article thumbnail

Including Confidential Projects in your Portfolio | Devlin Peck

Devlin Peck

When most of your eLearning or instructional design projects are confidential, you still have options if you'd like to include them in your portfolio. Learn more in this video.

article thumbnail

Are confidentiality concerns holding back the e-learning industry?

From the Coleface

However, for me the root cause is the difference in approaches to confidentiality. The e-learning industry has an ambivalent approach to confidentiality. 3 provokes the question of how much confidentiality is actually appropriate. Websites are fundamentally in the public domain, e-learning tends not to be.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LMS RFP: Find the Right LMS Your Organization

Paradiso

Confidentiality: If the LMS RFP includes confidential information, make sure to include a confidentiality clause in the RFP to protect this information. This may include ensuring that the process is fair and transparent, and that all vendors are given the same information and have an equal opportunity to submit proposals.

LMS 162
article thumbnail

AI Tools, Games, Freelancing: ID Links 2/14/23

Experiencing eLearning

Most ID and elearning work is work-for-hire, but sometimes you create something you should license so you can also reuse it (like non-confidential portions of a course for your portfolio). I agree with this list of red flags: non-compete clauses, no payment terms, intellectual property, indemnity clauses, and rights.

Games 376
Our readers want you
article thumbnail

The benefits of Utilizing a Virtual Data Room

Association eLearning

In mergers and acquisitions, for example , buyers often need to access large volumes of prints of extremely confidential papers. And because these documents need to remain confidential, they must always be stored safely. Moreover, using a VDR is less expensive than using a traditional info room.

Benefits 100
article thumbnail

Why Are Finance Training Programs Important for Employees?

Infopro Learning

Several firms utilize critical resources for their finance training programs that need to be stored confidentially. Online finance training programs cost less to deploy, run, and modify and take up less time as employees can leverage them anytime. Enhanced Control over Security and Privacy.

Training 387
article thumbnail

BrainCert is Now A SOC 2 Type II Accredited Company

BrainCert

BrainCert’s information security practices, policies, procedures, and operations meet the standards of SOC 2 for security, processing integrity, availability, privacy, and confidentiality. What is SOC 2 Type II?

article thumbnail

Press Release: Fractal LXP announces inimitable reasons to patronize

Origin Fractal LXP

These instances have shed light on potentially huge financial implications, and have questioned its capabilities in protecting confidential information. While Origin Learning has helped all its clients to overcome the various risks, Origin Fractal’s ISO 27001 accreditation adds a new dimension to data security and confidentiality.

Press 95
article thumbnail

5 Factors to Consider in eLearning Outsourcing

Tesseract Learning

Confidentiality. Confidentiality is a key factor when it comes to eLearning outsourcing. It is important to ensure the team members are also committed to maintaining the confidentiality of the information shared with them. Also, don’t hesitate to ask for references.

Outsource 115
article thumbnail

12 Questions to Ask When Hiring an E-Learning Developer

Capytech

If your project involves providing confidential data or intellectual property to the e-learning developer, it is essential you ask how they will protect that data and information. So, find out about the developer’s communication processes. How will they protect your data and intellectual property?

Develop 59
Our readers want you
article thumbnail

Describe Yourself Essay? — College Confidential

E-learning Uncovered

Our experts review an actual response to the Tell Us About Yourself Essay from an applicant to a top MBA program to help you write better essays

article thumbnail

Can companies prevent ransomware attacks through RDP with cyber awareness training? 

Creativ Technologies

But most importantly, hackers got access to confidential data of its clients, i.e. the insured. The organizations must ensure that all the PCs in the office are not accessible through the RDP, especially those containing confidential data. CAN Financials paid the largest amount of 40 million USD as ransom in March 2021 to hackers.

article thumbnail

The value of Mobile phone Antivirus

Association eLearning

Some apps may also remotely remove confidential information if your product is normally lost. If perhaps they don’t, install them. Another important characteristic of an antivirus is the ability to back up your data and find your device in case it gets stolen. Yet , these features are not expected by law.

