How to Create an Effective Sexual Harassment Policy


This post is intended to offer some possible workplace policies that could help prevent harassment from occurring in the first place. However, if the harassment becomes so frequent or severe that it creates a hostile or offensive work environment, the behavior becomes illegal.

5 Points to Consider When Updating Your Anti-Harassment Policies


With the recent slew of high-profile allegations, confessions, and convictions for sexual and workplace harassment, anti-harassment policies have become a “hot button” issue for many companies. To protect your organization, now is a great time to update your harassment policies and procedures. Both situations create a hostile work environment. Here are a few steps you can take to update your anti-harassment policies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. SM2 can help your organization implement and utilize social media by providing a tool for monitoring these media and enforcing your organization's compliance policies.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. security cybersecurity data security byod policy data loss prevention mobile security cloud computing

Tips for Creating an Effective Digital Government Training Program

eThink Education

If you’ve been tasked with creating a training program for your organization, you’re most likely beginning with these needs in mind. The LMS can be used to create cohorts of leaders to share experiences and relevant subject matter.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Although proving that employees have completed training might satisfy legal obligations, executives increasingly understand that the goal isn’t the training itself—it’s changing behavior to create a safe, respectful and, ultimately, more productive corporate culture.

How E-learning for Health Changed After Covid-19

Spark Your Interest

As well as, e-learning solutions for health that we’ve created for our healthcare clients. Media assets created from developing e-learning for health can be used for other purposes. For example, different versions could be created for patients, employees, or family members.

Change 215

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

These cloud security management best practices are designed to prevent any unauthorized access to confidential data and keep all information safe from cybersecurity threats. Any time your service provider updates their privacy policy, they will inform you via email or an alert when you log in.

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information.

The benefits of online training for a franchise network


Some of the benefits of franchising your system are; More outlets mean more opportunities for the franchisor to increase revenue, the ability to offer opportunities for small business owners and create jobs in local communities, just to name a few.

How to Protect Your Company from a Sexual Harassment Lawsuit


Let’s review some of these: Have a written, published sexual harassment policy. Follow compliant harassment policies to maintain safety in the workplace. Decide who will present your company’s safety policies (this could be your company’s legal team or HR department).

Build a deliberately developmental organization through peer learning groups

CLO Magazine

When she announced that a new policy change needed to be made, employee morale and productivity plummeted. “The culture of most organizations is not designed for practice; it’s designed for performance.

Dealing with Workplace Sexual Harassment


If you don’t have a written sexual harassment policy, get it done now. A clear sexual harassment policy should not tolerate any behaviors that create a toxic culture for employees. Provide a confidential process for victims to report. #MeToo. Time’s Up.

What Your Onboarding Kit Should Include (And Why You Should Offer One)


You create an onboarding kit for new employees that makes them feel comfortable in their working environment, positive about the company, part of the team and confident that they can perform their job from Day 1. The modern onboarding kit is much more than a bunch of forms and policies.

7 Instances When Outsourcing eLearning Is Not The Best Option


Are you thinking about hiring an external partner to create your online training content? However, in some cases, it may be less expensive to create the online training materials in-house. Or company policies that competitors may be able to use to improve their work practices.

Investment in leadership development continues to be critically important

CLO Magazine

We created terms and definitions for each element, which follow, to incorporate a broader range of information. It describes the procedures and policies that guide departments and employees in how to specifically contribute to the organizational goals.

The Role of Scenario-Based Learning in Online Training

CommLab India

As soon as you think of compliance, I am sure you are reminded of those insipid rules and regulations, dry policies and code of conduct. Show the risks that can be faced in various work situations by not following a code of conduct and company policies.

What You Need to Know: GDPR & xAPI


ability to ensure ongoing confidentiality, integrity, availability, and resilience of processing systems. Ensuring ongoing confidentiality and integrity of systems is achieved by a mix of LRS functionality and company policies.

xapi 63

10 Tips to Select the Best Online Course Development Partner

Hurix Digital

Creating such e-learning modules requires more than just subject matter expertise. Some may provide client references on request due to confidentiality agreements. The internet has given us, among many other things, a revolutionary genre of learning – online learning.

