article thumbnail

Safeguarding Your Virtual Education Sphere

BrainCert

There are a lot of talks these days about data privacy and data protection. It stands for the Safe Harbor Online Compliance Statement for Social Networks and is developed by the US Department of Commerce's National Institute of Standards and Technology (NIST). What Is BrainCert SOC2 Compliance?

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

Features (Over two dozen including analyticals – example graphs). This is just a sample of areas (no particular order). Technical, security and privacy details. Curious to know which vendor is in alignment with the new version of the EU Safe Harbor Act, you will find out. Mobile specific options.

Report 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

Features (Over two dozen including analyticals – example graphs). This is just a sample of areas (no particular order). Technical, security and privacy details. Curious to know which vendor is in alignment with the new version of the EU Safe Harbor Act, you will find out. Mobile specific options.

Report 40
article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Existing Adoption At the very start I asked the audience for examples of where they were currently using these tools as part of learning solutions. Safe Harbor Statements - Clearly mark pages that are controlled and approved vs. those that are not. Privacy / Confidentiality - Limit the visibility. is discoverable.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

All this necessitates data security training for these employees so that you never leave your data privacy to chance. For example, in 2017, a data breach by credit reporting company Equifax affected more than 145 million customers worldwide. For example, Vodafone Italia was fined $14.5 What Are the Consequences of Data Breaches?