Top 10 Data Protection Courses

Ed App

You can even make changes to it if you want, through its intuitive authoring tools. Topics include general principles of the GDPR, user rights, obligations of data controllers, enforcement mechanisms, and liabilities and sanctions. privacy regulations.

How to make compliance training effective & human-centric

eloomi

Cybersecurity breaches, data privacy neglect, discrimination, and violation of regulations – there are lots of incidents that can happen due to employee misconduct. Authorities are explicit about the employers’ obligations. How to make compliance training effective & human-centric.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Web 2.0 Applications in Learning

Tony Karrer

Existing Adoption At the very start I asked the audience for examples of where they were currently using these tools as part of learning solutions. There were about 7 examples mentioned including Intuit using a Wiki-like system for customers to ask questions/get advice around taxes, using a group blog with students prior to a formal learning event, the US Army's use of collaboration tools to share best practices in Iraq, and several others. Tools?

Web 103

eLearning Conferences 2013

Tony Karrer

No liability is assumed for any errors that may have been introduced inadvertently during the assembly of this free conference list. link] January 23-25, 2013 Computers, Privacy and Data Protection (CPDP) International Conference: Reloading Data Protection, 6 th , Brussels, Belgium. link] January 24-25, 2013 eLearning Software : Productivity Tips and Secrets, organized by the eLearning Guild, offered online. Clayton R.