• About Us
    ▼
    • Message from the Founder
    • Our Purpose
    • Our Company Values
    • Our Team
    • FAQ’s
  • Training
    ▼
    • Bespoke Training
    • Online Courses
    • Data Protection
      ▼
      • Data Protection Officer (DPO)
      • Data Protection (GDPR) Overview
      • Data Protection Impact Assessment (DPIA)
      • Advanced Data Protection Officer Training (DPO)
      • A.I. and Data Protection
      • Cyber Security & Data Protection
      • Data Protection for Investigators & Litigation Support Services
      • Records Management
      • The New Data Use and Access Bill
    • Subject Access Requests
      ▼
      • Subject Access Request and Redaction (SAR Training)
      • Advanced Subject Access Request and Redaction of Information Training
    • RIPA for Local Authorities
      ▼
      • Authorisation and Oversight for Senior Officers
      • A Practical Approach for Enforcement Officers
    • Caldicott Guardian
      ▼
      • Caldicott Guardian
      • Advanced Caldicott Guardian Masterclass
    • Senior Information Risk Owner
      ▼
      • Senior Information Risk Owner
      • Advanced Senior Information Risk Owner
    • Additional Courses
      ▼
      • Safer Recruitment
      • Data protection for cyber security
      • Information Asset Owner (IAO)
      • Freedom of Information (FOI) & Environmental Information Regulations (EIR)
      • Board Briefings / Senior Staff Training
      • Marketing, Fundraising and Data Protection
      • CAF Aligned NHS DSPT Update
  • Services
    ▼
    • Audits
      ▼
      • GDPR Audit
      • DSP Toolkit Audit & Support
      • Physical Security Review
      • Data Protection Impact Assessment
    • Managed Support
      ▼
      • Managed Caldicott Guardian Service (CG)
      • Freedom of Information Requests (FOI)
      • Incident and Breach Management
      • Subject Access Requests / Redaction
      • DSP Toolkit Guidance / Assurance
      • Managed Data Protection Service (DPO)
      • Information Sharing
    • Policy Creation & Review
      ▼
      • Policy Creation & Review
      • DPIA Assessment & Support
  • Industries
    ▼
    • Charities
    • Education
    • Emergency Services
    • Health & Social Care
    • Hospices
    • International
    • Private & Commercial Business
    • Technology Sector
  • News
  • Course Enquiry
  • Contact Us
  • 01904 21 77 88
  • info@bls-ltd.co.uk
Skip to content
  • 01904 21 77 88
  • info@bls-ltd.co.uk
Linkedin X-twitter
  • About Us
  • Training
  • Services
  • Industries
  • News
About Us

Our Founding
Principals

Our Founding Principals are immersed in our core values and maintaining our integrity.

Our Purpose

We support organisations justify how and why they use people’s personal information.

Our Company
Values

We have established ourselves as one of the most respected Data Protection consultants in the UK.

Our Team

We work to understand each of our clients’ unique needs. We tailor our approach to suit you.

FAQ's

Find answers to the most common queries about data protection, compliance, and information governance.

Bespoke Training
Our In House bespoke training is designed around your needs
Online Courses
Find out when our next online courses are and book here
Contact Us
If you have any questions about our services
Training
Data Protection

Data Protection Officer

Data Protection Officer

Data Protection (GDPR) Overview

Data Protection (GDPR) Overview

Data Protection Impact Assessment (DPIA)

Data Protection Impact Assessment (DPIA)

Advanced Data Protection Officer

Advanced Data Protection Officer

A.I. & Data Protection

A.I. & Data Protection

Cyber Security & Data Protection

Cyber Security & Data Protection

Data Protection for Investigators & Litigation Support Services

Data Protection for Investigators & Litigation Support Services

Records Management

Records Management

The New Data Use and Access Bill

The New Data Use and Access Bill
Subject Access Requests

Subject Access Requests & Redaction (SAR Training)

Subject Access Requests & Redaction (SAR Training)

Advanced Subject Access Request & Redaction of Information Training

Advanced Subject Access Request & Redaction of Information Training
RIPA For Local Authorities

