Remove Compliance Remove Create Remove Privacy Remove Safe Harbor
article thumbnail

Safeguarding Your Virtual Education Sphere

BrainCert

In this blog post, we will take a look at what BrainCert SOC2 compliance is, how BrainCert ensures your data security, and what you should look for in a secure learning management system. What Is BrainCert SOC2 Compliance? There are a lot of talks these days about data privacy and data protection.

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

It is in this site, you will be able to create a custom report of the Top 50 LMSs for 2017. Feature details on learner capabilities, administrator fuctionality, social, mobile, gamification, compliance/regulatory, skill sets, total experience of the system, integrations. Technical, security and privacy details.

Report 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

It is in this site, you will be able to create a custom report of the Top 50 LMSs for 2017. Feature details on learner capabilities, administrator fuctionality, social, mobile, gamification, compliance/regulatory, skill sets, total experience of the system, integrations. Technical, security and privacy details.

Report 40
article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not. Honey Pots - Create pages that people are likely to update such as Common Support Issues, FAQ, etc. Use a Wiki instead of other approaches to creating web pages (only edited by ID/writers initially). Then to the help desk.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

In this post, you’ll learn what data security training is, why it is important for employees, the consequences of data breaches , and how to create a data security training program to help you create a robust training program. Along with this, safe harbor laws in some U.S. How to Create Data Security Training.