اغلق

استخدم كود AN1749216860 لخصم 10٪ على الاشتراكات من هنا

Standard Description:

At Jasra Training Center, we are committed to ensuring integrity in the e-learning environment by providing a comprehensive policy that includes the concept of integrity, forms of integrity violation, and procedures for addressing violations. This policy aims to define the methods used to prevent impersonation in the e-learning environment and includes a mechanism for reviewing trainee work and preventing cheating, with the goal of maintaining integrity among all parties involved in the training process.

Standard Requirements:

1- Link to Integrity Policy and Regulations: Jasra Training Center provides a direct link to the Integrity Policy and Regulations on the homepage of its official website, the Learning Management System (LMS), or the organization's training platform. This policy includes the following:

◦ The Concept of Integrity: We define integrity as the complete adherence to ethical values ​​in all training activities and tasks conducted within the e-learning environment.

◦ Forms of Integrity Violation: We clarify all forms of integrity violations that can occur during e-learning, such as:

- Cheating: Using illegitimate means during assessments or training activities.

- Identity theft: Using another person's identity to complete tasks or assessments.

- Exploiting collaboration: Engaging in unauthorized collaboration on individual activities.

- Falsification: Altering or manipulating submitted data or work.

◦ Procedures and penalties: We have outlined the procedures we will take in the event of any integrity breach, including:

- Cancellation of assessments or grades.

- Imposition of disciplinary penalties such as warnings or temporary suspensions.

- Re-administering assessments under direct supervision in cases of cheating or falsification.

2- Identity theft prevention mechanism: We explain the mechanism used at Jasra Training Center to prevent identity theft in the e-learning environment, including:

◦ Identity verification mechanism: Specifying how trainees' identities are verified using technologies such as two-factor authentication, facial recognition, or video ID verification.

◦ Cheating prevention: Detailing the procedures we follow to prevent cheating, such as using text analysis software to detect any suspicious activity during assessments.

These procedures will be applicable to training programs lasting longer than one month.

3. Instructional Video: We provide an instructional video explaining to participants the importance of adhering to integrity principles in the e-learning environment, including:

How to identify forms of integrity violations.

The importance of respecting integrity policies in all activities.

The procedures we follow in the event of any integrity violation.