Trending Sources

Notes from the ACLU Privacy & Technology conference

The Learning Dispatch

Heather Poggi-Mannis , MicroAssist’s security training product manager, attended the ACLU Privacy and Technology conference at the AT&T Conference Center at the University of Texas Austin. The purpose of the conference was to start conversations about privacy, how technology can be used to violate it and what is being done to protect privacy rights. read more

Delivering Online Training Securely

Mindflash

Moving your training online can dramatically reduce your costs and make training more convenient and enjoyable for your trainees, but it can also introduce concerns about security. At Mindflash we take security extremely seriously and have gone to great lengths to protect all our customers’ content and ensure their training materials are only accessed by their trainees.

Blockchain Solutions for Cyber & Data Security

Your Training Edge

In the world of increasing cyber-crimes and businesses’ struggle to cope with data security, its regulation and privacy concerns, can blockchain be a great relief? Previously in our posts at yourtrainingedge.com [1] , we have discussed the potential of blockchain in terms of security and privacy of the transactions. In this post, we will see this in a more comprehensive way to reveal its capabilities specifically for cyber and data security proposes. A diverse form of cyber security would integrate a consensus process for these control systems.

Mobile Learning: 3 Security Threats & 7 Ways to Beat Them

CommLab India

However, security and privacy issues in mobile learning may play spoil sport. Malware/viruses, system and data security, users’ privacy, Copyright and Intellectual Property Right (IPR) issues pose challenges in the path of mobile learning. This post discusses the security concerns associated with mobile learning and ways to overcome them. Users’ Privacy.

The Top 5 Things Organizations need for Mobile Learning

Your Training Edge

Making the mobile learning secure. Security continues to be the biggest barrier in the way of mobile learning adoption, stated by many of the organizations surveyed in some latest studies conducted. Featured Posts Learning & Development MOOC Training content development effective elements mobile learning mobile metrics secure mobile learningThe content development.

Computer Security Games for Download (includes Flash source files)

Take an e-Learning Break

OnGuardOnline.govprovides practical tips from the federal government and the technology industryto help you be on guard against internet fraud, secure your computer, andprotect your personal information. These video tutorials show you step-by-stephow to change the preferences in your internet software to enhance privacy,safety, and security. The websitehas lots of great games that can be downloaded and included in your training -the download includes both published and source files! Check itout: [link

The eLearning Security Leak

eLearning Weekly

Is elearning a hot spot for internet security and corporate privacy? Tags: Theory eLearning corporate privacy Engadget internet security LMS technology Words and images spread fast online. Internet 2.0 In elearning, we are in the business of putting images together to train employees and clients. Now That's a Screenshot! minute.

Learning Analytics: A great boost for creating Learner Centric eLearning

Raptivity

Managing data privacy, security and associated cost is also a challenge. I am sure you already know about ‘analytics’. This term has been creating a lot of buzz for the past few years. It’s the process of collecting data, discovering meaningful patterns from it and transforming it into fact-based insights. Then does it have any relevance to eLearning? Well, yes. Is it useful?

Adobe Captivate: Mac Cures

I Came, I Saw, I Learned

  Click  Security & Privacy.     Select the  Privacy  category and, from the  Allow the apps below to control your computer area , select Adobe Captivate.app.   Fortunately, both problems are easily fixed. First, quit Captivate and then open your Mac's System Preferences ( Apple > System Preferences ). 

Mitigating the Risks of BYOD in corporate learning

G-Cube

However, this trend comes with its own set of challenges and Security is the top concern that most organizations have with the policy of BYOD. The solution is to not ban the policy of BYOD but put up measures to ensure the security of corporate data – across the multiple devices that the employee uses to access the data. The learners thus can view them all within the LMS.

The Top 5 Things Organizations need for Mobile Learning

Your Training Edge

Making the mobile learning secure. Security continues to be the biggest barrier in the way of mobile learning adoption, stated by many of the organizations surveyed in some latest studies conducted. Like me, if you have also been engaged in this industry, you would always have immense understanding and recognition for the direction where the learning is led. The content development.

Is harboring eLearning data safe again?

