Are confidentiality concerns holding back the e-learning industry?

From the Coleface

Analytics (detailed analysis of hits on each webpage, used to inform design – look out for split run testing with tin can in e-learning case studies one day). • However, for me the root cause is the difference in approaches to confidentiality.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage. I would see no difficulty in sharing ideas with your contact, while maintaining client confidentiality.

Informal Learning Hits Brick Walls

Vignettes Learning

I nformal Learning Hits Brick Walls There is more than one way to implement informal learning. It is better to deal with the "formal" requirements of the organization on informal learning. I agree with Jay Cross and Harold Jarche that we should not box-in or put constraints on informal learning otherwise it does not flourish. At the core of informal learning are freedom, independence and flexibility. How do we launch and initiate informal learning?

Here’s What You Need to Know About Informal Learning

Rapid eLearning

As you know, we’re a research lab and many of our projects are confidential. For example, the current rage in the training industry is informal learning. In turn, they will be unleashing a horde of ignorant and pesky co-workers who will be seeking you out for information.

Host Your Corporate Training Videos on Your LMS – Why & How

CommLab India

They contain confidential information. Ensure the privacy and confidentiality of organizational information. There are many sites you can host your corporate videos on – for free. You can even host your corporate training videos on them.

Take a free Cyber Security course for Safer Internet Day 2018

Ed Microlearning

For workplaces, online attacks have catastrophic consequences, including exposure of confidential information, damage to a company's reputation, and significant loss of data, among others. The course is free from today, with no credit card information required.

How to Edit a Screenshot

Visual Lounge

You have a screenshot that you need to share, but it contains confidential information. Let’s say you have a screenshot that provides information in English, but you need to update it to send to a Spanish-speaking customer. Blur out confidential information in a screenshot.

Tips 70

How to Edit a Screenshot

Visual Lounge

You have a screenshot that you need to share, but it contains confidential information. Let’s say you have a screenshot that provides information in English, but you need to update it to send to a Spanish-speaking customer. Blur out confidential information in a screenshot.

Tips 70

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? What does it take to prevent a costly information heist? Let us now look at some of the common challenges to the security of information stored in LMSs. Challenge 2: Encrypting information.

LMS 55

L&D: Learning and Dystopia

Association eLearning

The thought tracker on her left wrist lit up briefly as it logged the new information. “I’m No company name or personally identifiable information is to be used in-” she began reciting as her recall app retrieved the related information. Error, information not found,” Ms.

Is Your m-Learning Secure? The Threat and How to Avoid It.


65% of information searches start on a smartphone. Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices.

The benefits of online training for a franchise network


Do you have confidential information that you want to share with your franchisees, but don’t want a bunch of papers laying around that anyone can see? An online training system can keep that information in one place that only employees and franchisees can access.

Computer Security Training Courses – Why They Matter


One wrong action could crash the system or leak confidential information. . It isn''t just for geeks. Because the success of the company is the responsibility of every employee. Every employee needs to know what can jeopardize the company''s computer infrastructure.

7-Steps to Creating a Coaching and Mentoring Program Four: Measurement

Your Training Edge

Whether your program is formal or informal, the first thing to do in preparation for measurement is to revisit your original goals, objectives, and mission. Again, this could be done the same way regardless of whether the program is formal or informal.

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. 1-- Make information that isn’t part of the course content available via buttons. And a “Confidentiality” button, for example. That way, this information is accessible to learners without setting a bland tone for the lesson. --2-- By Shelley A. Gable.

Bringing Sass to Safety: Must-Watch Music Video from Virgin America


Many sellers on OpenSesame use pop culture references, satire or even cartoons to relay valuable information. Confidential Information: Mission Possible! . Need to train your employees on the proper techniques for handling sensitive information?

Music 80

E-Learning Tips for Motivating New Hires

Origin Learning

Once the formal training has begun, e-learning can offer much needed support to familiarize new hires with tidbits of information that may be trivial but crucial in empowering them with wider knowledge to enable better decision making.

Tips 148

Blockchain Impacts on Medical Care

Your Training Edge

Health Information exchanges (HIE) and all-player claim database (APCD) have become quite obsolete with block chain [4]. The patient through his or her profile, has complete control over medical information and can choose the information to be shared or viewed by the doctors or providers.

Overcoming 4 Common Concerns of Outsourcing Training

CommLab India

Information privacy and security. Nowadays, you can get this information via LinkedIn and other professional networking sites. The privacy of confidential data and trusting an external agency with your groundbreaking research and proprietary information become major concerns.

What are your options when creating multilingual training courses?


