Are confidentiality concerns holding back the e-learning industry?

From the Coleface

However, for me the root cause is the difference in approaches to confidentiality. The e-learning industry has an ambivalent approach to confidentiality. The confidentiality ‘trick question’ If we’re about to commission an external provide to create something confidential, let’s see if they cave in and show other people’s confidential information. #3 3 provokes the question of how much confidentiality is actually appropriate.

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

7-Steps to Creating a Coaching and Mentoring Program Four: Measurement

Your Training Edge

You’ve spent time and effort on creating and designing your mentoring or coaching program. For a formal program, consider creating a formal evaluation using your goals and mission. Also inform them that their responses are completely confidential and that the goal of the evaluation is to make the program better for them. You’ve also got the “buy-in” of key stakeholders within the organization.

Tips For Creating Video-based Content And Choosing The Right Technology To Support It: Getting The Value Advantage Of Video-based Learning


From the silent-motion pictures of the bygone era, to the digitally enhanced special effects of today – films have always created a lasting impression on audiences. Though initially created purely to entertain, power of videos to influence and teach soon became evident. Creating the ‘Right’ Video for Learning: There are multitude ways that videos can be utilized for learning: ?

Video 159

How to Create an Effective Sexual Harassment Policy


However, if the harassment becomes so frequent or severe that it creates a hostile or offensive work environment, the behavior becomes illegal. If the remarks are unwelcome, offensive and create a hostile work environment, they can be considered sex-based harassment. A statement that any information gathered as part of an investigation will be kept confidential to the extent possible. It’s important to protect your employees and vendors from sexual harassment.

8 Benefits of Creating Microlearning Videos Based on Social Learning Elements

Obsidian Learning

You can create valuable microcontent by leveraging built-in webcams, using screen capturing software while an expert gives a system demonstration, or even using your phone camera to capture a leader speaking passionately about an important initiative. One of the disadvantages of learning videos is that once created, they are static. That is why it’s important to think about your audience and content when creating videos.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. To create credibility and market value for myself -- on a professional level as an active member of the e-Learning industry. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage.

Agile Teams Create Agile Learning Organizations

CLO Magazine

Leverages new technologies to expand human capability in the flow of work rather than creates a one-stop shop for content. They were designed to create efficiency by centralizing the design of processes and deploying them across the organization. Agile teams create agile learning organizations. To keep pace with competition today, organizations that create an environment where employees can fail early, learn and improve will have the edge.

Agile 58

[FREE WEBINAR] – How to create a portfolio of eLearning samples when you’re starting out – 23rd May

Adobe Captivate

Looking to create a portfolio of work that showcases your skills in project design? Having your own sample portfolio can be particularly useful when you’re just starting out and don’t have any client projects to showcase or when you can’t use client projects due to confidentiality. In this webinar, we will teach you how to create your very own eLearning portfolio through MyPortfolio, a free tool available as part of a Creative Cloud plan. DATE: Wed 23rd May. TIME: 11am AEST.

Tips for Creating an Effective Digital Government Training Program

eThink Education

If you’ve been tasked with creating a training program for your organization, you’re most likely beginning with these needs in mind. For example, previously created course content completed asynchronously may be enough to support one employee whereas another may require on-site “on the job” training or a customized selection of training that has been determined by a manager based on job performance.

Role of E-learning in Creating an Ethical Workplace

CommLab India

It is an atmosphere created by the unconscious and conscious choices of your workforce. Creating an ethical workplace is a long term process and not a one day activity. Create a positive ambience. How e-learning helps in creating an ethical workplace. Now that you know how important it is to have workplace ethics in place and how to build an ethical workplace culture, it’s time to know how e-learning can help you create one.

Roles 50

Laura Overton: Are today’s L&D leaders sticking to the familiar?

Sponge UK

Each year we provide an opportunity for L&D leaders to confidentially compare their approach to delivering learning and supporting performance with their peers. Everyone taking part gets confidential personal feedback in early September. The programme has been extended to 14 th August and you can take part confidentially and for free. Creating elearning Future Laura Overton Towards Maturity

How to Create Context-Setting Learning Objectives - Tip #162

Vignettes Learning

According to Dr. Daniel Levitin, PhD , author of the bestselling book This is Your Brain On Music, we process 34 gigabytes of information during our leisure time alone and we would have created a world with 300 exabytes of human made information. Example 1 - Probing Questions Example 2 - Confidential Documents What is the difference between Static Learning Objectives and Story-Based Learning Objectives?

