Integrity Advocate is proud to publicly announce its part in a global alliance and the release of the world's only privacy-focused proctoring service with the ability to convert any computer into a secure workstation and verify the identity and participation of learners.
Integrity Advocate is announcing in the weeks to come, exciting development that will allow for even greater integrity controls to be accessible to organizations without the expected addition of privacy violations and support requests normally associated with Lockdown Browser solutions on the market today.
Have you seen the court case about a private safety training organization that was charged and plead guilty to 14 charges relating to the providing of false documents? This organization was found to be issuing training certificates to learners that only participated in 50% of the published course and certifying completion for related components, when there was no evidence that their participation included those components.
While courts, regulators and standard setting bodies are all clear as to what can be considered ‘proof of training’, more and more companies are getting into the business of online training. It is widely known that online training delivery has been characterized as a race to the bottom as many organizations position themselves to offer the cheapest possible training, the shortest duration of training, and training not compliant with regulatory requirements.
Many technology companies assume a normal level of ability across their client base and forget that people with disabilities also participate in the digital world. To appropriately respond to this portion of our population, service providers need to consider accessibility at the design phase and involve persons with disability in the creation and/or testing phases of their technology development.
Let’s start by explaining the “Russian Hack” and how this massive breach was able to occur.
Authorize.tech now utilizes Integrity Advocate to provide the technology, service and support commonly utilized in conjunction with online examinations and training to ensure the identity of event participants, workers and volunteers viewing, completing and/or acknowledging online waivers, policies and/or forms.
"The barbecue that seats four”, as described by talk show host Johnny Carson, was the Ford Pinto, the first subcompact car produced in North America. This car sadly, had a major problem.
Integrity Advocate’s identity verification and exam proctoring services will compliment your organization’s efforts to comply with POPIA. Find out how.
How much are you really spending on your remote proctoring technology?
Use these techniques from in-person, high-stakes testing to help create a secure remote test environment.
… but do apply to our competitors. Real examples of other proctoring companies in the news.
When it comes to online learning, organizations still need to protect the integrity of their training. However, the goal should also be to act reasonably and to ensure that the level of oversight applied is not invasive in either its technology or in its incursion into personal privacy.
Ever looked at the privacy policies of most identity verification and proctoring companies? You might be surprised by what you find.
As more tests are administered online with remote proctoring software, learners are experiencing a brand-new, and ultimately preventable, form of test anxiety.
A truly equitable approach to accessibility goes beyond color contrast and screen reader compatibility. In the world of higher education, superior accessibility features are often the number one priority when selecting new software.
Integrity Advocate’s identity verification and exam proctoring services will compliment your organization’s efforts to comply with DCIA. Find out how.
Integrity Advocate’s identity verification and exam proctoring services will compliment your organization’s efforts to comply with PIPA. Find out how.
Integrity Advocate’s identity verification and exam proctoring services will compliment your organization’s efforts to comply with GDPR. Find out how.
Two events shaped our technology roadmap this year more than anything else — the COVID-19 pandemic and serving higher education, a new industry for us. With these two events came incredible opportunities for growth and product innovation.
Researchers with the security firm Avast recently released a statement identifying at least 28 third-party Google Chrome and Microsoft Edge extensions for popular platforms including Vimeo, Facebook, Spotify, and even The New York Times as malware because of their covert functions.