Are confidentiality concerns holding back the e-learning industry?

From the Coleface

There’s the money argument: marketing generally gets more budget than learning and for businesses like Amazon the website is central to the business strategy. However, for me the root cause is the difference in approaches to confidentiality.

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2. As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. Not only are employees communicating through these media at work, but they are also doing so at home.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Business Resilience Bundle

Unicorn Training

In these uncertain times, businesses across the UK and around the world are experiencing a new normal. We can also serve these courses up on your existing LMS.For a full list of the courses available to support your business resilience, download our flyer

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

Over the last decade, organizations around the globe have increasingly embraced cloud applications in order to innovate, transform their business, manage costs and handle their increased workload. How to ensure cloud platform security for your business?

Just Fired an Employee? How to Protect Your Business From Their Revenge

Your Training Edge

An IT specialist who is familiar with how the entire infrastructure of your business has the potential to do catastrophic damage to your business. Train your HR employees to fire people gracefully, giving them a plan to quickly fulfill the obligations of your business.

Assessing Organizational Readiness for Change in Your Business

Epilogue Systems

But you must first answer an important question: Is your business ready to embrace change? You must assess your business to determine its readiness to adapt to a proposed change, which will help ensure that your change management efforts are not in vain.

When it is time to change your business LMS


When it is time to change your business LMS. If there is the issue of confidentiality with some of the material (company policies for example), accessibility to those particular modules can be restricted to company-owned workstations or an intranet connection.

Key Benefits of Managed IT Services for Business


Managed IT services can support the business by supporting their entire technology environment, including infrastructure, platforms, software, network, and more. Managed IT services can keep business information confidential. Business managed IT services

Operational Resilience and Business Continuity – Guidance for Legal and Financial Services Firms

Unicorn Training

At times like this, our business continuity planning is really tested in ways we hadn’t contemplated, and with so many variables it is unlikely we will have covered all possible scenarios; it will be our ability to be nimble on our feet and adapt to fast-moving situations that will get us through these tough times.For financial services firms, the infrastructure of the market and all financial services resources, systems and controls are tested at a much deeper level.

How to Create an Effective Sexual Harassment Policy


A statement that any information gathered as part of an investigation will be kept confidential to the extent possible. It’s important to protect your employees and vendors from sexual harassment.

Need to Hire a Business Attorney? Here’s How to Do It

Your Training Edge

Caption: Having the right attorney can protect (and propel) your business more than you think. Companies often hire business lawyers (aka “transactional” or “corporate” attorneys) to assist them with a variety of administrative, contractual, and operational matters.

7 Reasons why mobile learning can help your business


In time, businesses notice improvements both in terms of productivity and in terms of revenue. So, align your training with the trends and include m-learning in your business’ growth strategy. Mobile malware, Wi-Fi snooping or bluebugging are real threats to data confidentiality and privacy, both for companies and for employees. Long gone are the days when the only use for phones was to make and receive calls.

4 Steps to Clearing Your Office Clutter


Confidential items such as budgets or financial documents should be locked away or shredded. Business Safety business Business Etiquette office safety productivity work environmentA messy office or work space is more than just an eyesore.

How to Become Congruent With Your Ideal Business and Lifestyle With Success Coach and Equine Alchemist Nafissa Shireen


Learn about how to become congruent with your ideal business and lifestyle with success coach and equine alchemist Nafissa Shireen. Nafissa is a success coach, and in this episode of LMScast she breaks down her success stories and the fundamental aspects that lead to success in business.

October Topic – From Competence to Capability – New Avatar for Learning/HR to Deliver Business Value ?

Learning Cafe

The topic is “From Competence to Capability – New Avatar for Learning/HR to Deliver Business Value ? “ We discuss if CapabilityManagement at the employee and organisational level provides an effective framework for HR/Learning to deliver business value or if it simply rebadging Learning/HR ? Invitation – is extended to experienced learning professionals who: Have expertise or interest in: The effectiveness of learning to deliver business results.

Clearing Up Office Clutter in 4 Steps


Confidential items such as budgets or financial documents should be locked away or shredded. Business Safety business Business Etiquette office safety productivity work environment

Clearing Up Office Clutter in 4 Steps


Confidential items such as budgets or financial documents should be locked away or shredded. Business Safety business Business Etiquette office safety productivity work environment

HIPAA Training and Data Breaches: Are You Protected?


