Remove Business Remove Confidentiality Remove Reputation Remove Security

HIPAA Training and Data Breaches: Are You Protected?

KnowledgeCity

Since the Health Insurance Portability and Accountability Act was made into law in 1996, patients were assured this would protect the privacy of their medical records and ensure the confidentiality of their medical information. For employers, data breaches are costly and damaging to their reputations. Records containing Protected (or Personal) Health Information (PHI) should be kept in locked cabinets, or require secure passwords to access digitally.

Compliance Training in Retail

Interactive Services

In 2016, the British sandwich retailer Pret a Manger suffered huge damage to its reputation, as well as compensation claims, when a teenager died after eating a baguette containing sesame, to which she was allergic. Can you be certain that you are aware of those that apply to your business?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Protect Your Company from a Sexual Harassment Lawsuit

KnowledgeCity

Sexual harassment became a leading topic throughout America as many business leaders and organizations were exposed. Although the specific information is confidential, the EEOC must notify the employer of the claim within 10 days of the filing date.

10 Vital Benefits Of Training & Tracking Compliance Software

SET Safety

This type of software helps organizations ensure compliance with local and federal laws for safety, security, or confidentiality concerns. Compliance management minimizes risks to the business’ workflow. One of the more important features of compliance programs is the ability to integrate into the business’ processes. The software becomes a central hub for business-critical information that can be shared with team members, managers, and stakeholders.

Track 37

Four Principles for Effective Training Systems

Interactive Services

Earlier this fall the Securities and Exchange Commission (SEC) published an unusual report: a review of cybersecurity failures at nine large firms where employees fell for “business email exploits” and mistakenly sent company monies to overseas accounts.

How To Avoid 5 Common e-Learning Outsourcing Obstacles

Adobe Captivate

Will They Be Able To Keep Things Confidential? Additionally, verify that their software and servers are secure. Even if the eLearning company is highly reputable, you may still come across communication challenges or face cultural differences in work expectations.

Cammy Beans Learning Visions: Second Life Backlash and Controversy

Learning Visions

3) And then this morning, I was pointed to this one by my CTO: Gartner: five reasons why business should avoid Second Life by John Pospisil. IT Security Risks 2. Confidentiality 4. Brand and Reputation Risk Management 5. Christopher Simpson also comments: As for doing business, holding meetings and such in SL, its really a matter of what works and what doesnt. Cammy Beans Learning Visions Musings on eLearning, instructional design and other training stuff.