Remove Compliance Remove Safe Harbor Remove Security Remove Support
article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

I’ve gone thru my criteria before and the approach including weights and points based on a whole slew of categories including learning evironment, mobile, social, administration, reporting, learner functionality, capabilities of the system, technological infrastructure, training/support, overall service, forward thinking and adaptability.

Report 62
article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

I’ve gone thru my criteria before and the approach including weights and points based on a whole slew of categories including learning evironment, mobile, social, administration, reporting, learner functionality, capabilities of the system, technological infrastructure, training/support, overall service, forward thinking and adaptability.

Report 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Method Count Percent Alongside Formal Learning 26 63% Process Information / Training 22 54% Frequently Asked Questions (FAQ) / Support Information 18 44% Commonly used resources, URL's to applications, documentation, Contact Information, etc. Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

Many employers still don’t take data security training for employees seriously. Data is as secure as the people who have access to it , be it an IT team or regular employees. That’s why you need cyber security awareness training for employees to educate them on preventing data from loss, theft, modification, and destruction.