article thumbnail

GDPR came and went: how it impacted our products

Rustici Software

We were proud that we already valued our customers’ data as their own, never shared it out with a third-party for commercial gain and took every reasonable step to keep data secure. We’ve participated in Safe Harbor and Privacy Shield certifications in the past, which guided our existing policies. maintenance release.

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

The Craig Factor (basically it is using my learning card – you will see one for each vendor, and the points alloted based on six areas – high level – ex: administration, learning environment, UI/UX, tech/security, Feature sets, out of the box approach). . eLogic Learning, ExpertusOne, Unicorn Training, Growth Engineering.

Report 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

The Craig Factor (basically it is using my learning card – you will see one for each vendor, and the points alloted based on six areas – high level – ex: administration, learning environment, UI/UX, tech/security, Feature sets, out of the box approach). . eLogic Learning, ExpertusOne, Unicorn Training, Growth Engineering.

Report 40
article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not. Security - This is no worse than any other form of electronic communication. Barriers I then asked everyone to call out what they saw as their biggest barriers to getting adoption. No problems getting things here.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

Many employers still don’t take data security training for employees seriously. Data is as secure as the people who have access to it , be it an IT team or regular employees. That’s why you need cyber security awareness training for employees to educate them on preventing data from loss, theft, modification, and destruction.