article thumbnail

Copyright Law: Using music or other audio in training and presentations

The Logical Blog by IconLogic

Copyright expert Linda Wolff Rohrbaugh states, "That myth arose from an education working group that tried to create safe harbor standards for face-to-face education. To learn more about copyright law as it relates to training and training support materials, check out this vILT course led by Linda and Kevin Siegel.

Music 100
article thumbnail

GDPR came and went: how it impacted our products

Rustici Software

We’ve participated in Safe Harbor and Privacy Shield certifications in the past, which guided our existing policies. In order to support these customers, a new API has been added that makes the data delete operations available, in order to help our customers meet their GDPR obligations. maintenance release.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Latest on LMS Insight – Before you buy

eLearning 24-7

Performance Management. There has been a big uptick in the performance management angle. Some vendors have included performance reviews. Performance Management to me, could be a blessing or a curse. Always ask the vendor if they support your browser version. Some vendors no longer support IE7 for example.

LMS 40
article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Method Count Percent Alongside Formal Learning 26 63% Process Information / Training 22 54% Frequently Asked Questions (FAQ) / Support Information 18 44% Commonly used resources, URL's to applications, documentation, Contact Information, etc. Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not.

Wiki 105
article thumbnail

9 Barriers to Learning (+How to Overcome Them)

WhatFix

Supporting your staff during the transition period. Often, people find safe harbor in doing what they know best and miss out on learning new things or trying their luck at a different job. Nurture two-way communication and be available for support and questions that might arise. Peer pressure. Lack of focus. Examples).

article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

It can be related to installing and maintaining computer networks, running business websites, providing technical support, or programming. What’s alarming is that almost half of them have access to more data than they need to perform their duties. Along with this, safe harbor laws in some U.S. case studies. worksheets.