Are confidentiality concerns holding back the e-learning industry?

From the Coleface

However, for me the root cause is the difference in approaches to confidentiality. The e-learning industry has an ambivalent approach to confidentiality. 3 provokes the question of how much confidentiality is actually appropriate.

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

7-Steps to Creating a Coaching and Mentoring Program Four: Measurement

Your Training Edge

You’ve spent time and effort on creating and designing your mentoring or coaching program. For a formal program, consider creating a formal evaluation using your goals and mission. You’ve also got the “buy-in” of key stakeholders within the organization.

How to Create an Effective Sexual Harassment Policy

KnowledgeCity

However, if the harassment becomes so frequent or severe that it creates a hostile or offensive work environment, the behavior becomes illegal. If the remarks are unwelcome, offensive and create a hostile work environment, they can be considered sex-based harassment.

8 Benefits of Creating Microlearning Videos Based on Social Learning Elements

Obsidian Learning

You can create valuable microcontent by leveraging built-in webcams, using screen capturing software while an expert gives a system demonstration, or even using your phone camera to capture a leader speaking passionately about an important initiative.

Tips For Creating Video-based Content And Choosing The Right Technology To Support It: Getting The Value Advantage Of Video-based Learning

G-Cube

From the silent-motion pictures of the bygone era, to the digitally enhanced special effects of today – films have always created a lasting impression on audiences. Though initially created purely to entertain, power of videos to influence and teach soon became evident.

Video 206

Tips for Creating an Effective Digital Government Training Program

eThink Education

If you’ve been tasked with creating a training program for your organization, you’re most likely beginning with these needs in mind. The LMS can be used to create cohorts of leaders to share experiences and relevant subject matter.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. To create credibility and market value for myself -- on a professional level as an active member of the e-Learning industry. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage.

Role of E-learning in Creating an Ethical Workplace

CommLab India

It is an atmosphere created by the unconscious and conscious choices of your workforce. Creating an ethical workplace is a long term process and not a one day activity. Create a positive ambience. How e-learning helps in creating an ethical workplace.

Roles 65

How to Create Context-Setting Learning Objectives - Tip #162

Vignettes Learning

According to Dr. Daniel Levitin, PhD , author of the bestselling book This is Your Brain On Music, we process 34 gigabytes of information during our leisure time alone and we would have created a world with 300 exabytes of human made information.

Laura Overton: Are today’s L&D leaders sticking to the familiar?

Sponge UK

Each year we provide an opportunity for L&D leaders to confidentially compare their approach to delivering learning and supporting performance with their peers. Everyone taking part gets confidential personal feedback in early September.

[FREE WEBINAR] – How to create a portfolio of eLearning samples when you’re starting out – 23rd May

Adobe Captivate

Looking to create a portfolio of work that showcases your skills in project design? Having your own sample portfolio can be particularly useful when you’re just starting out and don’t have any client projects to showcase or when you can’t use client projects due to confidentiality. In this webinar, we will teach you how to create your very own eLearning portfolio through MyPortfolio, a free tool available as part of a Creative Cloud plan. DATE: Wed 23rd May. TIME: 11am AEST.

What are your options when creating multilingual training courses?

Matrix

What are your options when creating multilingual training courses? What are your options when creating multilingual training courses? It uses this data to improve its automatic translation algorithm, but your confidential training information is not that confidential anymore.

How to Create an Imagination Station

CLO Magazine

It is getting what you need to do great work by exploiting loopholes and creating workarounds. No, it does not need to be patent-worthy, but all of your information will be strictly confidential. These days when anyone bangs the drum “Be innovative!” it sounds like a parent telling us to clean our room. Jeff Bezos, founder and CEO of Amazon.com, started his company 18 years ago in his garage in Seattle, and in 2012 was named Fortune magazine’s Business Person of the Year.

Top 5 collaboration tools

Sponge UK

Creating effective elearning requires many different skills and collaboration between team members is crucial to success. Creating groups for different teams is easy and provides a great way to get input from a team of people quickly and efficiently.

Customizing the Drop Down Assessment in Articulate Storyline

CommLab India

Step 2: Create states for the rectangles Q1, Q2, and Q3. Step 4: Create Correct, Incorrect and Alert layers. Step 5: Create 3 more layers (as there are 3 questions in the slide) and insert the corresponding answers in each layer.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it.

What is eBook DRM and Why Do Publishers Need it?