It uses this data to improve its automatic translation algorithm, but your confidential training information is not that confidential anymore. It ensures the security of your training information. You can actually sign confidentiality agreements with these people.

The Switch

Melon Learning

To top it all off, part of the product training had to happen at the very last moment to avoid confidentiality issues. This time around though that was not an option, part because of the confidentiality issues and part because of the tight deadline.

News is bad for you

From the Coleface

A really thought-provoking article by Ralf Dobelli (based on a longer essay) about information overload and in particular, news. Who would not want the reputation for being well-informed?

News 130

Why Should You Use Cloud Computing For E-Learning?

Origin Learning

An educational cloud can serve as a reservoir of information which students can access when they are connected through their mobile devices or PCs. Moreover, training may include confidential enterprise data that can be vulnerable to theft. What is cloud computing?

Cool Second Life Happening:UW VIBE Future InfoExpo Recruitment

Kapp Notes

Need to solve a problem, but don’t know how to organize the information? Researchers from the University of Washington Information School are conducting a research study investigating exciting and useful alternative capabilities for Second Life. These exhibits let you interact with new design possibilities aimed at improving the social and information aspects of Second Life. Have you ever had trouble sorting your stuff?

The Case for Communities of Practice

Jay Cross's Informal Learning

Jay Cross is CEO of Internet Time Group and a thought leader in informal learning and organizational performance. In his 2001 book Kitchen Confidential , Anthony Bourdain describes how he became a professional chef and how he continues to support the community of professional chefs.

Delight respondents with custom welcome and thank you pages


Just 2 or 3 lines sharing the most important information. Will the information I provide be confidential? It’s a good practice to eliminate doubts by mentioning the time or including a confidentiality statement, etc, in the welcome page.

Moving from an open-source to a commercial LMS – the story of Transactel


TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally).

Is this compliance story too close to home?

From the Coleface

Your people are already trusted to handle plenty of confidential information, why would you not trust them with this? Learners are used to compliance e-learning.

Checkpoints That’ll Keep Your Outsourcing Fears at Bay

CommLab India

Confidentiality issues. Outsourcing e-learning may require you to share some confidential information with your vendor which will naturally raise concerns about their safety and potential misuse. This legally binds the vendor to ensure confidentiality is maintained.

Elearning Spotlight: Texas Vaccine Education Online

The Learning Dispatch

Providing informative content targeted to several different audiences, the Texas Vaccine Education Online program consists of over 36 online courses that include text, graphics, and interactive learning checks.

Workscaping, 4 of n

Jay Cross

The book Kitchen Confidential (Harper, 2001) by Anthony Bourdain describes how he become a professional chef and how he continues to support the community of professional chefs. Tags: Informal Learning Professional Development.

6 Data Security Tips For Mobile Learning In Corporate Training


The security of mobile learning data is greatly dependent on the security of the mobile device on which it is accessed, meaning that users need to be trained in how to keep information safe. These days, cybercriminals are sophisticated, so if you do not have anti-malware software installed, your information is unprotected. An unsecured Wi-Fi connection can make your personal information subject to cyber attacks.

To Fit In or Stand Out, That’s the Question

CLO Magazine

Leaving out identifying and other confidential information, researchers created an algorithm that analyzed the natural language used in the messages. Srivastava said the most informative language categories were those shaped by the prevailing workplace culture.

Laura Overton: Are today’s L&D leaders sticking to the familiar?

Sponge UK

Each year we provide an opportunity for L&D leaders to confidentially compare their approach to delivering learning and supporting performance with their peers. Everyone taking part gets confidential personal feedback in early September.

Free e-learning: The Top 10 barriers to adoption

From the Coleface

Confidential information: on-line hosted services mean that proprietary material will be located outside the organisation which raises confidentiality risks. As was revealed last Friday at the e-learning Network, vast numbers of free e-learning tools are available. For some of the most popular tools see Jane Hart’s Directory of Learning Tools. If there are all these great free tools, why are cost-conscious firms not adopting them faster?

Free 100

Learning and Networking with a Blog (Deleted Scenes)

Tony Karrer

Can I write about confidential matters? No confidential information should ever be put in a blog post. Most bloggers find that it is rather easy to turn specific questions or issues on a project into generic discussions that contain no confidential information My article in Training + Development Magazine was just published - Learning and Networking with a Blog. You must launch the reader and then go to page 20 to find the article.

3 Tips To Achieve Effective General Data Protection Regulation Training


The corporate training you provide needs to rigorously explain how personal data can be protected from an information security perspective and how to deal with requests from data subjects, such as a data subject withdrawing consent to use their personal data. Cover The Right Information.