LearnUpon

The secure management of learner and client data should be a priority for all teams and companies that deliver eLearning. After a recent ruling declared the Safe Harbor Privacy Principles invalid, many LearnUpon customers asked: what now for EU-US personal data transfer? Safer harbors: Privacy Shield. Privacy Shield should be much less ambiguous than Safe Harbor.

Just for me learning

Learning with e's

Clearly there are security and privacy issues to be addressed, but another trend is that learning is now becoming more untethered and we are witnessing a decline in the use of training rooms. I took part in a very interesting panel discussion with several other keynote speakers during the Adult Learning Symposium last week, in Singapore. Unported License.

Making Spectacles of ourselves

Learning with e's

As with any other wearable technology that captures and shares images and video, there are issues around privacy and misuse. But balancing up the social concerns against the benefits of such a device, there are also possibilities for the improvement of personal safety and security. Remember Google Glass ? It was never brought to market. These will need to be addressed, certainly.

Feeding Your Learning Ecosystem

JPL Learning

You also have security, privacy and policy considerations. There are more options than ever before for people to engage in learning. The Internet is rich with content and networks where you can tap into specialized knowledge and content. As a leader in learning and development, you too have more options than ever before for developing and delivering training.

Are YOU HIPAA (TX HB 300) Compliant in Texas?

OpenSesame

Federal and state laws require patient medical information be protected and secured. . Protecting sensitive medical information can be challenging with today’s security breaches. Your Texas organization must know how to protect and secure sensitive medical information. Covered entities must ensure that employees have a signed statement verifying that they were trained on HIPAA Privacy and Security. Federal HIPAA Privacy and Security fines range from $100 to $1.5 It’s the law! Few things are as personal, private, or important as medical records.

Course of the Week: Improve Your Computer Literacy

OpenSesame

For additional resources on cybersecurity, check out our blog post from earlier this month on how to avoid security “frights” , as well as our guest post on StaySafeOnline.org which details how OpenSesame protects our employees and customers. . Privacy is a major topic of discussion today, both in the media and in business. Increase your security (and create unbreakable passwords!)

Quick Tips to Rollout HIPAA Awareness Training

CommLab India

This helps your employees understand what benefits will walk-in if they comply with HIPAA and the drawbacks they face if they fail to comply.Real life case studies that depict the unintentional revelation of patient privacy data, disclosing health information for commercial advantages and more can be discussed so that your employees understand how important it is to comply with HIPAA.

Host Your Corporate Training Videos on Your LMS – Why & How

CommLab India

Ensure the privacy and confidentiality of organizational information. These video hosting providers have their own security and privacy features, so your training videos are hosted in a secure place. There are many sites you can host your corporate videos on – for free. You can even host your corporate training videos on them. But that’s not a wise choice.

See the Results from Our 2014 Learning and Remembering Survey

Bottom-Line Performance

Security & Investigations. Compliance: AGSL, ACL, Privacy Act, Anti Money Laundering. We received a variety of thoughtful responses to our two-question survey on learning and remembering. Their was a wide diversity in respondents: 34 individuals from 21 different industries participated. Manufacturing. Medical Device and Diagnostics. Biotech. Pharma. Defense. Higher Education.

Our Digital Future 2: Smart clothing

Learning with e's

Administrators will be cautious about 'privacy issues', and misuse and will express concerns about security of data. We can't accurately predict what will happen in the future, but we expect it will be different to anything we have already experienced. One recent disruptive innovation is mobile technology. Wearable connected technologies are now common place. Unported License.

How Big Data Will Shake Up eLearning

OpenSesame

For one thing, the increasing usage of personal data goes hand in hand with raised concerns about the privacy and security of individuals. Data privacy regulations vary from country to country and the level of worry about privacy issues varies accordingly. This type of thinking can equally be applied to corporate Learning and Development. Time to get personal.

Google Course Builder: Initial Review

LearnDash

Data Privacy and Security. Not too long ago, Google came out with a Course Builder program, designed to allow schools and institutions an easy way to set-up their own MOOC platform. Today, I decided to take a look at the program to get a sense of their offering and what it can do. Naturally, I have some high expectations, I mean, this is Google after all. Coolhunting.

