How can you raise employee awareness of legal issues?


Coorpacademy and lawpilots have co-created two courses to provide the best possible education on legal issues for employees: one focuses on equal treatment of employees and the other on risks related to remote work. The post How can you raise employee awareness of legal issues?

Issue 52

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. This brings up issues of confidentiality: not wanting to give away our secrets; not wanting to lose competitive advantage. I would see no difficulty in sharing ideas with your contact, while maintaining client confidentiality.

5 Factors to Consider in eLearning Outsourcing

Tesseract Learning

Confidentiality. Confidentiality is a key factor when it comes to eLearning outsourcing. It is important to ensure the team members are also committed to maintaining the confidentiality of the information shared with them.

What is an LMS?


Safe and secure – Data safety and confidentiality is a major concern for everyone these days. The platform is hosted on the user’s servers, hence they are responsible for maintaining the system, making upgrades and resolving technical issues. Issues related to knowledge sharing and skill gaps can be addressed as and when needed.


Worried About Course Security? Start With Your Website.


Run your updates one at a time so that if something does break, you can more easily isolate the issue. Are you working in a confidential field, where you may be handling sensitive information?

Don't panic - security breaches


There are three areas in cybersecurity, commonly called the CIA: Confidentiality, Integrity and Availability. Confidentiality. These include: patient records, human resources records, and financial documents, which until publicly released, are all confidential. After listing all business assets within your company, start organizing assets by confidentially importance and outlining special measures needed to protect them. .

Data and your organization: Business learning analytics

Learning Pool

Some of this data is business-critical (and therefore often confidential). Generally, the more business-critical, confidential and threat- or opportunity-laden the data are, the more interesting they look to business leaders.

Is Your m-Learning Secure? The Threat and How to Avoid It.


Mobile security is a big issue as companies move toward delivering more and more training and just-in-time learning via mobile devices. Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. You’ve been hearing about it for some time now: m-Learning is the next big thing, and it’s here to stay.

How to Discuss Sensitive Topics with Your Mentor or Mentee


Just because someone is Black doesn’t mean they’ll want to discuss issues of race (e.g. Just because someone is a woman doesn’t mean they’ll want to discuss issues of gender (e.g. Some subjects are just hard to talk about.

Tips to choose the best Student Management Software


Updated report cards can be issued effortlessly, student’s transcripts managed, and any kind of information obtained on the go. The data can be customised by the administration allowing themselves to be transparent in their allotment process while keeping confidential data secure.

Training Outsourcing: Overcoming Five Fallacies

CommLab India

Having privacy agreements and non-disclosure agreements (NDAs) solves this issue and your organization’s information, knowledge, and other assets will be safe. In fact,a well-managed outsourcing partner will initiate the confidentiality and protection of Intellectual Property Rights (IPR) agreement. Responsible overseeing and abiding by the agreements will solve this issue. Training and e-learning outsourcing has been a successful business strategy over the years.

Just Fired an Employee? How to Protect Your Business From Their Revenge

Your Training Edge

A well behaved but incompetent employee who is fired politely may not pose as much of a risk as a combative employee with a history of behavioral issues in the workplace. They have access to client information, and perhaps even confidential information about the company. They could just as easily steal from the company for monetary gain, or steal physical copies of confidential information. Not every fired employee will go rogue, but when one does, they’re a huge liability.

Remote Mentoring: How to Cultivate a Virtual Connection


Treat these meetings with the same confidentiality and courtesy as you would if you were meeting in person. Create a Backup Plan for Tech Issues. Maintain Connection, Trust and Confidentiality. For many of us, working from home has become the new normal.

Customer Video Stories Serve Multiple Purposes

dVinci Interactive

Many business customers have policies against endorsing vendors and there may be competitive or confidentiality issues that prevent them from participating. When you capture a story about the impact of your product or service on a customer, you have a valuable asset you can use for training, internal communications and marketing. Especially for B2B firms, it’s not always easy to explain the value of your services or products.

Custom 147

Challenges Faced While Framing Mobile E-Learning Course Content

Dynamic Pixel

Connectivity Issues. When mobile learning is incorporated in the organizations for training the employees, this may increase the chances of loss of confidential data and security threats. In today’s e-learning industry, mobile learning has built a notable presence.

The Business Resilience Bundle

Unicorn Training

Outside of the safe work environment however, it is the individual’s responsibility to ensure cybersecurity measures are adopted to protect confidential company information and ensure their devices are not vulnerable to an attack.

E-Learning Tips for Motivating New Hires

Origin Learning

Moreover, these updates are very effective in teaching practice guidelines, safety procedures, confidentiality issues, etc. Training existing employees is extremely important for retaining good quality human resources. Competent employees look beyond just fat paychecks – they want a learning culture they can grow with. Moreover, continuous training ensures that the workforce is increasingly productive and business goals are regularly evolved and met.

Tips 162

5 Points to Consider When Updating Your Anti-Harassment Policies


With the recent slew of high-profile allegations, confessions, and convictions for sexual and workplace harassment, anti-harassment policies have become a “hot button” issue for many companies. First, we should define the issue at hand. Implement confidential processes for reporting. Tackling an issue like harassment is vital to the successful operations of a company.

Resources for Sexual Harassment Prevention in Your Workplace

Interactive Services

Today, many organizations around the world are continuing to shape and reshape their policies, gain a greater understanding of the threats and mistreatment their employees face or could face, and attempt to resolve issues before they become a problem.

