How to Create an Effective Sexual Harassment Policy

KnowledgeCity

This post is intended to offer some possible workplace policies that could help prevent harassment from occurring in the first place. Policies to Help Prevent Sexual Harassment. What are the elements of a good sexual harassment policy?

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

SM2 can help your organization implement and utilize social media by providing a tool for monitoring these media and enforcing your organization's compliance policies. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Points to Consider When Updating Your Anti-Harassment Policies

Coreaxis

With the recent slew of high-profile allegations, confessions, and convictions for sexual and workplace harassment, anti-harassment policies have become a “hot button” issue for many companies. To protect your organization, now is a great time to update your harassment policies and procedures. Here are a few steps you can take to update your anti-harassment policies. Consult with employees as you develop your new policies.

Best Practices for Investigating Sexual Harassment Claims

KnowledgeCity

Remind them that this is essential to carrying out a thoughtful and fair investigation Ensure that your sexual harassment training and policies are current. Be sure to revisit company-wide sexual harassment policies and procedures with the entire organization once the investigation has closed.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. security cybersecurity data security byod policy data loss prevention mobile security cloud computing

What is CIA in information security?

QuoDeck

Confidentiality , Integrity and Availability , also known as the CIA triad, is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.

6 Ways to Better Train and Equip Your HR Staff

KnowledgeAnywhere

Have Clear Policies About Confidentiality. Make sure your HR staff know how to handle information and know what should be (legally and ethically) kept confidential. If you decide to share information with an external employee or administrator, post your policies firmly.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Establishing and publicizing antiharassment policies, as well as letting all employees know how to report violations, is the final piece of this strategy. Introducing policies and procedure during onboarding and regularly reviewing them, perhaps using microlearning or job aids, increases employee awareness. Everyone deserves a safe work environment, supported by both policy and corporate culture.

Why is elearning so important for companies?

Creativ Technologies

Company policies . Elearning is the best way to teach employees about company policies. The HR Managers can also talk elaborately about company policies so that all recruiters know before the recruiting season starts.

Arlo has opened a new data center in the US for North American training providers

Arlo Training & Events Software

Recently, we announced a new Arlo data center in Canada. We have again added to our growing list of secure data storage centers around the world with a new center in the US. This new data center based in Oregon, US, adds to our list of Canada, Ireland and Australia.

Worried About Course Security? Start With Your Website.

LearnDash

Are you working in a confidential field, where you may be handling sensitive information? There may be industry-specific compliance policies you have to follow. Protecting your intellectual property is important, but securing your website should come first.

Leveraging Digital Publishing Platforms with DRM for Secured Content Distribution

Kitaboo

Businesses now leverage DRM enabled digital publishing platforms to securely distribute sensitive content, confidential data, or learning material. Data confidentiality. Digital publishing platforms offer the most confidential approach to content distribution.

Resources for Sexual Harassment Prevention in Your Workplace

Interactive Services

Today, many organizations around the world are continuing to shape and reshape their policies, gain a greater understanding of the threats and mistreatment their employees face or could face, and attempt to resolve issues before they become a problem. State and federal policies.

Moving from an open-source to a commercial LMS – the story of Transactel

eFront

After 6 months Transactel became part of the TELUS International Team which shifted their priorities and policies. TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally).

STRIVR is Soc 2 Certified

STRIVR

Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise availability, integrity, confidentiality, and privacy. Confidentiality. We assure that all confidential information is kept that way. Information designated as confidential is protected. Personal information is collected, used, retained, disclosed, and disposed of in accordance with STRIVR’s Privacy Policy. “At

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. Technology] policies need to be updated to take into account the various places that employees will be using their devices, such as home use, the avenues through which data can travel and the different types of communication that are occurring, such as Facebook, Twitter and text messages.

Unpacking New York Anti-Sexual Harassment Training Needs

Interactive Services

It also includes materials, such as a model sexual harassment policy and a list of requirements for employer policies, based on the feedback and advice of many different individuals, advocates and advocacy groups, employers, organizations across a wide range of industries, and others. As per Section 201-g of the New York State Labor Law, employers must adopt the model sexual harassment prevention policy (more below) or a policy that meets or exceeds the following minimum standards.

Customer Video Stories Serve Multiple Purposes

dVinci Interactive

Many business customers have policies against endorsing vendors and there may be competitive or confidentiality issues that prevent them from participating. When you capture a story about the impact of your product or service on a customer, you have a valuable asset you can use for training, internal communications and marketing. Especially for B2B firms, it’s not always easy to explain the value of your services or products.

Custom 147

A Checklist To Safeguard Your Institution’s Data

Academia

Schools and higher educational institutions are data treasure-troves as they often collect and process personal and confidential information about their prospective and enrolled students, alumni and staff.

Docebo powered by AWS: keeping you secure while you learn anywhere

Docebo

With AWS, you can improve your ability to meet core security and compliance requirements, such as data locality, protection, and confidentiality with our comprehensive services and features. Has AWS changed its policy regarding moving customer data from one region to another?

Docebo 130

Top 8 Cloud Security Best Practices

Hurix Digital

For instance, in cases of insider theft or social engineering, the only thing that can help you ensure data safety is the right access control policies. The key here is to manage access control policies strictly that allow you to restrict the users attempting to enter your cloud environment.

The 7 GDPR Principles

Ed App

GDPR Principle #6: Integrity and Confidentiality. This principle is meant to ensure that collected data is kept secure and confidential. An organization will need to create its privacy policies, have its codes of conduct, and also report data breaches that occur to the public.

