Effective Communication and Service Strategies for Government Employees

lorman

Good customer service is difficult to find in private business and is almost non-existent in government. Many government employees are beaten down and defensive and hate their jobs but are often trapped and simply marking time until they can get their pension. Most people don't enjoy being difficult, but they have become calloused and just want customers to go away.
Watch Now

Spotlight

This document is prepared for, and addressed to, the Members and staff of the European Parliament as background material to assist them in their parliamentary work. The content of the document is the sole responsibility of its author(s) and any opinions expressed herein should not be taken to represent an official position of the Parliament.

OTHER ON-DEMAND WEBINARS

U.S. State Data Protection Law Roundup for 2018

spirion

While the debate rages in Washington, D.C. as to what a federal data protection statute should look like, U.S. states have led the way advancing the privacy and security of the personal data of their respective residents. In fact, over the last 12 months, at least 10 states have promulgated such protections, and each has something unique to challenge data protection professionals.
Watch Now

The Role of a Local Government Records Management Officer

New York State Archives

Congratulations, you are an RMO! Welcome to the role of Records Management Officer. This webinar will explain why this essential position exists, what its key responsibilities are, and how you and others in your organization can work together to build and maintain a strong records management program.
Watch Now

How to Upskill the Government Workforce and Build a Talent Pipeline

Modern solutions help governments enhance service delivery and increase efficiency. But without the skilled talent necessary to manage these new tools, agencies can’t deploy them effectively. Daily administrative tasks often get in the way of training for new skills, leaving workforce training to fall behind.
Watch Now

Using Deception Technology as part of Your Cybersecurity Defense Strategy

Fidelis Cybersecurity

The risk of an attack is always present, as cyber criminals seek passwords and credentials to enter networks and applications in order to monitor and steal critical data.
Watch Now

Spotlight

This document is prepared for, and addressed to, the Members and staff of the European Parliament as background material to assist them in their parliamentary work. The content of the document is the sole responsibility of its author(s) and any opinions expressed herein should not be taken to represent an official position of the Parliament.

resources