A Trainer's Perspective on Making Corporate Training More Productive


We would explore the first-hand experience of a customer (Name Confidential) on how she made training more interesting for her organization’s employees. In the corporate culture, we have engagement issue like everyone else. For quite some time now, we have been focusing on how to make corporate training better. In a recent blog post , we spoke about making compliance training fun.

The Advantages of DRM in the Publishing Industry


In this case, you will need to provide them authorized access to your copyright content because the responsibility to maintain confidential information is entirely yours. To ensure the confidentiality of your data, you have to comply with several regulations.

eBook 56

8 Benefits of Creating Microlearning Videos Based on Social Learning Elements

Obsidian Learning

The organization was experiencing significant quality and safety issues even though their written procedures were very clear about the requirements. This can be a challenge for proprietary or strictly confidential content, but the benefits of having learning at your fingertips are many.

Host Your Corporate Training Videos on Your LMS – Why & How

CommLab India

They contain confidential information. Proprietary issues may arise in the due course of time. Ensure the privacy and confidentiality of organizational information. Consider these factors while hosting training videos on an LMS : file size of the videos & compatibility, hosting charges, streaming server, and confidentiality of information. There are many sites you can host your corporate videos on – for free.

What are Employers Mental Health Responsibilities? 

Engage in Learning

Mental health issues cost UK employers between £33-42 billion a year in unproductive and absent staff. Whilst the negative impact of mental health issues are not entirely unavoidable, having an awareness of the importance of mental health can help workforces thrive.

Operational Resilience and Business Continuity – Guidance for Legal and Financial Services Firms

Unicorn Training

Non-encrypted IT equipment can make staff more vulnerable to cyber-attacks and subsequently data protection/GDPR issues from storing confidential client files unsafely.Review of internal policies, procedures and controls to ensure that there are no increased risks that would otherwise be mitigated or controlled in normal circumstances.

Why PowerPoint crashes and how to prevent it


Add-ins adding issues. If the issue resolves and PowerPoint opens, go to File , click Options , and then click Add-Ins. Or, you experience upload issues or autosaving problems with PowerPoint files saved to SharePoint or OneDrive. Still having PowerPoint crash issues?

Update on the SEC and ISO initiatives for human capital reporting

CLO Magazine

No final rule has been issued yet, in part likely due to the SEC’s need to address more pressing COVID-related issues. Hopefully, the final rule will be issued during the next 12 months. The first five metrics are generally not reported today and considered confidential.

The Switch

Melon Learning

To top it all off, part of the product training had to happen at the very last moment to avoid confidentiality issues. This time around though that was not an option, part because of the confidentiality issues and part because of the tight deadline. We were tackling a whole bunch of problems this way – we could train the entire trainee lot in an hour and a half without having to bother a product manager and still complying with the confidentiality requirements.

Measuring Leadership Effectiveness

Your Training Edge

Remember that poor organizational performance can be related to many issues, such as market forces, poor positioning, or just bad economics. In simple terms, you may see questions such as, the person “treats me with respect” and “helps me work on continuous improvement” The evaluator is asked to give anonymous, confidential answers about the leader. It’s easy to get caught up in leadership skills and development.

How do you promote Mental Health in the Workplace? 

Engage in Learning

Every year, millions of working days are lost to mental health related issues. When a message comes from the top that that mental health issues are real and important it is much easier for employees to deal with their problems. Mental health involves how we think, feel and behave.

Hiring a Technology Consultant

Web Courseworks

When other parties are involved, a consultant may serve as a sign that an organization is trying to correct an existing problem, such as a compliance issue. Is confidentiality an issue with your project? Yep, you will make them sign a confidentiality agreement; you can’t be too safe. Who should we talk with in order to see all sides of the issue? Finding the Right Hired Gun: A Conversation with Elaine Biech.

Importance of Data Security in Higher Ed Institutions

Hurix Digital

This is a crime because cyber attackers can spy on students and college staff and gain access to confidential information. Manual data entry, paper overload, and outdated technology are some of the issues that can be resolved by adopting an effective data collection method.

BYOD: Revisited

Training Industry

Yes, there are drawbacks such as security issues — your personal device could infect your company with a virus or you could lose your phone, and the work information on it could be compromised. Not to mention that companies risk becoming liable for things beyond their control (confidential data getting mixed up with your compromising photos, for instance). It sure seems like everyone continues talking about the Bring Your Own Device (BYOD) practice, these days.

6 Advantages of Hosting Videos on an LMS [Infographic]

CommLab India

Another issue is protecting the confidentiality of the video. Video-based learning is one of the most effective and engaging learning strategies. It helps the learner learn complex concepts easily. The challenge comes when you want to host a training session online, to deliver it to a global audience. The huge file size of videos may create problems while hosting them online on a normal server. So it’s better to host your training videos on a Learning Management System (LMS).

When it is time to change your business LMS


When compatibility becomes an issue. If there is the issue of confidentiality with some of the material (company policies for example), accessibility to those particular modules can be restricted to company-owned workstations or an intranet connection. Purchasing a new LMS is a serious undertaking for any organization.

Unpacking New York Anti-Sexual Harassment Training Needs

Interactive Services

The policy must: Prohibit sexual harassment consistent with guidance issued by the Department of Labor in consultation with the Division of Human Rights. Include a procedure for the timely and confidential investigation of complaints that ensures due process for all parties. Explore the resources available to victims of sexual harassment – This includes providing a complainant form and procedure for investigating complaints in a timely and confidential manner.