Notes from the ACLU Privacy & Technology conference

The Learning Dispatch

Heather Poggi-Mannis , MicroAssist’s security training product manager, attended the ACLU Privacy and Technology conference at the AT&T Conference Center at the University of Texas Austin. The purpose of the conference was to start conversations about privacy, how technology can be used to violate it and what is being done to protect privacy rights.

Delivering Online Training Securely

Mindflash

Moving your training online can dramatically reduce your costs and make training more convenient and enjoyable for your trainees, but it can also introduce concerns about security. We have taken a multi pronged approach to security. Physical Security. Content Security.

Trending Sources

Mobile Learning: 3 Security Threats & 7 Ways to Beat Them

CommLab India

However, security and privacy issues in mobile learning may play spoil sport. Malware/viruses, system and data security, users’ privacy, Copyright and Intellectual Property Right (IPR) issues pose challenges in the path of mobile learning. Users’ Privacy.

Blockchain Solutions for Cyber & Data Security

Your Training Edge

In the world of increasing cyber-crimes and businesses’ struggle to cope with data security, its regulation and privacy concerns, can blockchain be a great relief? Previously in our posts at yourtrainingedge.com [1] , we have discussed the potential of blockchain in terms of security and privacy of the transactions. In this post, we will see this in a more comprehensive way to reveal its capabilities specifically for cyber and data security proposes.

Flexible Security?

CLO Magazine

The flexible workforce has benefits for workers and employers, but it may pose a potential threat to an organization’s security, and learning leaders should take proper precautions. One solution is to use a network that is both secure and accessible from distant locations.

Computer Security Games for Download (includes Flash source files)

Take an e-Learning Break

OnGuardOnline.govprovides practical tips from the federal government and the technology industryto help you be on guard against internet fraud, secure your computer, andprotect your personal information. These video tutorials show you step-by-stephow to change the preferences in your internet software to enhance privacy,safety, and security.

The eLearning Security Leak

eLearning Weekly

Is elearning a hot spot for internet security and corporate privacy? Tags: Theory eLearning corporate privacy Engadget internet security LMS technology Words and images spread fast online. Internet 2.0

Learning Analytics: A great boost for creating Learner Centric eLearning

Raptivity

Managing data privacy, security and associated cost is also a challenge. I am sure you already know about ‘analytics’. This term has been creating a lot of buzz for the past few years.

Adobe Captivate: Mac Cures

I Came, I Saw, I Learned

  Click  Security & Privacy.     Select the  Privacy  category and, from the  Allow the apps below to control your computer area , select Adobe Captivate.app.

Mitigating the Risks of BYOD in corporate learning

G-Cube

However, this trend comes with its own set of challenges and Security is the top concern that most organizations have with the policy of BYOD. Most modern LMSs come with built-in security measures for data that resides on the system.

The Top 5 Things Organizations need for Mobile Learning

Your Training Edge

Making the mobile learning secure. Security continues to be the biggest barrier in the way of mobile learning adoption, stated by many of the organizations surveyed in some latest studies conducted.

The Community Responds

MakingBetter

A fourth standard to cover retention policy, privacy, protection, access, delegation and security. What must be accommodated in terms of privacy and security, at a standards level, is unclear. We must also seek out privacy and security laws in other parts. I hoped in my last post that the community would indeed respond with ideas, insights, opinions and concerns.

Is harboring eLearning data safe again?

LearnUpon

The secure management of learner and client data should be a priority for all teams and companies that deliver eLearning. After a recent ruling declared the Safe Harbor Privacy Principles invalid, many LearnUpon customers asked: what now for EU-US personal data transfer?

Just for me learning

Learning with e's

Clearly there are security and privacy issues to be addressed, but another trend is that learning is now becoming more untethered and we are witnessing a decline in the use of training rooms.

Making Spectacles of ourselves

Learning with e's

As with any other wearable technology that captures and shares images and video, there are issues around privacy and misuse. But balancing up the social concerns against the benefits of such a device, there are also possibilities for the improvement of personal safety and security.

Standard Options Apply

MakingBetter

Some in the LTSC are very familiar with the European Union’s policies on privacy, security, data ownership and the rights of individuals in digital spaces. While going this path doesn’t necessarily shut down the ability for people to own their own data, or to move data around from system to system, or even to make that transfer more secure and respect privacy, we’re forever linking the components above so tightly that it will stay a closed loop.

Are YOU HIPAA (TX HB 300) Compliant in Texas?

OpenSesame

Federal and state laws require patient medical information be protected and secured. . Protecting sensitive medical information can be challenging with today’s security breaches. Your Texas organization must know how to protect and secure sensitive medical information. Covered entities must ensure that employees have a signed statement verifying that they were trained on HIPAA Privacy and Security. Federal HIPAA Privacy and Security fines range from $100 to $1.5

Course of the Week: Improve Your Computer Literacy

OpenSesame

For additional resources on cybersecurity, check out our blog post from earlier this month on how to avoid security “frights” , as well as our guest post on StaySafeOnline.org which details how OpenSesame protects our employees and customers. .

