How to Create an Effective Sexual Harassment Policy


This post is intended to offer some possible workplace policies that could help prevent harassment from occurring in the first place. Policies to Help Prevent Sexual Harassment. What are the elements of a good sexual harassment policy?

Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

SM2 can help your organization implement and utilize social media by providing a tool for monitoring these media and enforcing your organization's compliance policies. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Points to Consider When Updating Your Anti-Harassment Policies


With the recent slew of high-profile allegations, confessions, and convictions for sexual and workplace harassment, anti-harassment policies have become a “hot button” issue for many companies. To protect your organization, now is a great time to update your harassment policies and procedures. Here are a few steps you can take to update your anti-harassment policies. Consult with employees as you develop your new policies.

How does your company Internet policy stack up?


It has never been more important to outline a clear and specific Internet policy for your employees to follow in order to reduce your liability and exposure to risks. To help beef up your policy, here are five sections you should consider including: 1. Framing Your Company’s Policy.

Best Practices for Investigating Sexual Harassment Claims


Remind them that this is essential to carrying out a thoughtful and fair investigation Ensure that your sexual harassment training and policies are current. Be sure to revisit company-wide sexual harassment policies and procedures with the entire organization once the investigation has closed.

Gone Phishing: Enterprise Targeted Cybersecurity Training

Content Raven

Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy , there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable. security cybersecurity data security byod policy data loss prevention mobile security cloud computing

What is CIA in information security?


Confidentiality , Integrity and Availability , also known as the CIA triad, is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.

BrainCert is Now A SOC 2 Type II Accredited Company


BrainCert’s information security practices, policies, procedures, and operations meet the standards of SOC 2 for security, processing integrity, availability, privacy, and confidentiality.

BrainCert Is Now a SOC 2 Type 1 Compliant Company


Confidentiality 5. The external auditors will thoroughly inspect the practices, policies, and procedures that are in place in an organization to assess whether its security systems meet the requirements of the Standard.

Ways to Improve Cybersecurity Awareness and Training

Content Raven

Establishing BYOD policies, data loss prevention strategies and consistent, agile cybersecurity awareness training is critical to ensuring confidential data is difficult to obtain. With the increase in cybercrime focused on businesses, high-impact organizations are starting to recognize the importance of implementing cybersecurity awareness training programs to protect and secure their intellectual property.

What is Information Security and its types | ecadema - it's time

Professional Online Learning | ecadema

to provide protection against all confidential information. Information securities strategies are the management of processes, tools, and policies required to prevent, detect, document, and counter menaces to digital and non-digital information.

Prevent Workplace Harassment With This 3-Pronged Strategy

Absorb LMS

Establishing and publicizing antiharassment policies, as well as letting all employees know how to report violations, is the final piece of this strategy. Introducing policies and procedure during onboarding and regularly reviewing them, perhaps using microlearning or job aids, increases employee awareness. Everyone deserves a safe work environment, supported by both policy and corporate culture.

Leveraging Digital Publishing Platforms with DRM for Secured Content Distribution


Businesses now leverage DRM enabled digital publishing platforms to securely distribute sensitive content, confidential data, or learning material. Data confidentiality. Digital publishing platforms offer the most confidential approach to content distribution.

Why is elearning so important for companies?

Creativ Technologies

Company policies . Elearning is the best way to teach employees about company policies. The HR Managers can also talk elaborately about company policies so that all recruiters know before the recruiting season starts.

Arlo has opened a new data center in the US for North American training providers

Arlo Training & Events Software

Recently, we announced a new Arlo data center in Canada. We have again added to our growing list of secure data storage centers around the world with a new center in the US. This new data center based in Oregon, US, adds to our list of Canada, Ireland and Australia.

6 Ways to Better Train and Equip Your HR Staff


Have Clear Policies About Confidentiality. Make sure your HR staff know how to handle information and know what should be (legally and ethically) kept confidential. If you decide to share information with an external employee or administrator, post your policies firmly.

How can educational institutions mitigate cybersecurity threats in Education?

Kitaboo on EdTech

Phishing is when attackers send emails or messages, tricking users into revealing personal or confidential information. However, there are certain steps institutes can take to mitigate them: Have a Strong Security Policy.

How can compliance training protect an employer from unauthorized video recordings?

Creativ Technologies

Apart from that, organizations also need to decide where to store such video recordings because it’s highly confidential and can’t reach the wrong hands. Video recordings have become critical for organizations ever since online meetings started happening.

Moving from an open-source to a commercial LMS – the story of Transactel


After 6 months Transactel became part of the TELUS International Team which shifted their priorities and policies. TELUS International policies required that all material be kept confidential and they needed a tool that could support multiple users from multiple departments yet still keep each department’s information private. Transactel is the largest call center in the Central American region and is made up of 6,200 ‘heroes’ (as they’re called internally).

How Can Educational Institutions Mitigate Cybersecurity Threats in Education?

Kitaboo on EdTech

Phishing is when attackers send emails or messages, tricking users into revealing personal or confidential information. However, there are certain steps institutes can take to mitigate them: Have a Strong Security Policy.

10 Cyber Security Resources

Ed App

In just a couple of minutes, they’ll be equipped with the knowledge to identify the different ways confidential data and information can be vulnerable to threats. . Cyber insurance policy. Security policy.