Mobile 100
article thumbnail

Fundamentals of An Impactful Healthcare Compliance Training Program

Infopro Learning

Employees may hesitate to approach the management unless anonymity and confidentiality can be ensured, at least to the degree allowed by the law. For instance, after the training, an employee should feel confident to report an irregularity without fearing retribution or retaliation.

article thumbnail

OpenSesame included in 100 Best Companies

OpenSesame

Inclusion in this program is based on the confidential input of employees who answered questions about workplace satisfaction concerning topics such as benefits, management, trust, work environment, and career development. OpenSesame is proud to announce that we will be included in the 2021 100 Best Companies to work for in Oregon program. .

Companies 105
Our readers want you
article thumbnail

What is Information Security and its types | ecadema - it's time

Professional Online Learning | ecadema

to provide protection against all confidential information. Information security programs focus on 3 prime objectives; Confidentiality Focusing that the information couldn’t be disclosed to any unauthorized individuals, entities, and processes, breaching confidentiality is taken care of at a top-notch level.

article thumbnail

Should You Outsource E-Learning Development or Develop In-House?

Capytech

Keeps your data confidential. Data Confidentiality. It is for training courses that contain sensitive and confidential company information that you want to remain secure. Perceived Advantages of Developing E-Learning Courses In-House. Reduces costs. It is worthwhile exploring each in more detail: Achieve Full Customisation.

article thumbnail

Comprehensive Guide on Document Tracking Using DRM

Kitaboo

Some of these files could contain sensitive or confidential information whose security is imperative. DRM helps financial service companies and healthcare organizations with due diligence and securing confidential information. Besides helping them seal confidential deals, DRM usage also enables them to meet data protection regulations.

Track 52
article thumbnail

Can an LMS be hacked? Make sure that does not happen!

Creativ Technologies

He can check the mailbox and steal all kinds of items, such as passport numbers included in confidential mail. Only specific LMS administrators must have access to this server so that no one can steal this confidential data. They know if their mail has been stolen by someone else in such a situation.

LMS 98
article thumbnail

2050: The HR Odyssey – Episode 3

Coorpacademy

It’s a free and confidential exchange, it’s up to you to tick off the information you wish to disclose to your hierarchy once the interview is over through a report that is automatically displayed at the end of our interview. All this remains confidential and the data is automatically deleted every 6 months.

article thumbnail

What kind of an elearning app should a business use?

Creativ Technologies

If security is a consideration because the app stores the confidential data of users of e-learning companies, then it’s better a native app is preferred because it uses the security features of the OS. Hence, a cross-platform app that works on both IOS and android is a better option because it requires a lower development budget.

article thumbnail

Leveraging Digital Publishing Platforms with DRM for Secured Content Distribution

Kitaboo

Businesses now leverage DRM enabled digital publishing platforms to securely distribute sensitive content, confidential data, or learning material. Data confidentiality. Digital publishing platforms offer the most confidential approach to content distribution. Benefits of DRM enabled Digital Publishing Platforms.

article thumbnail

BrainCert Is Now a SOC 2 Type 1 Compliant Company

BrainCert

Confidentiality 5. We have successfully passed our SOC 2 Type I audit that affirms BrainCert's information security practices, policies, procedures, and operations meet the SOC 2 standards for security, availability, confidentiality, and privacy.  Security 2. Availability 3. Processing integrity 4. The BrainCert Team.

article thumbnail

Top 4 Risks To Keep In Mind When Outsourcing Corporate Training

Roundtable Learning

Working with a vendor requires your organization to share a variety of confidential assets, including: . How To Avoid This Risk: Your organization can ensure complete security over your data and confidential information by ensuring that a non-disclosure agreement (NDA) is signed with the vendor before sharing any proprietary materials.

article thumbnail

How To Manage Employee Performance

eLearning Industry

Try these 5 performance management strategies: review performance periodically; enhance overall productivity; provide timely feedback; secure and confidential; and reports and analytics. This post was first published on eLearning Industry.

