Elementor #4110
About open licences
The majority of resources on the Launch League website are published under open licence. “Open licence” means that the content has been developed for others to use. (And we really want you to use it!)
The open licence content on this website has been developed under the Creative Commons CC 4.0. This means that you can edit, adapt, rebrand and resell to partners. When you use the content, however, you do need to “attribute” the original authors of the content, and ensure that this does not appear to be an endorsement or sponsorship.
In other words, when you use the Launch League content, you should let all stakeholders (entrepreneurs, partners,
funders) know that the content was originally developed by the UK-South Africa Tech Hub and Viridian, through the Launch League initiative.
However, you must do this in a way that the attribution isn’t confused for an endorsement or sponsorship of your programme or organisation by the UK-South Africa Tech Hub, Viridian or Launch League.
To make this easy for you, you’ll see that in each of the main resources, there’s some text that attributes the original authors – so you can just leave this in!
If you’d like more information on how to use open licence content, or what the appropriate attribution is, please contact us.
Open Licence Resources
In this video, we explain the concept of the Launch League open licence resources- you are free to share, copy, adapt and sell these resources with some conditions which are explained in the video.
Need help using Launch League resources?
There’s a lot of content here for you and your hub, and it can be difficult to know where to start. We’d like to help you make the most of our toolkits and resources, so let us know how we can contact you to assist.
Toolkit
Cybersecurity and Data Protection
The Cybersecurity and Data Protection toolkit, developed by the British High Commission Pretoria and the South African Department for Communications Digital Technology, contains free open license tools, templates and guides that equip small businesses with the foundational training materials and resources they need to increase their cybersecurity resilience and take the steps required to becoming compliant with the POPI Act. test
Who should use this toolkit?
Anyone working at a hub who would like to increase their knowledge on cybersecurity and data protection to protect their personal and organisational data and work.
Hub facilitators looking to train up SMMEs on cybersecurity and data protection – core training that is required for any digitally-enabled business.
Anyone looking for free and easy-to-use resources and tools to protect their business or personal information and systems.
Cybersecurity toolkit
There are six cybersecurity toolboxes which comprise introductory learning content and a collection of accessible and free digital tools and downloadable guides that you and your entrepreneurs can use to assess and protect your personal and organisational data and information.
Know what you have
Start by taking an inventory of your devices and accounts to identify your risks and assess what items need to be secured.
Update your defences
Keep your systems updated to boost your digital immunity against threats such as viruses and spyware.
Beyond simple passwords
Strengthen your passwords and use multifactor authentication to protect your devices and accounts.
Prevent phishing and malware
Protect your systems from malware and phishing attacks, which are common and very expensive for small businesses.
Backup and recover
Backup your data and files regularly to safeguard your information should you fall victim to a cyberattack.
Protect your email and reputation
Ensure your brand name and email address are not used by others pretending to be you.
Exercise in a Box
This tool helps hubs and entrepreneurs test and practise their response to cyberattacks. It’s completely free and you don’t have to be an expert to use it.
Data protection toolkit
These resources have been developed for South African small businesses to use to align with the Protection of Personal Information (POPI) Act. This includes process documentation and policy templates. First, start by downloading and reading our POPI Toolkit Guidance document.