of the law. If you make a complaint to us When we receive a complaint from a person we make up a file containing the details of the complaint. This normally contains the identity of the complainant and any other individuals involved in the complaint. We will only use the personal information we collect to process the complaint and to check on the level of service we provide. If a complainant doesn’t want information identifying him or her to be disclosed to any person that the complaint is about, we will try to respect that. However, it may not be possible to handle a complaint on an anonymous basis. Similarly, where enquiries are submitted to us we will only use the information supplied to us to deal with the enquiry and any subsequent issues and to check on the level of service we provide. If you use our services We hold the details of the people who request and use our services so that we can provide these services and for other closely related purposes. For example, we use information about our service users to develop and improve our services and to make sure we are delivering services to different groups fairly. If you apply for housing or become a tenant, there is certain information that we require in order to process your application and manage your tenancy. If you do not provide us with this information, we will not be able to progress your application. When you visit our websites We automatically collect certain information when you visit one of our websites. Please see Use of Cookies below for more information about this. When you use our customer portal, you are able to view information held in our housing management system, including personal details, account statements, tenancy information, repair history and pay your rent / service charges. Please note that we use a third party provider, Verseone to support our customer portal. Information we receive from others We work closely with other organisations, such as local councils, police forces, voluntary sector organisations, other housing providers and our contractors, and we may receive information about you from them. If you visit our premises We may ask you to sign in and out if you visit staff or residents at our premises. Access is controlled for the purposes of building and occupant security. Access is recorded to assist with fire and other evacuation procedures. Furthermore, your image may be captured on CCTV to monitor and collect visual images for the purpose of security and the prevention and detection of crime. If you use our Wi-Fi or computer to access our IT systems, access and activity may be monitored to prevent misuse of Group property, according to our IS Corporate policies. Job applicants When individuals apply to work for us, we will only use the information they supply to us to process their application and to monitor recruitment statistics. Where we want to disclose information to a third party, for example where we want to take up a reference or obtain a ‘disclosure’ from the Criminal Records Bureau we will not do so without informing them beforehand unless the disclosure is required by law. Personal information about unsuccessful candidates will be held for 12 months after the recruitment exercise has been completed; it will then be destroyed or deleted. We retain de-personalised statistical information about applicants to help inform our recruitment activities, but no individuals are identifiable from that data. Once a person has taken up employment with us, we will compile a file relating to their employment. The information contained in this will be kept secure and will only be used for purposes directly relevant to that person’s employment. Once their employment with us has ended, we will retain the file in accordance with the requirements of our retention schedule and then delete it. If you are a member of one of our Boards, Committees or Panels We may ask for personal details for managing and statistical purposes. 2.How we use your information We process your personal information primarily in connection with managing our housing services. If you are a tenant, this includes managing your tenancy and dealing with any applications, queries or complaints that you make. Examples of how we use your information include: to confirm your identity to assess your suitability to access any of our services to manage your tenancy, care or support to ensure our properties are appropriately maintained and in accordance with legal obligations, such as periodic gas safety checks to notify you about important changes to our services to let you know about other relevant services, both ours and those of other parties whose products and services we have agreed should be made available to you (see the section below on 'Contacting you' for more information about this) to update and correct our records to carry out statistical and market analyses, including benchmarking exercises, to enable us to understand you better and improve our services, and in accordance with our operating Regulations to develop, test and improve our systems to ensure that content of our website is presented in the most effective manner for you and for your computer to administer our website and for internal operations, including troubleshooting, data analysis, testing, research, statistical and survey purposes to comply with other legal obligations, such as Health and Safety laws or safeguarding vulnerable people We may combine information we receive from other sources with information you give to us for the purposes set out above (depending on the types of information we receive). 3.Contacting you We will use your contact information to send you important information via letters, emails, text messages, or otherwise to telephone you. We may record telephone calls for security and training purposes. We may use the information we hold about you in order to provide you with information about our services which we feel may interest you. You can opt out of receiving marketing communications at any time, although please note that we will continue to send you important messages about your tenancy. If you have changed your mind about being contacted for marketing purposes, please contact our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800 to update your preferences. 4.Sharing your information We do not sell your information to any third party, but in certain limited circumstances we may disclose your personal information to: any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 736 of the UK Companies Act 1985; and/or other third parties in the following circumstances: if we are under a duty to disclose or share your personal data in order to comply with any legal obligation; in order to enforce or apply our terms and conditions and other agreements; to protect the rights, property, or safety of ClwydAlyn, our customers, or others; to investigate or prevent a crime. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction; to obtain any professional advice; and/or with your consent. 5.Our legal basis for collecting, holding and using your information Data protection law sets out various lawful legal bases (or ‘conditions’) which allow us to collect, hold and use your personal information: Where you have entered into a contract or contracts with us, we may need to use your information to provide you with our services. An example of this is where you have a tenancy with us. Where we are under a legal obligation which requires us to process your personal information. For example, notifications of Health and Safety incidents. We will sometimes use your personal information based upon your consent. We will always tell you where this is the case and ask you to agree before we process your information. An example of using your personal information with your consent is publishing your image as part of a photograph on our website. Finally, sometimes it is necessary to process your personal information for the purposes of our own legitimate interests. We will only do so where these interests are not overridden by the interests and fundamental rights or the freedoms of the individuals concerned. An example of this is when we may contact you about your experience of contacting our Customer Services Team or a recent repair to your property. Data protection law recognises certain "special categories" of personal information, which is information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information for uniquely identifying a person, information concerning health, and information concerning a person's sex life or sexual orientation. Information about criminal offences and records is placed in a similar category. These special categories of personal information are considered particularly sensitive and so we will only collect and use this information where you have given us your explicit consent or where we consider it necessary to do so. 6.Security and storage of your personal information The information about you that we collect may be transferred to, and stored at, a destination outside the European Economic Area (EEA). It may also be processed by staff operating outside the EEA who work for one of our suppliers. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. We will generally keep personal information about you no longer than is needed for as per our Retention Policy. 7.Your rights You have the right to request from us access to your own personal information. This is sometimes known as a 'subject access request'. You also have the right to ask us not to process your personal data for direct marketing purposes. We will tell you if we intend to use your data for this purpose or if we intend to disclose your information to any third party for this purpose. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data or by contacting our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800. From 25 May 2018, you will have additional rights to request from us: That any inaccurate information we hold about you is corrected That your information is deleted That we stop using your personal information for certain purposes That your information is provided to you in a portable format That decisions about you are not made by wholly automated means Many of the rights listed above are limited to certain defined circumstances and we may not be able to comply with your request. We will tell you if this is the case. If you choose to make a request to us, we will aim to respond to you within one month. We will not charge a fee for dealing with your request.