diff --git a/.github/workflows/build-docs.yml b/.github/workflows/build-docs.yml
new file mode 100644
index 00000000..2befa157
--- /dev/null
+++ b/.github/workflows/build-docs.yml
@@ -0,0 +1,28 @@
+name: "Pull Request Docs Check"
+on:
+- pull_request
+
+jobs:
+ docs:
+ runs-on: ubuntu-latest
+ steps:
+ - name: Check out repository code
+ uses: actions/checkout@v3
+ - name: Install prerequisites
+ run: |
+ sudo apt-get --allow-releaseinfo-change update -y && sudo apt-get install -y tox
+ - name: Building RM in HTML
+ run: |
+ cd doc/ref_model
+ echo "---------------------------------------------------------------------------------------"
+ echo "---------------------------------- Building RM in HTML --------------------------------"
+ echo "---------------------------------------------------------------------------------------"
+ tox -e docs
+ echo "Building RM in html was successful! "
+ - name: Store html build result
+ uses: actions/upload-artifact@v3
+ with:
+ name: rm-html
+ path: |
+ doc/ref_model/build
+
diff --git a/doc/ref_model/chapters/chapter07.rst b/doc/ref_model/chapters/chapter07.rst
index e02f9d24..6f9585eb 100644
--- a/doc/ref_model/chapters/chapter07.rst
+++ b/doc/ref_model/chapters/chapter07.rst
@@ -1053,8 +1053,8 @@ In Australia, the telecommunication sector is regulated by the
The ACCC is responsible for the economic regulation of the communications sector, including telecommunications and the
National Broadband Network (NBN), broadcasting and content sectors.
-From the cloud services security perspective, the Australian Cyber Security Centre (ACSC) produced
-`Information Security Manual (ISM) `__,
+From the cloud services security perspective, the Australian Cyber Security Centre (ACSC) produced `Information Security
+Manual (ISM) `__,
is of particular importance. The purpose of the ISM is to outline a cyber security framework that organisations can
apply, using their risk management framework, to protect their information and systems from cyber threats. The ISM is
intended for Chief Information Security Officers, Chief Information Officers, cyber security professionals and