Are confidentiality concerns holding back the e-learning industry?

From the Coleface

Analytics (detailed analysis of hits on each webpage, used to inform design – look out for split run testing with tin can in e-learning case studies one day). • However, for me the root cause is the difference in approaches to confidentiality.

I Believe in the Value of Connectedness

Tom Spiglanin

Connections are virtually all informal, put in place one relationship at a time by mutual agreement between two individuals. Changing Workplace Collaboration I Believe Informal Learning Personal Knowledge Management Social Networking

Trending Sources

LMS Data Security – Challenges and Solutions [Infographic]

CommLab India

A Learning Management System (LMS) is a treasure trove of sensitive and confidential information of every organization. Such information, if it falls into wrong hands can spell disaster. Then how can we ensure the safety of your confidential data?

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? What does it take to prevent a costly information heist? Let us now look at some of the common challenges to the security of information stored in LMSs. Challenge 2: Encrypting information.

How to Edit a Screenshot

Visual Lounge

You have a screenshot that you need to share, but it contains confidential information. Let’s say you have a screenshot that provides information in English, but you need to update it to send to a Spanish-speaking customer. Blur out confidential information in a screenshot.

Overcoming 4 Common Concerns of Outsourcing Training

CommLab India

Information privacy and security. Nowadays, you can get this information via LinkedIn and other professional networking sites. The privacy of confidential data and trusting an external agency with your groundbreaking research and proprietary information become major concerns.

Is Your m-Learning Secure? The Threat and How to Avoid It.


65% of information searches start on a smartphone. Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices.

Checkpoints That’ll Keep Your Outsourcing Fears at Bay

CommLab India

Confidentiality issues. Outsourcing e-learning may require you to share some confidential information with your vendor which will naturally raise concerns about their safety and potential misuse. This legally binds the vendor to ensure confidentiality is maintained.

4 Ways to Jump Start an eLearning Lesson

Integrated Learnings

Think about all the material that some lessons place before the actual content: title slide, copyright and/or confidentiality statements, navigation instructions, learning objectives, etc. 1-- Make information that isn’t part of the course content available via buttons. And a “Confidentiality” button, for example. That way, this information is accessible to learners without setting a bland tone for the lesson. --2-- By Shelley A. Gable.

5 Tips for Better Screen Captures

Visual Lounge

5) Blur Out Sensitive Information. Want to quickly share important details, like flight times, with your boss or a client, but it has confidential information? Snagit has an easy-to-use blur tool that lets you virtually erase private information.

Bringing Sass to Safety: Must-Watch Music Video from Virgin America


Many sellers on OpenSesame use pop culture references, satire or even cartoons to relay valuable information. Confidential Information: Mission Possible! . Need to train your employees on the proper techniques for handling sensitive information?

Office 365 Video: Your Corporate YouTube

Visual Lounge

It’s not so great if the videos you’re sharing have confidential information, trade secrets, or information that would give outside hackers an insight into the inner workings of your company.

What are your options when creating multilingual training courses?


It uses this data to improve its automatic translation algorithm, but your confidential training information is not that confidential anymore. It ensures the security of your training information. You can actually sign confidentiality agreements with these people.

7 Factors That Decide The Fate of Your Code of Conduct E-Learning Course

CommLab India

For instance, if you are training your employees on IT safety and security compliance,instead of conveying them that confidential data should not be leaked, you can state that everyone in the organization should ensure the confidentiality of information.

E-Learning Tips for Motivating New Hires

Origin Learning

Once the formal training has begun, e-learning can offer much needed support to familiarize new hires with tidbits of information that may be trivial but crucial in empowering them with wider knowledge to enable better decision making.

Deliver Outstanding Customer Service with Screen Recording

Visual Lounge

Using this “flipped” model of instruction , new employees are able to receive the information up front, and then meet with their trainer for more hands-on activity and to cover questions. Maintaining an internal-only knowledgebase allows everyone to access information when they need it.

9 Strategies to Make Your Peer Learning Program Thrive

CLO Magazine

Consider an informal advisory committee of active participants to identify their top issues, goals, challenges, opportunities, topics of interest, etc. Acknowledge and normalize the discomfort of being vulnerable, and set confidentiality guidelines.

Let’s face it, compliance is not the same as learning

Clive on Learning

There was far more information than any human being could possibly hope to absorb; much of this would have been better presented as auxiliary reading materials. A while back I did something quite unusual.

When in Doubt, Blur it Out – 5 Reasons to Use Blurring at Work

Visual Lounge

Sometimes there is sensitive information you don’t want to show others, yet you need them to see the rest of the document. For some categories of information, redaction is your safest choice – black boxes on top of a screenshot completely obliterate what’s underneath.