Host Your Corporate Training Videos on Your LMS – Why & How

CommLab India

Ensure the privacy and confidentiality of organizational information. These video hosting providers have their own security and privacy features, so your training videos are hosted in a secure place.

Quick Tips to Rollout HIPAA Awareness Training

CommLab India

Related Posts Online Compliance Training to Ensure Patient Data Security E-learning for Training Your Medical Staff on Patient Data Security [Infographic] Data Breaches Losses to Cost Trillions.

Overcoming 4 Common Concerns of Outsourcing Training

CommLab India

Information privacy and security. Data Privacy and Security Concerns. Objection: When you think of outsourcing, concerns about data security are natural.

See the Results from Our 2014 Learning and Remembering Survey

Bottom-Line Performance

Security & Investigations. Compliance: AGSL, ACL, Privacy Act, Anti Money Laundering. We received a variety of thoughtful responses to our two-question survey on learning and remembering.

4 Outsourcing Objections and How to Overcome Them [Infographic]

CommLab India

These include concerns on the quality of work, meeting timelines and fixed budgets, information privacy and security, and language barriers and cultural issues.

Google Course Builder: Initial Review

LearnDash

Data Privacy and Security. Not too long ago, Google came out with a Course Builder program, designed to allow schools and institutions an easy way to set-up their own MOOC platform. Today, I decided to take a look at the program to get a sense of their offering and what it can do.

Google 110

This Week in MakingBetter: An Interview, ATD TechKnowledge & More

MakingBetter

Over the holidays, Craig asked me some excellent questions about the history of xAPI, what’s the deal with its name, how does xAPI fare in terms of interoperability, security and privacy… Craig asked straight-up questions and I gave him straight-up answers.

How Big Data Will Shake Up eLearning

OpenSesame

For one thing, the increasing usage of personal data goes hand in hand with raised concerns about the privacy and security of individuals. Data privacy regulations vary from country to country and the level of worry about privacy issues varies accordingly.

Our Digital Future 2: Smart clothing

Learning with e's

Administrators will be cautious about 'privacy issues', and misuse and will express concerns about security of data. We can't accurately predict what will happen in the future, but we expect it will be different to anything we have already experienced.

Slack Vs. Hipchat: Which Works Best for Informal Learning?

eLearningMind

When working in an industry with strict privacy standards (think medical or financial) it’s not appropriate to share via an open communication tool. Still, corporate social media networks on secure servers are a possibility–with the proper privacy considerations, of course.

To BYOD or not to BYOD at work? That is the question

Matrix

How can the company be sure that all sensitive data is always secure? How can data privacy of employees can be protected? IT support, mobile device management, and ways to ensure security of data are at the top of the expenses.

Close Healthcare Compliance Gaps with Online Training

CommLab India

Risks can be broadly classified as follows: Risk of data or privacy breaches when using electronic health records. Risk of data or privacy breaches by employees. Train healthcare professionals on new compliance norms or latest security threats on short notice.

Office 365 Video: Your Corporate YouTube

Visual Lounge

I’ve been a long time fan of Camtasia and doing screencasts, but at work, we lacked a secure way to share these videos. Office 365 Video addresses the gap left by YouTube’s wide open security.

xAPI, LRS – The Interview

eLearning 24-7

My next questions are related to privacy and security. It’s entirely dependent on a couple of variables that would be hard to specify, let alone standardize, because every country has different privacy laws — even different states in the US have different data privacy laws now.

ADL 97

LMS Decision Making Criteria B4 U Buy

eLearning 24-7

Business Requirements, Technical/Security Requirements. The same with my technical and security requirements. Thus, your security requirement is AES256, but in your mind, is the ideal AES 960. How can you find out if they are exploring future security?

e-Clippings (Learning As Art): "World Privacy Forums Top Ten Opt Outs"

Mark Oehlert

» October 31, 2007 "World Privacy Forums Top Ten Opt Outs" Click here for info on opting out of everything from telemarketer calls to junk mail. October 31, 2007 in Errata | Permalink TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference "World Privacy Forums Top Ten Opt Outs" : Comments The comments to this entry are closed.

The Top 100 Tools for Learning 2012 list is revealed

Jane Hart

Although security and privacy concerns are preventing many organisations from making significant use of public social media tools, there does appear to be an increased interest this year in enterprise social networking and collaboration tools (viz Yammer and Sharepoint ).

Hey LMS Santa!

eLearning 24-7

Want to safeguard yourself in terms of privacy? If I want to mention the tracking information add it to your privacy and security paragraph that learners must agree to. I remember the days when Santa would come to my house.

There’s More than Scissors and Glue in Our Common Craft Library!

eLearning Brothers

They’re also falling for phishing scams that arrive in their work email inboxes; people keep track of passwords by using sticky notes taped to their monitor, and they’re clueless about privacy online. Privacy Online. Secure Passwords.