How to Create an Effective Sexual Harassment Policy

KnowledgeCity

This post is intended to offer some possible workplace policies that could help prevent harassment from occurring in the first place. Policies to Help Prevent Sexual Harassment. The EEOC’s select taskforce on the study of harassment in the workplace has made recommendations for employers to ensure their anti-harassment policies provide adequate employee protections. What are the elements of a good sexual harassment policy?

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

SM2 can help your organization implement and utilize social media by providing a tool for monitoring these media and enforcing your organization's compliance policies. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Points to Consider When Updating Your Anti-Harassment Policies

Coreaxis

With the recent slew of high-profile allegations, confessions, and convictions for sexual and workplace harassment, anti-harassment policies have become a “hot button” issue for many companies. To protect your organization, now is a great time to update your harassment policies and procedures. Here are a few steps you can take to update your anti-harassment policies. Consult with employees as you develop your new policies.

Best Practices for Investigating Sexual Harassment Claims

KnowledgeCity

Remind them that this is essential to carrying out a thoughtful and fair investigation Ensure that your sexual harassment training and policies are current. Be sure to revisit company-wide sexual harassment policies and procedures with the entire organization once the investigation has closed.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. security cybersecurity data security byod policy data loss prevention mobile security cloud computing

What is CIA in information security?

QuoDeck

Confidentiality , Integrity and Availability , also known as the CIA triad, is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Establishing and publicizing antiharassment policies, as well as letting all employees know how to report violations, is the final piece of this strategy. Introducing policies and procedure during onboarding and regularly reviewing them, perhaps using microlearning or job aids, increases employee awareness. Everyone deserves a safe work environment, supported by both policy and corporate culture.

STRIVR is Soc 2 Certified

STRIVR

Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise availability, integrity, confidentiality, and privacy. Confidentiality. We assure that all confidential information is kept that way. Information designated as confidential is protected. Personal information is collected, used, retained, disclosed, and disposed of in accordance with STRIVR’s Privacy Policy. “At

Moving from an open-source to a commercial LMS – the story of Transactel

eFront

After 6 months Transactel became part of the TELUS International Team which shifted their priorities and policies. TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally).

Unpacking New York Anti-Sexual Harassment Training Needs

Interactive Services

It also includes materials, such as a model sexual harassment policy and a list of requirements for employer policies, based on the feedback and advice of many different individuals, advocates and advocacy groups, employers, organizations across a wide range of industries, and others. As per Section 201-g of the New York State Labor Law, employers must adopt the model sexual harassment prevention policy (more below) or a policy that meets or exceeds the following minimum standards.

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. Technology] policies need to be updated to take into account the various places that employees will be using their devices, such as home use, the avenues through which data can travel and the different types of communication that are occurring, such as Facebook, Twitter and text messages.

Resources for Sexual Harassment Prevention in Your Workplace

Interactive Services

Today, many organizations around the world are continuing to shape and reshape their policies, gain a greater understanding of the threats and mistreatment their employees face or could face, and attempt to resolve issues before they become a problem. Still, whether you’re reshaping your workplace sexual harassment prevention policies or building a program from the ground up, it can be difficult to know where to start. Policies: Your company handbook and beyond.

HEMA MANI WALKS THE POSH TALK WITH LEARNNOVATORS

Learnnovators

The very fact that we have made this committee very transparent/confidential and an independent body itself has created a culture in the organization where employees can feel confident to go ahead and raise a complaint if they feel harassed. What is Lennox’s tolerance policy on POSH?

Docebo powered by AWS: keeping you secure while you learn anywhere

Docebo

With AWS, you can improve your ability to meet core security and compliance requirements, such as data locality, protection, and confidentiality with our comprehensive services and features. Has AWS changed its policy regarding moving customer data from one region to another? At Docebo, we’re focused, first and foremost, on creating and delivering a cloud-based LMS that our customers love.

Docebo 100

Operational Resilience and Business Continuity – Guidance for Legal and Financial Services Firms

Unicorn Training

Non-encrypted IT equipment can make staff more vulnerable to cyber-attacks and subsequently data protection/GDPR issues from storing confidential client files unsafely.Review of internal policies, procedures and controls to ensure that there are no increased risks that would otherwise be mitigated or controlled in normal circumstances.

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information. Proper encryption of sensitive information in your LMS goes a long way in securing it against confidentiality attacks – attacks carried out by hackers to access and distribute confidential information.

Top 8 Cloud Security Best Practices

Hurix Digital

For instance, in cases of insider theft or social engineering, the only thing that can help you ensure data safety is the right access control policies. The key here is to manage access control policies strictly that allow you to restrict the users attempting to enter your cloud environment. The other way to improve access control management is by assigning specific rights and access policies to different users with least privilege policy.

What to do if they just want “awareness”

Making Change

“We just need everyone to be aware of the policy,” your client says. The answers to these questions will help you design realistic, challenging activities that help learners apply the policy and improve the organization’s performance. To find out how your project will improve the organization’s performance, try asking questions like these: How do you know that people aren’t already aware of the policy?

Workplace Wellness: Supporting Your Employees During COVID-19

The Training by Nelle Blog | Corporate Training and Consulting

Highlights the Science and Practice of Psychology, provides confidential telephone counseling, advocacy resources about health disparities, military and veterans, physical and mental health, and substance abuse disorders.

Apple 56

Customer Video Stories Serve Multiple Purposes

dVinci Interactive

Many business customers have policies against endorsing vendors and there may be competitive or confidentiality issues that prevent them from participating. When you capture a story about the impact of your product or service on a customer, you have a valuable asset you can use for training, internal communications and marketing. Especially for B2B firms, it’s not always easy to explain the value of your services or products.