Kitaboo

Your business may involve dealing with a lot of people outside your company network, which means that you would need to provide authorized access to confidential information to such people. The responsibility of maintaining this confidentiality is solely yours.

eBook 65

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Although proving that employees have completed training might satisfy legal obligations, executives increasingly understand that the goal isn’t the training itself—it’s changing behavior to create a safe, respectful and, ultimately, more productive corporate culture.

Podcast: Instructional Design Certificate or Master’s Degree

Experiencing eLearning

What do you put in your portfolio if everything you’ve created is confidential or proprietary? How do you verify that the person with the portfolio created it? On February 6, I had the pleasure of speaking with Luis Malbas and the TLD Community.

30+ Ideas for eLearning Portfolio Samples

Experiencing eLearning

What if you can’t use any samples of your existing work due to confidentiality or security requirements? For example, the Instructional Designer or eLearning Developer demo in my portfolio is based on an activity I originally created for a health care client.

How E-learning for Health Changed After Covid-19

Spark Your Interest

As well as, e-learning solutions for health that we’ve created for our healthcare clients. Media assets created from developing e-learning for health can be used for other purposes. For example, different versions could be created for patients, employees, or family members.

Change 215

Just Fired an Employee? How to Protect Your Business From Their Revenge

Your Training Edge

Make sure that employment law and your contract work together to create your justification for firing the employee. They have access to client information, and perhaps even confidential information about the company.

The Business Resilience Bundle

Unicorn Training

Outside of the safe work environment however, it is the individual’s responsibility to ensure cybersecurity measures are adopted to protect confidential company information and ensure their devices are not vulnerable to an attack.

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. Next time you create an eLearning lesson, consider placing meaningful content immediately after (or maybe even before) the title slide. And a “Confidentiality” button, for example. If you create a pre-quiz that is informal and short, you might put it right on the title side.

Lesson 134

New Providers of Data Collection and Analysis of Online Job Ads in Real-Time May be Helping Community Colleges Create Better Curricula

Training Industry

Wanted Technologies chose not to participate, citing confidentiality. A new term was recently added to my lexicon: “real-time labor market data.” It came from research I am conducting about how community colleges work at building courses and programs that align with employers’ demands and the needs of regional economies. A subset of this research is the argument that our nation’s community colleges are not educating students to meet labor-market demands.

Remote Mentoring: How to Cultivate a Virtual Connection

Chronus 

Treat these meetings with the same confidentiality and courtesy as you would if you were meeting in person. Create a Backup Plan for Tech Issues. Maintain Connection, Trust and Confidentiality. For many of us, working from home has become the new normal.

How to Edit a Screenshot

TechSmith Camtasia

While the most basic screenshot might not take long to re-do, re-creating the exact same scene in order to capture it again, might. Here are a few examples: You have recently created technical documentation, but due to a recent user interface (UI) update , need to update the screenshots.

How to Edit a Screenshot

TechSmith Camtasia

While the most basic screenshot might not take long to re-do, re-creating the exact same scene in order to capture it again, might. Here are a few examples: You have recently created technical documentation, but due to a recent user interface (UI) update , need to update the screenshots.

3 Signs You Need A New LMS

TOPYX LMS

Not Every Learning Management System is Created Equal. Because, not every LMS is created equal. In order to receive honest feedback, communicate to employees that all responses will be confidential. Having access to personal smartphones, tablets, and laptops throughout the day creates an open and efficient environment that is beneficial to both parties. Several unmistakable signs indicate it might be time to reevaluate your current learning management system (LMS).

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information.

Six Reasons to Start Looking Beyond The Humble Spreadsheet

Qintil

Don’t forget, it’s easier than you think for someone to uncover passwords and gain access to confidential information. Yes, they can adequately perform a large number of tasks – what other tool could be used to create a pivot table and plan a 40th birthday party? –

How to Keep Your Cloud-Based LMS Software Protected

Your Training Edge

2FA creates an additional layer of security around your LMS by requiring all users to identify themselves twice – with a password and some kind of information only they would know.

An eLearning Guide to Summer Fun

Trivantis

This month, we challenged you to create an eLearning course that’s all about summer fun, but is also educational. If most of your work projects fall under non-disclosure or confidentiality agreements, it’s helpful to have other projects like these to build out your portfolio.

30+ Ideas for eLearning Portfolio Samples

Experiencing eLearning

What if you can’t use any samples of your existing work due to confidentiality or security requirements? For example, the Instructional Designer or eLearning Developer demo in my portfolio is based on an activity I originally created for a health care client.