Operational Resilience and Business Continuity – Guidance for Legal and Financial Services Firms

Unicorn Training

Non-encrypted IT equipment can make staff more vulnerable to cyber-attacks and subsequently data protection/GDPR issues from storing confidential client files unsafely.Review of internal policies, procedures and controls to ensure that there are no increased risks that would otherwise be mitigated or controlled in normal circumstances.

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information. Proper encryption of sensitive information in your LMS goes a long way in securing it against confidentiality attacks – attacks carried out by hackers to access and distribute confidential information.

What to do if they just want “awareness”

Making Change

“We just need everyone to be aware of the policy,” your client says. The answers to these questions will help you design realistic, challenging activities that help learners apply the policy and improve the organization’s performance. To find out how your project will improve the organization’s performance, try asking questions like these: How do you know that people aren’t already aware of the policy?

HEMA MANI WALKS THE POSH TALK WITH LEARNNOVATORS

Learnnovators

The very fact that we have made this committee very transparent/confidential and an independent body itself has created a culture in the organization where employees can feel confident to go ahead and raise a complaint if they feel harassed. What is Lennox’s tolerance policy on POSH?

How to Reduce the Burden of the Examination Officer at an Institute

Academia

Updating examination-related policies. Managing the examination preparation process – creating timetables, seating plans, securely storing confidential examination materials; administering the internal assessment, etc.

The benefits of online training for a franchise network

LearningZen

Do you have confidential information that you want to share with your franchisees, but don’t want a bunch of papers laying around that anyone can see? This will allow your trainers to spend more time face to face teaching skills that will help your franchisees get off to a faster start, rather than going over say a uniform policy that they could have read online.

What is mental health in the workplace?

Engage in Learning

A zero tolerance policy to bullying should come from the top. These strategies will also help to prevent workplace bullying: Create a formal policy. A bullying policy should be absolutely clear that bullying is unacceptable in all circumstances.

BYOD: Revisited

Training Industry

Not to mention that companies risk becoming liable for things beyond their control (confidential data getting mixed up with your compromising photos, for instance). According to companies such as VMware, IT maintains centralized control over policies, security and content delivery across devices. It sure seems like everyone continues talking about the Bring Your Own Device (BYOD) practice, these days. And why shouldn’t they?

How E-learning for Health Changed After Covid-19

Spark Your Interest

Or that have high confidentiality or privacy requirements. The BC Center for Disease Control (BCCDC) provides health promotion and prevention services, analytical and policy support to government and health authorities.

Change 183

L&D: Learning and Dystopia

Association eLearning

Company policy 3-7b states that this event type can only be covered in a generic sense. I read and signed the confidentiality waiver already.”. You know that feeling you get when something is hyped as “the ultimate solution”? If you’re like me your reaction is probably along the lines of, “That’s too good to be true. Therefore, it probably isn’t true.” Back in the day, household radio sets were going to be the big breakthrough for learning.

Is Your Corporate Training Ready for GDPR?

PulseLearning

Today, most organizations are operating entirely paperless corporate training and recordkeeping systems with private and confidential information now being processed and stored electronically. An initial directive was implemented in 1995; however, the need to update the policy has been driven by the increasing amount of data that organizations handle every day. There’s no doubt we are well into the information age.

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

And by that I don’t mean heavy-handed social media policies, but advice on privacy settings and common sense guidelines on having discussions in a public space. For sure there may well be questions of a more confidential nature that workers won’t feel they can ask or discuss outside their own organisation, which means there is likely a need to support this kind of interaction between colleagues internally. Tweet.

Trust 185

The Role of Scenario-Based Learning in Online Training

CommLab India

As soon as you think of compliance, I am sure you are reminded of those insipid rules and regulations, dry policies and code of conduct. Show the risks that can be faced in various work situations by not following a code of conduct and company policies. For example, how your organization’s confidential information was leaked to competitors by not adhering to the data privacy laws. Life’s approach towards learning is altogether different.

Workplace Wellness: Supporting Your Employees During COVID-19

The Training by Nelle Blog | Corporate Training and Consulting

Highlights the Science and Practice of Psychology, provides confidential telephone counseling, advocacy resources about health disparities, military and veterans, physical and mental health, and substance abuse disorders.

Apple 56

Importance of Data Security in Higher Ed Institutions

Hurix Digital

This is a crime because cyber attackers can spy on students and college staff and gain access to confidential information. For more information, check out our Privacy Policy. Working remotely has become popular because of the COVID-19 pandemic.

What Your Onboarding Kit Should Include (And Why You Should Offer One)

TalentLMS

The modern onboarding kit is much more than a bunch of forms and policies. Confidentiality agreements. Policies and guidelines. While this might not seem like the ‘fun’ content you were expecting, new employees need to be familiar with company policies and guidelines. Human resource policies. It’s Day 1 at your new job. As you walk through the sliding door and towards the front desk to let them know you’ve arrived, you can’t keep the smile off your face.

How to Protect Your Company from a Sexual Harassment Lawsuit

KnowledgeCity

Let’s review some of these: Have a written, published sexual harassment policy. Follow compliant harassment policies to maintain safety in the workplace. Decide who will present your company’s safety policies (this could be your company’s legal team or HR department). Although the specific information is confidential, the EEOC must notify the employer of the claim within 10 days of the filing date.

How Game-based Learning Can Assist Various Compliance Programs

CommLab India

Safety training is training workforce on the policies and measures to safeguard them in the workplace. IT security compliance requires IT managers to backup, encrypt, store, and safeguard their confidential data. For example, any employee who tries to use a pen drive found unclaimed in the parking lot may puts the confidential data of his organization at a risk. Compliance training is a huge mountain for Chief Compliance Officers to conquer, an unfamiliar, hostile terrain.