Authorisation & Oversight for Senior Officers

Authorisation & Oversight for Senior Officers

A Practical Approach for Enforcement Officers

A Practical Approach for Enforcement Officers
Caldicott Guardian

Caldicott Guardian Training

Caldicott Guardian Training

Advanced Caldicott Guardian

Advanced Caldicott Guardian
Senior Information Risk Owner

Senior Risk Owner Training

Senior Risk Owner Training

Advanced Senior Risk Owner Training

Advanced Senior Risk Owner Training
Additional Courses

Safer Recruitment

Safer Recruitment

Cyber Security & Data Protection

Cyber Security & Data Protection

Information Asset Owner

Information Asset Owner

Freedom of Information & Environmental Information Regulations

Freedom of Information & Environmental Information Regulations

Board Briefings / Senior Staff Training

Board Briefings / Senior Staff Training

Marketing, Fundraising & Data Protection

Marketing, Fundraising & Data Protection

CAF Aligned NHS DSPT Update

CAF Aligned NHS DSPT Update
Course Enquiry
Bespoke Training
Our In House bespoke training is designed around your needs
Online Courses
Find out when our next online courses are and book here
Contact Us
If you have any questions about our services
Training
Data Protection

Data Protection Officer

Data Protection Officer

Data Protection (GDPR) Overview

Data Protection (GDPR) Overview

Data Protection Impact Assessment (DPIA)

Data Protection Impact Assessment (DPIA)

Advanced Data Protection Officer

Advanced Data Protection Officer

A.I. & Data Protection

A.I. & Data Protection

Cyber Security & Data Protection

Cyber Security & Data Protection

Data Protection for Investigators & Litigation Support Services

Data Protection for Investigators & Litigation Support Services

Records Management

Records Management

The New Data Use and Access Bill

The New Data Use and Access Bill
Subject Access Requests

Subject Access Requests & Redaction (SAR Training)

Subject Access Requests & Redaction (SAR Training)

Advanced Subject Access Request & Redaction of Information Training

Advanced Subject Access Request & Redaction of Information Training
RIPA For Local Authorities

Authorisation & Oversight for Senior Officers

Authorisation & Oversight for Senior Officers

A Practical Approach for Enforcement Officers

A Practical Approach for Enforcement Officers
Caldicott Guardian

Caldicott Guardian Training

Caldicott Guardian Training

Advanced Caldicott Guardian

Advanced Caldicott Guardian
Senior Information Risk Owner

Senior Risk Owner Training

Senior Risk Owner Training

Advanced Senior Risk Owner Training

Advanced Senior Risk Owner Training
Additional Courses

Safer Recruitment

Safer Recruitment

Cyber Security & Data Protection

Cyber Security & Data Protection

Information Asset Owner

Information Asset Owner

Freedom of Information & Environmental Information Regulations

Freedom of Information & Environmental Information Regulations

Board Briefings / Senior Staff Training

Board Briefings / Senior Staff Training

Marketing, Fundraising & Data Protection

Marketing, Fundraising & Data Protection

CAF Aligned NHS DSPT Update

CAF Aligned NHS DSPT Update
Services
Audits

GDPR Audit

GDPR Audit

DSP Toolkit Audit & Support

DSP Toolkit Audit & Support

Physical Security Review

Physical Security Review

Data Protection Impact Assessment

Data Protection Impact Assessment
Policy Creation & Review

Policy Creation & Review

Policy Creation & Review

DPIA Assessment & Support

DPIA Assessment & Support
Managed Support

Freedom of Information Requests (FOI)

Freedom of Information Requests (FOI)

Incident & Breach Management

Incident & Breach Management

Subject Access Requests / Redaction

Subject Access Requests / Redaction

DSP Toolkit Guidance / Assurance

DSP Toolkit Guidance / Assurance

Managed Data Protection Service (DPO)

Managed Data Protection Service (DPO)

Managed Caldicott Guardian (CG)

Managed Caldicott Guardian (CG)

Information Sharing

Information Sharing
Bespoke Training
Our In House bespoke training is designed around your needs
Online Courses
Find out when our next online courses are and book here
Contact Us
If you have any questions about our services
Industries

Charities

Education

Hospices

International

Emergency
Services

Health
& Social Care

Private & Commercial Business

Technology

Other Industries
Bespoke Training
Our In House bespoke training is designed around your needs
Online Courses
Find out when our next online courses are and book here
Contact Us
If you have any questions about our services
News & Information

Navigating the Future of Health Data: Why Caldicott Guardian Training and Managed Services Matter More Than Ever

Image shows an example of items typically used for an DSPT audit, such as post it notes, pen, magnifying glass and paper.