article thumbnail

The value of Data Space Protection

Skillquore

These alternatives can help corporations be sure the safety of confidential info and reduce the chance of human problem. Security options for data rooms range depending on the application used, nonetheless may include two-factor authentication, remotely revoked get and hiring IT experts to maintain virtual protection.

article thumbnail

The Advantages of DRM in the Publishing Industry

Kitaboo

In this case, you will need to provide them authorized access to your copyright content because the responsibility to maintain confidential information is entirely yours. To ensure the confidentiality of your data, you have to comply with several regulations. It may be that you have to deal with third-party vendors or external teams.

article thumbnail

How to Choose the Best Info Room

Skillquore

It will also have advanced features that could prevent unauthorized users by opening confidential data and info. A data room’s protection level will need to meet sector standards and be certified by reliable organizations.

article thumbnail

Why is DRM inevitable in the digital world?

Kitaboo

As a digital publisher, you may be working with external vendors and in such a scenario, the responsibility of maintaining the sanctity of confidential information is solely yours. To ensure data confidentiality, you need to comply with several regulations.

Digital 52
article thumbnail

Major Data Place For Protected and Easy File Sharing

Skillquore

They also provide security to make sure that sensitive data is not really shared devoid of authorization or stuck in a job way that may be in breach of confidentiality agreements.

article thumbnail

January 2023 OpenSesame Plus Publishers

OpenSesame

Keep your confidential data safe through security awareness training offered by The Security Company. With their courses, teams can gain more knowledge on work related topics with 20 minute audio book summaries from SoundView. Make the most out of limited time.

article thumbnail

What is CIA in information security?

QuoDeck

Confidentiality , Integrity and Availability , also known as the CIA triad, is a model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security.

article thumbnail

What is eBook DRM and Why Do Publishers Need it?

Kitaboo

Your business may involve dealing with a lot of people outside your company network, which means that you would need to provide authorized access to confidential information to such people. The responsibility of maintaining this confidentiality is solely yours.

eBook 52
article thumbnail

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. And a “Confidentiality” button, for example. I’ve heard learners criticize eLearning lessons that have too much “extra” stuff at the beginning.

eLearning 152
article thumbnail

AI-Driven LMS Request for Proposal (RFP) Template in 2023

Paradiso Solutions

Security Make sure the AI-powered LMS you select has strong security measures to safeguard your business’s confidential information. Personalization Choose an AI-powered LMS with personalization capabilities, such as designing a unique RFP template that meets your business requirements.

LMS 77
article thumbnail

The OECD and Janison launch PISA for Schools test in Australia

Janison

The PISA for Schools is low-stakes, voluntary and confidential – individual students are not identified nor are the results published by the OECD. “For us, this is our mission – to be a global force for good by powering best-in-class educational assessments with passion and purpose.

article thumbnail

EthosCE Achieves SOC Type 2 Compliance

EthosCE

Security is the most important thing we do at EthosCE, and we are dedicated to ensuring our customers’ data is secure and confidential,” said Ezra Wolfe, CTO of DLC Solutions, LLC. The EthosCE SOC Type 2 report audited the security and confidentiality of the system. No exceptions were noted by the auditor.

article thumbnail

Free of charge Board Interacting with Software

Skillquore

It also allows you to keep very sensitive meeting elements in one centralized location, which usually reduces the risk of confidential info being lost or thieved. User Administration and Regulates with Modern day Board Websites Online mother board room websites are the most effective way to regulate a large number of appointments.

article thumbnail

How can compliance training protect an employer from unauthorized video recordings?

Creativ Technologies

Apart from that, organizations also need to decide where to store such video recordings because it’s highly confidential and can’t reach the wrong hands. Hence, there can be policies in place to ensure that employees are not allowed to bring recording devices where confidential business information is exchanged.

article thumbnail

OpenSesame Named No. 27 Best Company to Work For in Oregon for 2021

OpenSesame

The 100 Best Companies to Work For program ranks employers based on confidential responses from employees residing in Oregon to survey questions across several categories, including work environment, decision-making and trust, benefits and compensation, career development and learning. . In its debut year, OpenSesame ranked No.