Custom 147

How to Protect Your Company from a Sexual Harassment Lawsuit

KnowledgeCity

Let’s review some of these: Have a written, published sexual harassment policy. Follow compliant harassment policies to maintain safety in the workplace. Decide who will present your company’s safety policies (this could be your company’s legal team or HR department). Although the specific information is confidential, the EEOC must notify the employer of the claim within 10 days of the filing date.

The benefits of online training for a franchise network

LearningZen

Do you have confidential information that you want to share with your franchisees, but don’t want a bunch of papers laying around that anyone can see? This will allow your trainers to spend more time face to face teaching skills that will help your franchisees get off to a faster start, rather than going over say a uniform policy that they could have read online.

BYOD: Revisited

Training Industry

Not to mention that companies risk becoming liable for things beyond their control (confidential data getting mixed up with your compromising photos, for instance). According to companies such as VMware, IT maintains centralized control over policies, security and content delivery across devices. It sure seems like everyone continues talking about the Bring Your Own Device (BYOD) practice, these days. And why shouldn’t they?

How E-learning for Health Changed After Covid-19

Spark Your Interest

Or that have high confidentiality or privacy requirements. The BC Center for Disease Control (BCCDC) provides health promotion and prevention services, analytical and policy support to government and health authorities. Even before Covid-19 took the world by storm, the World Health Organization (WHO) knew e-learning for health was important. In a 2013 study WHO claimed that more available e-learning for healthcare was to be a major focus.

Change 166

Does Your Compliance Training Need A Makeover?

KnowledgeCity

Compliance training is defined as employee training mandated by legislation, regulation or policy. The purpose of these laws is to maintain safety and client confidentiality in the workplace. Compliance training programs cover a wide swath of areas, including trade secrets, records management and information confidentiality. Are you in charge of your company’s compliance with the latest laws and regulations?

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

And by that I don’t mean heavy-handed social media policies, but advice on privacy settings and common sense guidelines on having discussions in a public space. For sure there may well be questions of a more confidential nature that workers won’t feel they can ask or discuss outside their own organisation, which means there is likely a need to support this kind of interaction between colleagues internally. Tweet.

Trust 209

L&D: Learning and Dystopia

Association eLearning

Company policy 3-7b states that this event type can only be covered in a generic sense. I read and signed the confidentiality waiver already.”. You know that feeling you get when something is hyped as “the ultimate solution”? If you’re like me your reaction is probably along the lines of, “That’s too good to be true. Therefore, it probably isn’t true.” Back in the day, household radio sets were going to be the big breakthrough for learning.

Dealing with Workplace Sexual Harassment

KnowledgeCity

If you don’t have a written sexual harassment policy, get it done now. A clear sexual harassment policy should not tolerate any behaviors that create a toxic culture for employees. The no-tolerance policy must apply to all levels of the organization, whether they are executives or line workers. To enforce the policy, it is imperative that training takes place at all levels, especially senior management, who lead by example. #MeToo. Time’s Up.

When it is time to change your business LMS

Matrix

If there is the issue of confidentiality with some of the material (company policies for example), accessibility to those particular modules can be restricted to company-owned workstations or an intranet connection. Purchasing a new LMS is a serious undertaking for any organization. There are several steps to be checked, quite a few things to be investigated, numerous stakeholders to be interviewed and not a small amount of negotiation with the vendors.

Is Your Corporate Training Ready for GDPR?

PulseLearning

Today, most organizations are operating entirely paperless corporate training and recordkeeping systems with private and confidential information now being processed and stored electronically. An initial directive was implemented in 1995; however, the need to update the policy has been driven by the increasing amount of data that organizations handle every day. There’s no doubt we are well into the information age.

Top 5 Cloud Management Challenges And Tips to Overcome Them

Hurix Digital

Keeping confidential data safe and secure is among the topmost priorities for businesses. For more information, check out our Privacy Policy.

Build a deliberately developmental organization through peer learning groups

CLO Magazine

When she announced that a new policy change needed to be made, employee morale and productivity plummeted. Because they were admitting their vulnerability in a confidential session, trusting relationships began to develop, and they reinforced each other as they learned how to include their employees in the policy change decision-making process. “The culture of most organizations is not designed for practice; it’s designed for performance.

The Role of Scenario-Based Learning in Online Training

CommLab India

As soon as you think of compliance, I am sure you are reminded of those insipid rules and regulations, dry policies and code of conduct. Show the risks that can be faced in various work situations by not following a code of conduct and company policies. For example, how your organization’s confidential information was leaked to competitors by not adhering to the data privacy laws. Life’s approach towards learning is altogether different.

Compliance Training. The Essentials In Fostering Employee Participation

Interactive Services

Wide in scope, compliance encompasses areas such as codes of conduct, confidentiality, conflicts of interest, gifts and benefits as well as the ubiquitous Health and Safety regulations. Because actions, spoken words, written messages and social media posts could convey discrimination or harassment, even inadvertently, employers should have a policy that is clear and easy to understand.

What You Need to Know: GDPR & xAPI

Watershed

ability to ensure ongoing confidentiality, integrity, availability, and resilience of processing systems. Ensuring ongoing confidentiality and integrity of systems is achieved by a mix of LRS functionality and company policies. Part of our information security policy also details our incident response plan and our process for testing organizational security measures. Everyone seems to be talking about the General Data Protection Regulation (GDPR) right now.

xapi 48