Google 107

Slack Vs. Hipchat: Which Works Best for Informal Learning?

eLearningMind

When working in an industry with strict privacy standards (think medical or financial) it’s not appropriate to share via an open communication tool. Still, corporate social media networks on secure servers are a possibility–with the proper privacy considerations, of course. Full disclosure: At eLearning Mind, we love Slack. Both are methods for informal communication.

Standard Options Apply

MakingBetter

Some in the LTSC are very familiar with the European Union’s policies on privacy, security, data ownership and the rights of individuals in digital spaces. Anyone who’s built an LRS themselves loathes the complexity of the work that will be involved in figuring out the privacy, security, data ownership, transport and exchange mechanisms that we’ve put off because they were too complex… but if we want real international adoption of xAPI, this will need to be addressed for the European Union. This is a long read. So here goes. It works.

To BYOD or not to BYOD at work? That is the question

Matrix

How can the company be sure that all sensitive data is always secure? How can data privacy of employees can be protected? IT support, mobile device management, and ways to ensure security of data are at the top of the expenses. Learning at work happens all the time in this knowledge-based economy, and it’s not always between office walls. Why is that? Go BYOD! Go BYOD!

Office 365 Video: Your Corporate YouTube

Visual Lounge

I’ve been a long time fan of Camtasia and doing screencasts, but at work, we lacked a secure way to share these videos. When I heard about Office 365 Video being added to SharePoint online, I knew instantly that I’d want to take advantage of that as a way to securely share training videos with others. Office 365 Video addresses the gap left by YouTube’s wide open security.

e-Clippings (Learning As Art): "World Privacy Forums Top Ten Opt Outs"

Mark Oehlert

» October 31, 2007 "World Privacy Forums Top Ten Opt Outs" Click here for info on opting out of everything from telemarketer calls to junk mail. October 31, 2007 in Errata | Permalink TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference "World Privacy Forums Top Ten Opt Outs" : Comments The comments to this entry are closed. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « "US House approves extension to Net tax ban" (Washington Post) | Main | Hey Designers! del.icio.us books futures Web 2.0

Close Healthcare Compliance Gaps with Online Training

CommLab India

Risks can be broadly classified as follows: Risk of data or privacy breaches when using electronic health records. Risk of data or privacy breaches by employees. According to a study by Experian Data Breach Resolution and Ponemon Institute, 55% of companies surveyed experienced security incidents due to malicious or negligent employees. Such learning is less likely to stick.

xAPI, LRS – The Interview

eLearning 24-7

My next questions are related to privacy and security. It’s entirely dependent on a couple of variables that would be hard to specify, let alone standardize, because every country has different privacy laws — even different states in the US have different data privacy laws now. Today’s post is quite unique since it takes a different path than previous posts.

ADL 97

There’s More than Scissors and Glue in Our Common Craft Library!

eLearning Brothers

They’re also falling for phishing scams that arrive in their work email inboxes; people keep track of passwords by using sticky notes taped to their monitor, and they’re clueless about privacy online. Privacy Online. Secure Passwords. I recently saw a post on Facebook about how a writer had an amazing story idea before they went to sleep. It makes our job easier.

Hey LMS Santa!

eLearning 24-7

Want to safeguard yourself in terms of privacy? If I want to mention the tracking information add it to your privacy and security paragraph that learners must agree to. I remember the days when Santa would come to my house. We’d leave some carrots for his reindeer, cookies for him (always fresh made by Mom) and milk. Why milk and not booze? . Good question. . Hey Santa!

The Community Responds

MakingBetter

A fourth standard to cover retention policy, privacy, protection, access, delegation and security. What must be accommodated in terms of privacy and security, at a standards level, is unclear. We must also seek out privacy and security laws in other parts. I hoped in my last post that the community would indeed respond with ideas, insights, opinions and concerns. Thank you for your comments on the post, the retweets and feedback on Twitter and for what I’m sure has been a lot of not-public rumination. Ideas. A “write-only” API vs. a “query” API.

The Top 100 Tools for Learning 2012 list is revealed

Jane Hart

Although security and privacy concerns are preventing many organisations from making significant use of public social media tools, there does appear to be an increased interest this year in enterprise social networking and collaboration tools (viz Yammer and Sharepoint ). Once again the list is dominated by free online social tools. But now for the complete 2012 Top 100 Tools list.