Train 35

Do You Really Know the Terms and Conditions of Your Purchased Media?

E-learning Uncovered

Keep private information private. Using a NDA lets the voice talent know that the proprietary information he or she learns from recording the course needs to stay confidential. Fiverr cannot be held responsible if the person you hired shares information with a third party.

To Fit In or Stand Out, That’s the Question

CLO Magazine

Leaving out identifying and other confidential information, researchers created an algorithm that analyzed the natural language used in the messages. Srivastava said the most informative language categories were those shaped by the prevailing workplace culture.

4 Must Have Features of Best Corporate Training Videos and 5 Examples

CommLab India

Employees of the new age are consuming most of the information through videos. The below given Scenario strategy is used in ‘ Information Security Training ’ video. His colleague opened the confidential Tender document and leaked it to competitors. Information Security Training.

Why every company should consider training the extended enterprise


What’s more, by creating different portals for the different types of learners you can ensure everyone gets the right pieces of information. Any confidential data that only employees should know will only be available for employees to access.

Is Your Corporate Training Ready for GDPR?


There’s no doubt we are well into the information age. Today, most organizations are operating entirely paperless corporate training and recordkeeping systems with private and confidential information now being processed and stored electronically. This unavoidable result of technological evolution means that data security is a primary concern for businesses and the people they service. Government authorities have had to move swiftly to match this rapid pace of change.

5 Secrets for Successful HRIS Implementation

CommLab India

In recent years, the demand for Human Resource Information Systems (HRISs) has been increasing at a steady pace. You need to deal with personal and confidential data, when you implement an HRIS.

Building an eLearning portfolio: what to include, formatting basics, and tips


Be sure to get approval from clients, if necessary, as some eLearning projects may involve confidentiality agreements. Contact information. An eLearning portfolio is one of the most important marketing tools you have at your disposal.

Laura Overton: Are today’s L&D leaders sticking to the familiar?

Sponge UK

Each year we provide an opportunity for L&D leaders to confidentially compare their approach to delivering learning and supporting performance with their peers. Everyone taking part gets confidential personal feedback in early September.

Moving from an open-source to a commercial LMS – the story of Transactel


TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally).

6-Step Guide for Delivering Professional Web Conferences

DigitalChalk eLearning

It wastes time, is distracting, and may result in you accidentally opening confidential information in front of them. Many of us have a dozen or more files and folders saved on our desktop which are not only distracting to your attendees but might also be confidential.

Here’s What You Need to Know About Informal Learning

Rapid eLearning

As you know, we’re a research lab and many of our projects are confidential. For example, the current rage in the training industry is informal learning. In turn, they will be unleashing a horde of ignorant and pesky co-workers who will be seeking you out for information.

Hiring a Technology Consultant

Web Courseworks

Is confidentiality an issue with your project? Yep, you will make them sign a confidentiality agreement; you can’t be too safe. Consultants will help you deliver information and assist others to communicate effectively. A consultant can only be as good as the information she has.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage. I would see no difficulty in sharing ideas with your contact, while maintaining client confidentiality.

Informal Learning Hits Brick Walls

Vignettes Learning

I nformal Learning Hits Brick Walls There is more than one way to implement informal learning. It is better to deal with the "formal" requirements of the organization on informal learning. I agree with Jay Cross and Harold Jarche that we should not box-in or put constraints on informal learning otherwise it does not flourish. At the core of informal learning are freedom, independence and flexibility. How do we launch and initiate informal learning?

Learning and teaching with Twitter

Learning with e's

There has been a spectrum of reactions to the workshops I have presented, from the sceptical throught to the enthusiastic, and all of the questions that have been asked are valid and representative of the concerns and issues associated with using any informal tool in a formal context.

Teach 45

To Buy or Build Your E-learning, Which Road to Take?

CommLab India

When to buy: You can buy a course when the readymade content meets your organization’s training requirements, the information is generic, and you do not have the resources to develop the course in-house.

JIT Performance Support Mobile App Development

Upside Learning

For example, a client might want to extend the functionality of an existing information system to the iPad/iPhone. Consider during design, the data is proprietary (mostly always is), confidential, of value to competitors, etc.,

Reclaim Your Day: How To Save Time With Visuals and Markup

Visual Lounge

People only remember 10 percent of what they hear after three days, but if a relevant image is paired with that same information, retention goes up to 65 PERCENT ! Highlighting information you want people to notice on charts and graphs ….