article thumbnail

What You Need to Know About the New 508 Compliance Rules

eLearning Brothers

On January 18, 2017, the United States Access Board published a final rule that jointly updates requirements for information and communication technology (ICT) covered by Section 508 of the Rehabilitation Act and Section 255 of the Communication Act. There’s a “safe harbor” clause for legacy content.

article thumbnail

Safeguarding Your Virtual Education Sphere

BrainCert

BrainCert is a Software-as-a-Service (SaaS) platform that provides virtual learning solutions and is SOC2 compliant, ensuring that the data and information stored on the platform is kept secure. With the rise of virtual education, it has become increasingly important to ensure that the systems used to deliver that education is secure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR came and went: how it impacted our products

Rustici Software

At Rustici Software, the General Data Protection Regulation (GDPR) came at an ideal time for us to complete a self-review of our data privacy. We’ve participated in Safe Harbor and Privacy Shield certifications in the past, which guided our existing policies. Nothing with privacy and software is final. To sum it up.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Method Count Percent Alongside Formal Learning 26 63% Process Information / Training 22 54% Frequently Asked Questions (FAQ) / Support Information 18 44% Commonly used resources, URL's to applications, documentation, Contact Information, etc. No problems getting things here. Then, maybe open it up to subject matter experts.

Wiki 105
article thumbnail

9 Barriers to Learning (+How to Overcome Them)

WhatFix

Learning barriers are a critical focus area for L&D and HR professionals trying to convey knowledge and information in a way that is understood, absorbed, retained, and put into practice by employees. These learning obstacles refer to a person’s learning process and the best ways for them to receive and retain new information.

article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

Similarly, employees generally enjoy access to sensitive information such as customer data. They often access employee information from HR to engage in financial frauds. They can also use data breaches to gain access to the financial information of a person or entity. Along with this, safe harbor laws in some U.S.