STRIVR is Soc 2 Certified


Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise availability, integrity, confidentiality, and privacy. Confidentiality. We assure that all confidential information is kept that way. Information designated as confidential is protected. Personal information is collected, used, retained, disclosed, and disposed of in accordance with STRIVR’s Privacy Policy. “At

World Events Taking Their Toll: How to Help Your Employees Through (Another) Crisis


Review and Revise Company Policies. Gather your senior leadership team to review your current company and human resource policies. What are your paid time off and remote work policies? Share any updates to company and HR policies.

What to do if they just want “awareness”

Making Change

“We just need everyone to be aware of the policy,” your client says. The answers to these questions will help you design realistic, challenging activities that help learners apply the policy and improve the organization’s performance. To find out how your project will improve the organization’s performance, try asking questions like these: How do you know that people aren’t already aware of the policy?

Change 170

Customer Video Stories Serve Multiple Purposes

dVinci Interactive

Many business customers have policies against endorsing vendors and there may be competitive or confidentiality issues that prevent them from participating. When you capture a story about the impact of your product or service on a customer, you have a valuable asset you can use for training, internal communications and marketing. Especially for B2B firms, it’s not always easy to explain the value of your services or products.

Custom 147

Worried About Course Security? Start With Your Website.


Are you working in a confidential field, where you may be handling sensitive information? There may be industry-specific compliance policies you have to follow. Protecting your intellectual property is important, but securing your website should come first.

Resources for Sexual Harassment Prevention in Your Workplace

Interactive Services

Today, many organizations around the world are continuing to shape and reshape their policies, gain a greater understanding of the threats and mistreatment their employees face or could face, and attempt to resolve issues before they become a problem. State and federal policies.

A Checklist To Safeguard Your Institution’s Data


Schools and higher educational institutions are data treasure-troves as they often collect and process personal and confidential information about their prospective and enrolled students, alumni and staff.

Is Your m-Learning Secure? The Threat and How to Avoid It.


Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. Technology] policies need to be updated to take into account the various places that employees will be using their devices, such as home use, the avenues through which data can travel and the different types of communication that are occurring, such as Facebook, Twitter and text messages.

5 Ways to Boost General Work Efficiency with LMS


Corporate policies. LMS helps you streamline the project management process by assigning roles, tracking work progress, and sharing confidential data to get the job done. . Learning Management System (LMS) is one of the most important tools to foster communication via social learning.

Top 8 Cloud Security Best Practices

Hurix Digital

For instance, in cases of insider theft or social engineering, the only thing that can help you ensure data safety is the right access control policies. The key here is to manage access control policies strictly that allow you to restrict the users attempting to enter your cloud environment.

How to Start an Online Healthcare Consultation Business?


Medical consultants are experts in the healthcare industry- they have the right educational qualification and background on medical laws and policies to help healthcare organizations and hospitals run their businesses the most effectively.

Unpacking New York Anti-Sexual Harassment Training Needs

Interactive Services

It also includes materials, such as a model sexual harassment policy and a list of requirements for employer policies, based on the feedback and advice of many different individuals, advocates and advocacy groups, employers, organizations across a wide range of industries, and others. As per Section 201-g of the New York State Labor Law, employers must adopt the model sexual harassment prevention policy (more below) or a policy that meets or exceeds the following minimum standards.

Operational Resilience and Business Continuity – Guidance for Legal and Financial Services Firms

Unicorn Training

Non-encrypted IT equipment can make staff more vulnerable to cyber-attacks and subsequently data protection/GDPR issues from storing confidential client files unsafely.Review of internal policies, procedures and controls to ensure that there are no increased risks that would otherwise be mitigated or controlled in normal circumstances.

Winning Combo: Security Awareness Training & Anti-Phishing Training?


They are commonly used for information gathering, and people share confidential details because there are so few indicators that the messages are illegitimate. . By Suzanne Gorman, CISSP, CRISC.

Preventing Data Security Breaches on an LMS

CommLab India

How can you ensure the safety of your confidential data? For instance, it is advisable to have proper procedures to change passwords to prevent unauthorized access to your LMS and ensure the security of your confidential information. Proper encryption of sensitive information in your LMS goes a long way in securing it against confidentiality attacks – attacks carried out by hackers to access and distribute confidential information.

The new talent imperative: Grow your own

CLO Magazine

While in-person events can be great networking opportunities, we’ve learned that online versions attract more respondents because they’re confidential and open to employees across the globe. Organizations should make upskilling part of its documented companywide policies.

CLO 82

6 Reasons Why Businesses Need Compliance Consulting

Hurix Digital

A compliance consulting helps you build that model in the form of set guidelines or policies to ensure the complete safety of both employees and clients. Overall, compliance consulting services will help you optimize the policies/ procedures of your business in the best way possible.

How to Create a New Hire Training Plan


Take the example of tools, policies, and procedures that apply to the whole company or department rather than a specific team or function. Organizational tools, policies, and procedures. This is particularly critical when those employees handle confidential employee or customer data.

The 7 GDPR Principles

Ed App

GDPR Principle #6: Integrity and Confidentiality. This principle is meant to ensure that collected data is kept secure and confidential. An organization will need to create its privacy policies, have its codes of conduct, and also report data breaches that occur to the public.