Since the Health Insurance Portability and Accountability Act was made into law in 1996, patients were assured this would protect the privacy of their medical records and ensure the confidentiality of their medical information. Business Computers Job Skills Learning and Development business compliance training data breaches HIPAA complianceIn November 2018, 3,230,063 health care records were exposed, stolen or disclosed without permission, according to the HIPAA Journal.

EthosCE Achieves SOC Type 2 Compliance


Security is the most important thing we do at EthosCE, and we are dedicated to ensuring our customers’ data is secure and confidential,” said Ezra Wolfe, CTO of DLC Solutions, LLC. The EthosCE SOC Type 2 report audited the security and confidentiality of the system.

Does Your Compliance Training Need A Makeover?


The purpose of these laws is to maintain safety and client confidentiality in the workplace. Compliance training programs cover a wide swath of areas, including trade secrets, records management and information confidentiality.

6 Worst Quitting Mistakes Workers Commonly Make


Your answers may not be confidential and will stay in your company file long after you’re gone. There’s no denying that quitting can be really stressful. However, the way you handle it can heavily influence your professional future.

Job 74

Ways to Improve Cybersecurity Awareness and Training

Content Raven

With the increase in cybercrime focused on businesses, high-impact organizations are starting to recognize the importance of implementing cybersecurity awareness training programs to protect and secure their intellectual property.

Am I Eligible for the FMLA?


They must ensure that confidentiality provisions in the FMLA are met. An employee with a disability is entitled to more than twelve weeks of unpaid leave if it doesn’t result in undue hardship on your business.

Women of We Know Training: Salma Kaida


“I studied International Business and Marketing in university, but fell in love with accounting when my husband started his own business. “I think the biggest way I have grown,” she shares,” is my ability to manage confidential information.

5 Points to Consider When Updating Your Anti-Harassment Policies


Implement confidential processes for reporting. This board functions as an impartial panel that reviews incidents and helps drive any changes to corporate policies Ultimately, it is wise to seek legal counsel when developing your policies and be sure to make certain that all incident reporting is confidential! Beyond the goodwill it creates, it’s just good business. Business Performance Corporate Training

What to do if they just want “awareness”

Making Change

The questions will be designed to: Uncover the client’s business goal — discover how the project will measurably change the organization’s performance. Instructional design action mapping business goal client management needs analysis

5 Reasons to Blur Images at Work (When in Doubt, Blur it Out)

TechSmith Camtasia

When it comes to certain types of data, it’s best to take a cautious approach and hide anything that must be protected, particularly in healthcare (protected health information, PHI), human resources (employee confidentiality), or any type of personal identifying information (PII).

Don't panic - security breaches


There are three areas in cybersecurity, commonly called the CIA: Confidentiality, Integrity and Availability. Confidentiality. These include: patient records, human resources records, and financial documents, which until publicly released, are all confidential.

Managing Remote Employees Effectively


A Harvard Business Review study from November 2017 indicated that remote workers felt “shunned” and worried about what is going on in the physical workplace. Are they following the business processes required for project completion?

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

After all, more diverse workplaces are more innovative, according to Forbes Insights —a key ingredient to a successful business in any competitive industry. Identifying a safe, respectful work environment as a key business goal is an important initial step.

Dealing with Workplace Sexual Harassment


Provide a confidential process for victims to report. #MeToo. Time’s Up. Who hasn’t seen the hashtag or become aware of the groundswell of support for those who have endured workplace sexual harassment?

A Quest for Success

CLO Magazine

Senior management decided to adopt the one-week in-residence option with 42 participants per session, along with an action learning component focused on strategic, enterprise-wide business opportunities.”. which designs and delivers business simulations and executive development programs.

Podcast: Instructional Design Certificate or Master’s Degree

Experiencing eLearning

What has more value: someone with business experience and a portfolio or someone with a master’s degree? What do you put in your portfolio if everything you’ve created is confidential or proprietary?

What is eBook DRM and Why Do Publishers Need it?


Your business may involve dealing with a lot of people outside your company network, which means that you would need to provide authorized access to confidential information to such people. The responsibility of maintaining this confidentiality is solely yours.

eBook 65

Research Paper Services for Students: Choose the Best One for Yourself

Your Training Edge

A research paper writing service must be a certified business. Only professional websites concerned with essay writing such as provide all their customers with 100% confidential papers. If you consider some papers almost impossible to be handled on your own.