How to Create an Imagination Station

CLO Magazine

It is getting what you need to do great work by exploiting loopholes and creating workarounds. No, it does not need to be patent-worthy, but all of your information will be strictly confidential. These days when anyone bangs the drum “Be innovative!” it sounds like a parent telling us to clean our room. Jeff Bezos, founder and CEO of, started his company 18 years ago in his garage in Seattle, and in 2012 was named Fortune magazine’s Business Person of the Year.

Top 5 collaboration tools

Sponge UK

Creating effective elearning requires many different skills and collaboration between team members is crucial to success. Creating groups for different teams is easy and provides a great way to get input from a team of people quickly and efficiently. Project managers can create or edit work for various teams and make it available for everyone to view easily and quickly. Creating elearning collaboration SpongeUK teamwork

5 Factors to Consider in eLearning Outsourcing

Tesseract Learning

Confidentiality. Confidentiality is a key factor when it comes to eLearning outsourcing. It is important to ensure the team members are also committed to maintaining the confidentiality of the information shared with them.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it.

Customizing the Drop Down Assessment in Articulate Storyline

CommLab India

Step 2: Create states for the rectangles Q1, Q2, and Q3. Step 4: Create Correct, Incorrect and Alert layers. Step 5: Create 3 more layers (as there are 3 questions in the slide) and insert the corresponding answers in each layer. Textbox 1: Change the state of Rectangle Q1 to Confidential when the learner clicks the Confidential textbox. Hide this layer when the learner clicks the Confidential textbox.

360-degrees feedback: A more accurate strategy for coaching programs


Let’s see five ways in which an organization can improve its 360-degrees feedback process for coaching sessions, according to Harvard Business Review : Confidentiality. Since all staff is involved, people need to be reassured that their reviews of their bosses or their peers are confidential.

30+ Ideas for eLearning Portfolio Samples

Experiencing eLearning

What if you can’t use any samples of your existing work due to confidentiality or security requirements? For example, the Instructional Designer or eLearning Developer demo in my portfolio is based on an activity I originally created for a health care client. For many people, the best solution is creating new content from scratch. For portfolio samples, you don’t generally need to create a full-blown, 60 minute course. Create handouts in PowerPoint.

Tips to Make Professional Training Videos at Home


However, it’s not that easy to create professional training videos that would gain vast popularity and be effective. Below, you will find tips on how to start creating professional training videos without leaving your home. Creating professional training videos is easier than you think.

Video 59

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. Next time you create an eLearning lesson, consider placing meaningful content immediately after (or maybe even before) the title slide. And a “Confidentiality” button, for example. If you create a pre-quiz that is informal and short, you might put it right on the title side.

Lesson 134

New Providers of Data Collection and Analysis of Online Job Ads in Real-Time May be Helping Community Colleges Create Better Curricula

Training Industry

Wanted Technologies chose not to participate, citing confidentiality. A new term was recently added to my lexicon: “real-time labor market data.” It came from research I am conducting about how community colleges work at building courses and programs that align with employers’ demands and the needs of regional economies. A subset of this research is the argument that our nation’s community colleges are not educating students to meet labor-market demands.

Best Practices for Investigating Sexual Harassment Claims


Throughout the interviewing process, make sure that both the interviewing parties and the interviewed individuals are aware of confidentiality standards.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Although proving that employees have completed training might satisfy legal obligations, executives increasingly understand that the goal isn’t the training itself—it’s changing behavior to create a safe, respectful and, ultimately, more productive corporate culture. This training might emphasize keeping reports confidential, ensuring that reporters do not face retaliation and the importance of investigating allegations thoroughly before meting out a penalty.

3 Signs You Need A New LMS


Not Every Learning Management System is Created Equal. Because, not every LMS is created equal. In order to receive honest feedback, communicate to employees that all responses will be confidential. Having access to personal smartphones, tablets, and laptops throughout the day creates an open and efficient environment that is beneficial to both parties. Several unmistakable signs indicate it might be time to reevaluate your current learning management system (LMS).

Podcast: Instructional Design Certificate or Master’s Degree

Experiencing eLearning

What do you put in your portfolio if everything you’ve created is confidential or proprietary? How do you verify that the person with the portfolio created it? On February 6, I had the pleasure of speaking with Luis Malbas and the TLD Community. We spoke about whether it’s better for your career to get an instructional design certificate or a master’s degree. This is part of their Certificates and Certifications playlist for February.

