Keep up to date with everything IiB, sign up to our mailing list
Thank you for signing up to our mailing list.
Policy Bulletin March 2018
Civil Society Strategy: Public Call for Evidence
The Minister for Civil Society recently announced the launch of a 12–week consultation to inform the new civil society strategy. The government is asking for your opinion on what is working well in civil society, and what more they can do to support it.
You can find out more about the consultation and share your views here.
Charity Commission Regulatory and Risk Framework
The Charity Commission has published an updated regulatory and risk framework. The framework explains how the commission operates as a regulator, how it decides when and how to engage, and the possible outcomes of its engagement.
Charities are advised to review the updated framework to see how they may be affected by the changes.
New Guidance on User Feedback
Inspiring Impact has released new guidance on how to involve service users in shaping an organisation’s services. The guidance can help you involve users in a way that is useful to them and proportionate to the resources they have available. This guide contains practical examples and tips for getting started.
Read Inspiring Impact’s Involving Users in Shaping your Services.
The Impact Management Programme supports charities to analyse and respond to data they collect, so that they can better use it to change and improve their programmes and services. In supporting this goal, they have developed peer networks around the country where attendees can share their experiences and provide support on impact management. The eventsare free to attend and some travel costs may be covered.
Free Cyber–Crime Guide for Charities
The National Cyber Security Centre (NCSC) has published a free cyber–crime guide for charities. The guide will help charities better understand the types of cyber–attacks they might be vulnerable to and ways they can protect themselves. Please have a look at the NCSC’s guidance for small charities and the threat analysis that prompted it.