Are confidentiality concerns holding back the e-learning industry?

From the Coleface

However, for me the root cause is the difference in approaches to confidentiality. The e-learning industry has an ambivalent approach to confidentiality. 3 provokes the question of how much confidentiality is actually appropriate.

Describe Yourself Essay? — College Confidential

E-learning Uncovered

Our experts review an actual response to the Tell Us About Yourself Essay from an applicant to a top MBA program to help you write better essays

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2. As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. Not only are employees communicating through these media at work, but they are also doing so at home.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage. I would see no difficulty in sharing ideas with your contact, while maintaining client confidentiality.

What is CIA in information security?

QuoDeck

Confidentiality , Integrity and Availability , also known as the CIA triad, is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.

EthosCE Achieves SOC Type 2 Compliance

EthosCE

Security is the most important thing we do at EthosCE, and we are dedicated to ensuring our customers’ data is secure and confidential,” said Ezra Wolfe, CTO of DLC Solutions, LLC. The EthosCE SOC Type 2 report audited the security and confidentiality of the system.

Women of We Know Training: Salma Kaida

Yardstick

“I think the biggest way I have grown,” she shares,” is my ability to manage confidential information. I am often on the inside of big announcements and knowing what is confidential and what isn’t, which can sometimes be a challenge.

Customizing the Drop Down Assessment in Articulate Storyline

CommLab India

Textbox 1: Change the state of Rectangle Q1 to Confidential when the learner clicks the Confidential textbox. Hide this layer when the learner clicks the Confidential textbox. Articulate Storyline allows developers use a wide variety of default quiz types in online courses.

Don't panic - security breaches

OpenSesame

There are three areas in cybersecurity, commonly called the CIA: Confidentiality, Integrity and Availability. Confidentiality. These include: patient records, human resources records, and financial documents, which until publicly released, are all confidential.

STRIVR is Soc 2 Certified

STRIVR

Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise availability, integrity, confidentiality, and privacy. Confidentiality. We assure that all confidential information is kept that way. Information designated as confidential is protected. We take the protection of our customers’ data very seriously.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

This training might emphasize keeping reports confidential, ensuring that reporters do not face retaliation and the importance of investigating allegations thoroughly before meting out a penalty.

Podcast: Instructional Design Certificate or Master’s Degree

Experiencing eLearning

What do you put in your portfolio if everything you’ve created is confidential or proprietary? On February 6, I had the pleasure of speaking with Luis Malbas and the TLD Community.

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. You’ve been hearing about it for some time now: m-Learning is the next big thing, and it’s here to stay.

What is eBook DRM and Why Do Publishers Need it?

Kitaboo

Your business may involve dealing with a lot of people outside your company network, which means that you would need to provide authorized access to confidential information to such people. The responsibility of maintaining this confidentiality is solely yours.

eBook 65

Just Fired an Employee? How to Protect Your Business From Their Revenge

Your Training Edge

They have access to client information, and perhaps even confidential information about the company. They could just as easily steal from the company for monetary gain, or steal physical copies of confidential information.

Research Paper Services for Students: Choose the Best One for Yourself

Your Training Edge

Only professional websites concerned with essay writing such as Advancedwriters.com provide all their customers with 100% confidential papers. If you consider some papers almost impossible to be handled on your own.

30+ Ideas for eLearning Portfolio Samples

Experiencing eLearning

What if you can’t use any samples of your existing work due to confidentiality or security requirements? Whether you’re working freelance or looking for a full-time job, you need a portfolio.

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. And a “Confidentiality” button, for example. By Shelley A. Gable. I’ve heard learners criticize eLearning lessons that have too much “extra” stuff at the beginning.

Lesson 134

Computer Security Training Courses – Why They Matter

OpenSesame

One wrong action could crash the system or leak confidential information. . It isn''t just for geeks. Because the success of the company is the responsibility of every employee. Every employee needs to know what can jeopardize the company''s computer infrastructure. The reason is simple.

How to Edit a Screenshot

TechSmith Camtasia

You have a screenshot that you need to share, but it contains confidential information. Blur out confidential information in a screenshot.

How to Edit a Screenshot

TechSmith Camtasia

You have a screenshot that you need to share, but it contains confidential information. Blur out confidential information in a screenshot.

How to Discuss Sensitive Topics with Your Mentor or Mentee

Chronus

Let your mentor or mentee know that you are a confidant, and the things said within your relationship of trust are confidential and sacred. Some subjects are just hard to talk about.

10 Ways You Can Reduce Bias in the Workplace

InfoPro Learning

Survey employees confidentially to find out what is really going on in every aspect of the employment process – from pre-screening resumes to hiring to promotion to career opportunities, through compensation and engagement and development as well as the performance management process. Recognizing Unconscious Bias. Bypassing rational and logical thinking, we rapidly sort people into groups, thinking we are using these processes effectively and often calling them “intuition.”

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information.

Bringing Sass to Safety: Must-Watch Music Video from Virgin America

OpenSesame

Confidential Information: Mission Possible! . Through interactive games, Compliance Cartoons sends viewers on a mission to protect confidential information and teaches them the necessary protocols along the way.

Music 95

3 Ways Mobility Elevates Your Training Programs: Connectivity

mLevel

All with an excellent security model to ensure you have training material confidentiality. Let’s talk about connectivity and why it’s important.

Remote Mentoring: How to Cultivate a Virtual Connection

Chronus

Treat these meetings with the same confidentiality and courtesy as you would if you were meeting in person. Maintain Connection, Trust and Confidentiality. For many of us, working from home has become the new normal.

Effective Ways to Evaluate and Decide an E-learning Vendor Outsourcing [Infographic]

CommLab India

Organizations are also worried about the quality of output, expertise of the provider, their confidentiality procedures, commitment in meeting timelines, etc. Many organizations want to outsource their e-learning projects.

3 Signs You Need A New LMS

TOPYX LMS

In order to receive honest feedback, communicate to employees that all responses will be confidential. Several unmistakable signs indicate it might be time to reevaluate your current learning management system (LMS). Migrating to a different LMS can ultimately lead to an increase in employee retention, worker satisfaction, and workforce productivity. Not Every Learning Management System is Created Equal.

LMS Data Security – Challenges and Solutions [Infographic]

CommLab India

A Learning Management System (LMS) is a treasure trove of sensitive and confidential information of every organization. Then how can we ensure the safety of your confidential data?

The Business Resilience Bundle

Unicorn Training

Outside of the safe work environment however, it is the individual’s responsibility to ensure cybersecurity measures are adopted to protect confidential company information and ensure their devices are not vulnerable to an attack.

Moving from an open-source to a commercial LMS – the story of Transactel

eFront

TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally). The company has doubled its size in the last five years with the addition of 12,000 employees when Transactel partnered with TELUS International.

Six Reasons to Start Looking Beyond The Humble Spreadsheet

Qintil

Don’t forget, it’s easier than you think for someone to uncover passwords and gain access to confidential information. They’ve long been heralded as an invaluable productivity tool, but are spreadsheets really advanced enough to manage the complex needs of businesses today? We’re not so sure….

How to Keep Your Cloud-Based LMS Software Protected

Your Training Edge

In only one data breach, you can lose your exclusive learning material and your trainees’ confidential data. For any organization that relies on cloud-based LMS software for continual learning and development (L&D), cybersecurity should be a top concern.