What changes are expected for the DSPT in 2025-2026?

Image shows blue password locks against a computer harddrive background made up of blue and yellow flashing lights, representing data protection and information governance in the context of cyber threats

Reinforcing Business Trust Through Information Governance: What the NCSC Report Reveals

The image shows a cartoon man in a white shirt and blue pants staring at a cartoon, oversized computer screen. The screen is showing red warning signs and 'danger' signs, with a red skull and crossbones coming out of an envelope, red crosses and warning signs above scribbled text pages, and pop up boxes with scribbled text warnings, all written in red. This is to demonstrate a data breach.

What to do in a data breach

All News
Contact Us

The Election and Data Protection

A white sign stands on the corner of a pathway ahead of a large, beige stoned building. It reads 'polling station'. To the left, a row of white terraced houses with cars parked outside can be seen.

What happens to your personal data during a general election? 

Don’t forget your training requirements for your DSPT submission!

A white desk featuring a laptop, calendar printed on white paper and a clipboard with a checklist attached via a bulldog clip.

It’s less than one month until the deadline for Data Security and Protection Toolkit submissions

It’s our tenth anniversary!

anniversary

We’re celebrating 10 years of success!

Does your DSPT submission require an external audit?

Two hands hold orange paper post-it notes. The left hand has a pen between the fingers. The fingers have black nail varnish on.

The next Data Security Protection Toolkit (DSPT) deadline is 30th June 2024 and, by now,

What is a physical security audit?

A grey metal pin pad with numbers 0 to 9 is secured to a grey wall.

And what does it entail?

Completing the DSP Toolkit

Image shows a black background with white post it nores and a black and white pen. There are crumpled bits of paper above that.

The DSPT deadline of 30th June is fast approaching.

Artificial Intelligence – explaining decisions made through AI

A hand is centre of the screen. It is blue and appears to have computer coding written across it in the light.

The Information Commissioner’s Office (ICO) has worked in collaboration with The Alan Turing Institute (The

The Importance of Safer Recruitment

Image of yellow tape with black writing stretches across an out of focus road behind it. The writing reads CRIME SCENE DO NOT CROSS.

How vetting and recruitment processes impact the safety of an organisation, and the public 

Writing the DSP Toolkit

Image shows colourful post-it notes fixed to a grey pinboard with drawing pins. They are mostly out of focus. The nearest ones to the camera are pink and one of them has 'Impactful' written on it in black ink.

Have you started yet?

Adult-only services and The Children’s Code

A grey laptop is open on a wooden desk, showing a calculator on a children's purple and brown background. There is a children's arm, hand and hair visible wearing a black outfit. The photo is taken from the left hand side.

Adult only Information Society Service (ISS) providers may not be intended for access by children,

← Previous
Next →

Upcoming Open Courses

03 Mar

Data Protection (GDPR) Overview

Tuesday, Online Training
Course Detail
04 Mar

Data Protection Impact Assessment (DPIA)

Wednesday, Online Training
Course Detail
05 Mar

Marketing, Fundraising and Data Protection

Thursday, Online Training
Course Detail
11 Mar

Senior Information Risk Owner (SIRO) Training

Wednesday, Online Training
Course Detail
17 Mar

Caldicott Guardian

Tuesday, Online Training
Course Detail
18 Mar

Data Protection For Cyber Security

Wednesday, Online Training
Course Detail
No event found!
  • Reg: 09027319
  • 01904 21 77 88
  • info@bls-ltd.co.uk
  • BLS Stay Compliant,
    Blake House,
    18 Blake Street,
    York,
    YO1 8QG
Lost your password?
Cyber Essentials
Jersey Chamber of Commerce
Twitter Linkedin-in
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}