How Game-based Learning Can Assist Various Compliance Programs

CommLab India

Safety training is training workforce on the policies and measures to safeguard them in the workplace. IT security compliance requires IT managers to backup, encrypt, store, and safeguard their confidential data.

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

This is the 5th in a series of postings about how L&D departments can move forward from their traditional role of creating, delivering and managing formal learning – to one that supports the wider needs of Smart Workers in the organisation. Tweet.

Trust 282

Meeting Requirements for Healthcare Compliance with an LMS

eThink Education

Not only are you training staff on equipment, procedures, and regulations, you may also be educating staff about information security, privacy, and confidentiality issues while also helping employees prepare for an upgrade to your medical records system.

How to Avoid The 3 Mistakes L&D Leaders Make When Addressing Workplace Harassment

CLO Magazine

By now, nearly all organizations have instituted policies that define and discourage sexual harassment. Employees page through the policy and take an online test. These steps include creating a system that holds leaders accountable for positive norms, implementing training that focuses on positive behaviors and developing processes that ensure open communication. Without accountability, policies are paper tigers.

7 Factors That Decide The Fate of Your Code of Conduct E-Learning Course

CommLab India

For instance, if you are training your employees on IT safety and security compliance,instead of conveying them that confidential data should not be leaked, you can state that everyone in the organization should ensure the confidentiality of information.

A Learning Guide to Data Privacy in the Workplace  

Interactive Services

In order to avoid these types of mistakes, it is important to create a few principles within the company to build a culture that protects customer data. Employees should always respect that policy, and customer data should never be accessed for any other purpose.

Let’s get real about unconscious bias

CLO Magazine

The business case for the training is not just about “fixing people” but about creating or refining processes that ultimately impact profitability. But not all unconscious bias training programs are created equal. 10: Create incentives for change.

eLearning Security: How to Keep Data Protected in Your Open Source LMS

eThink Education

eLearning security is essential in preventing costly regulatory penalties around incidents related to leaked personal information , confidential organizational data, or other potential security risks.

How Virtual Training Can Protect your Team from the Coronavirus

MeetingOne on eLearning

Many organizations have teams around the world that need to stay up-to-date on products, services, and policies. Here are some of the key factors we’ve found improve trainer experiences: Entirely customizable, Adobe Connect allows trainers and designers to create truly immersive sessions. Instructors can create as many rooms as they need. This creates a better means for learners to engage each other & their instructors than just leaning on discussion boards.

Free L&D webinars for February 2020

Limestone Learning

Join Katie Miller from BizLibrary, who, as a millennial herself, will explain how to create a development plan that speaks to these tech-savvy, idealistic, future leaders of the workforce. time and money) to create, 3D is often relegated to video games, simulations and/or VR only.

Free 71

Reinforce Learning Through Storytelling


Confidentiality is ensured by changing names and details when necessary. There is enough information about the IMF to create a tidy list of dos and don’ts. These are good sources for specific regulation or policy related examples. “Tell me and I forget. Teach me and I remember.

6 Smart Steps for Successful E-learning Implementation

CommLab India

The factors you should consider include the legal issues that need to be dealt with before adopting an e-learning culture, such as policy and contract issues, intellectual property, and the language and cultural needs of learners.

13 eLearning Scenario Tips that 60 Experts Agree On


So, you know scenarios are important…but how do you actually create good ones? This creates a stronger opportunity for long-term memory storage as you have connected prior experiences to current learning. Immerse them into the scenario and create an emotional connection to it. —

Expert 105

The Dos and Don’ts of Preventing Sexual Harassment in Your New York Workplace


If you ever find yourself worrying that your workplace may not be up to speed on sexual harassment policies, you are probably right to do so. With these strengthened policies, it is crucial that every organization reviews its sexual harassment policies with its employees.

Are You Believable?

CLO Magazine

Keeping information confidential demonstrates integrity and strengthens your relationships. ” Sheldon reports that it’s a tough policy to initiate, but it’s one of the fastest ways to build believability and create a culture of trust. Being believable is about behavior, not just telling the truth. Having the humility to recognize and admit that you’re wrong will give others faith in your judgment.

Trust 53

eLearning in the GDPR era: What you need to know


The Privacy Shield framework (used by all major cloud service providers) has been specifically created to satisfy the above criteria. Have appropriate data protection and retention policies and controls in place for the information of the data subjects you manage.