article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Method Count Percent Alongside Formal Learning 26 63% Process Information / Training 22 54% Frequently Asked Questions (FAQ) / Support Information 18 44% Commonly used resources, URL's to applications, documentation, Contact Information, etc. Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

Along with this, safe harbor laws in some U.S. The vulnerability assessment can be your definitive guide to setting and achieving your specific training objectives and goals. An intuitive learning management system or LMS can be a great choice.