What is eBook DRM and Why Do Publishers Need it?


Your business may involve dealing with a lot of people outside your company network, which means that you would need to provide authorized access to confidential information to such people. The responsibility of maintaining this confidentiality is solely yours. To ensure confidentiality of data, you would need to comply with several regulations, for example, Sarbanes-Oxley (SOX) which aims to ensure secure control of business information. How to Create a DRM-protected eBook?

eBook 50

Just Fired an Employee? How to Protect Your Business From Their Revenge

Your Training Edge

Make sure that employment law and your contract work together to create your justification for firing the employee. They have access to client information, and perhaps even confidential information about the company. They could just as easily steal from the company for monetary gain, or steal physical copies of confidential information. Not every fired employee will go rogue, but when one does, they’re a huge liability.

How to Edit a Screenshot

TechSmith Camtasia

While the most basic screenshot might not take long to re-do, re-creating the exact same scene in order to capture it again, might. Here are a few examples: You have recently created technical documentation, but due to a recent user interface (UI) update , need to update the screenshots. You have a screenshot that you need to share, but it contains confidential information. Blur out confidential information in a screenshot.

How to Edit a Screenshot

TechSmith Camtasia

While the most basic screenshot might not take long to re-do, re-creating the exact same scene in order to capture it again, might. Here are a few examples: You have recently created technical documentation, but due to a recent user interface (UI) update , need to update the screenshots. You have a screenshot that you need to share, but it contains confidential information. Blur out confidential information in a screenshot.

In-House or Outsourcing eLearning development


Since most training courses require future reworks and updating, you must create a wireframe, including the ability for future-proofing. Confidentiality of training courses. Let’s face it, making the decision of in-house or outsourcing depends on several factors.

The Advantages of DRM in the Publishing Industry


However, creating original content is time-consuming and requires lots of mental labor. You can publish content online with reduced costs and once published, create as many copies you want or even modify or remove with minimal overhead costs.

eBook 56

10 Ways You Can Reduce Bias in the Workplace

Infopro Learning

Survey employees confidentially to find out what is really going on in every aspect of the employment process – from pre-screening resumes to hiring to promotion to career opportunities, through compensation and engagement and development as well as the performance management process. Recognizing Unconscious Bias. Bypassing rational and logical thinking, we rapidly sort people into groups, thinking we are using these processes effectively and often calling them “intuition.”

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information. Proper encryption of sensitive information in your LMS goes a long way in securing it against confidentiality attacks – attacks carried out by hackers to access and distribute confidential information.

Remote Mentoring: How to Cultivate a Virtual Connection


Treat these meetings with the same confidentiality and courtesy as you would if you were meeting in person. Create a Backup Plan for Tech Issues. Maintain Connection, Trust and Confidentiality. Listening to each other’s perspectives will help create a safe space for deeper conversations. For many of us, working from home has become the new normal. Coronavirus has turned our way of life upside down and is transforming the way we work.

Docebo powered by AWS: keeping you secure while you learn anywhere


At Docebo, we’re focused, first and foremost, on creating and delivering a cloud-based LMS that our customers love. With AWS, you can improve your ability to meet core security and compliance requirements, such as data locality, protection, and confidentiality with our comprehensive services and features. A cloud LMS stores a ton of data though, and not only do we want you to love the product itself, but we want you to feel secure using it.

Docebo 100

How E-learning for Health Changed After Covid-19

Spark Your Interest

As well as, e-learning solutions for health that we’ve created for our healthcare clients. Media assets created from developing e-learning for health can be used for other purposes. For example, different versions could be created for patients, employees, or family members. Or that have high confidentiality or privacy requirements. An e-learning course was created. As well, a quick reference guide was also created.

Change 166

Six Reasons to Start Looking Beyond The Humble Spreadsheet


Don’t forget, it’s easier than you think for someone to uncover passwords and gain access to confidential information. Yes, they can adequately perform a large number of tasks – what other tool could be used to create a pivot table and plan a 40th birthday party? – All of this is down to one simple fact: they weren’t created to be used by more that one person at a time.

An eLearning Guide to Summer Fun


This month, we challenged you to create an eLearning course that’s all about summer fun, but is also educational. If most of your work projects fall under non-disclosure or confidentiality agreements, it’s helpful to have other projects like these to build out your portfolio. Plus, seeing what other Lectora users create for the contests is always inspiring! Summer is winding down—but the fun doesn’t have to!