On October 4th 2014 Timothy Creagon presented these materials as part of Virtual Ability's International Disability Rights Affirmation Conference (IDRAC)
This presentation discusses the reasoning behind the provisions of Section 508 of the US Rehabilitation Act as well as the barriers and successful methodologies of implementing accessibility features in technology.
This document discusses Section 508 compliance and accessibility for people with disabilities. It provides background on Section 508, an overview of disabilities in America, barriers to accessibility, assistive technologies, and examples of Section 508 litigation in both the public and private sectors.
Digital Accessibility - Section 508 Refresh: Now What?Lisa Marchand
Siteimprove's in-house accessibility expert covers the 2017 refresh of Section 508, legislation that requires certain websites to be accessible by January 2018. Learn what the update entails and what it means for your organization.
The document provides information about web accessibility and section 508 of the United States federal law. It discusses:
- Section 508 requires federal agencies and organizations selling to the government to make their electronic information and information technology accessible to people with disabilities.
- This includes making software, websites, documents, and other materials accessible through compliance with standards for things like alternative text tags, structured layouts, use of color and fonts, etc.
- Failure to comply can result in legal penalties and an organization being unable to sell to US federal agencies. The document outlines the various guidelines and tools available to help make information accessible, such as those from the W3C Web Accessibility Initiative.
Incorporating Accessibility into the Procurement Process3Play Media
The document provides information on incorporating accessibility into the procurement process. It discusses common accessibility issues, challenges with procurement, assessing accessibility, sample policy and contract language, best practices, exceptions, testing, and tracking purchases. The summary highlights the key steps as defining an accessible procurement process, requesting accessibility documentation from vendors, performing accessibility testing, and tracking purchases for compliance.
How to Write a Web Accessibility Statement & Why You Should Be Proactive3Play Media
In this webinar, Marc Dubin, former Senior Trial Attorney of the US Department of Justice and CEO of ADA Expertise Consulting, will discuss why it is essential to be proactive with web accessibility. He will help businesses and state & local governments understand their web accessibility requirements under the ADA, as well as what to include in a web accessibility statement.
How to Improve Digital Accessibility While Reducing Legal Risk3Play Media
In this webinar, Jason Taylor, Chief Innovation Strategist at UsableNet, will take us through the key findings in UsableNet's comprehensive state of digital accessibility report. You won't want to miss this.
The what, why, and how of accessibility3Play Media
In this webinar, Larry Lewis, Director of Channel Sales and Strategic Partnerships at TPG, will explain “what” digital accessibility encompasses, the benefits and importance of embracing accessibility best practices, and how best to achieve a conformant result using finite resources. Participants will learn how digital accessibility is defined and how it impacts digital content developed for desktop, mobile, and kiosk platforms. In addition, they will learn three key reasons “why” digital accessibility should matter to a business, and “how” a variety of tools and services can help you achieve and maintain an acceptable, accessible framework for your digital content within a reasonable time frame, helping your company to avoid potential business risks.
What the Winn-Dixie Case & Other Important Rulings Mean for the Future of Web...3Play Media
On June 13, 2017, the Florida Federal District Court ruled that grocery store chain Winn-Dixie had violated Title III of the ADA for denying blind users “full and equal enjoyment” of the Winn-Dixie website. The case was brought forth by a blind man who was unable to download coupons, order prescriptions, or find store locations through his screenreader.
The court mandated Winn-Dixie had to adopt a Web Accessibility Policy ensuring the website conformed with WCAG 2.0 criteria.
As the digital age continues to bring new challenges for accessibility, this groundbreaking ruling is shining a light on the need for corporate web accessibility.
This webinar will be presented by Bobby Silverstein, a nationally-recognized disability attorney and one of the architects of the ADA. In this webinar, Bobby will take us through this and other historical rulings and the impact they have for corporate entities.
This document discusses Section 508 compliance and accessibility for people with disabilities. It provides background on Section 508, an overview of disabilities in America, barriers to accessibility, assistive technologies, and examples of Section 508 litigation in both the public and private sectors.
Digital Accessibility - Section 508 Refresh: Now What?Lisa Marchand
Siteimprove's in-house accessibility expert covers the 2017 refresh of Section 508, legislation that requires certain websites to be accessible by January 2018. Learn what the update entails and what it means for your organization.
The document provides information about web accessibility and section 508 of the United States federal law. It discusses:
- Section 508 requires federal agencies and organizations selling to the government to make their electronic information and information technology accessible to people with disabilities.
- This includes making software, websites, documents, and other materials accessible through compliance with standards for things like alternative text tags, structured layouts, use of color and fonts, etc.
- Failure to comply can result in legal penalties and an organization being unable to sell to US federal agencies. The document outlines the various guidelines and tools available to help make information accessible, such as those from the W3C Web Accessibility Initiative.
Incorporating Accessibility into the Procurement Process3Play Media
The document provides information on incorporating accessibility into the procurement process. It discusses common accessibility issues, challenges with procurement, assessing accessibility, sample policy and contract language, best practices, exceptions, testing, and tracking purchases. The summary highlights the key steps as defining an accessible procurement process, requesting accessibility documentation from vendors, performing accessibility testing, and tracking purchases for compliance.
How to Write a Web Accessibility Statement & Why You Should Be Proactive3Play Media
In this webinar, Marc Dubin, former Senior Trial Attorney of the US Department of Justice and CEO of ADA Expertise Consulting, will discuss why it is essential to be proactive with web accessibility. He will help businesses and state & local governments understand their web accessibility requirements under the ADA, as well as what to include in a web accessibility statement.
How to Improve Digital Accessibility While Reducing Legal Risk3Play Media
In this webinar, Jason Taylor, Chief Innovation Strategist at UsableNet, will take us through the key findings in UsableNet's comprehensive state of digital accessibility report. You won't want to miss this.
The what, why, and how of accessibility3Play Media
In this webinar, Larry Lewis, Director of Channel Sales and Strategic Partnerships at TPG, will explain “what” digital accessibility encompasses, the benefits and importance of embracing accessibility best practices, and how best to achieve a conformant result using finite resources. Participants will learn how digital accessibility is defined and how it impacts digital content developed for desktop, mobile, and kiosk platforms. In addition, they will learn three key reasons “why” digital accessibility should matter to a business, and “how” a variety of tools and services can help you achieve and maintain an acceptable, accessible framework for your digital content within a reasonable time frame, helping your company to avoid potential business risks.
What the Winn-Dixie Case & Other Important Rulings Mean for the Future of Web...3Play Media
On June 13, 2017, the Florida Federal District Court ruled that grocery store chain Winn-Dixie had violated Title III of the ADA for denying blind users “full and equal enjoyment” of the Winn-Dixie website. The case was brought forth by a blind man who was unable to download coupons, order prescriptions, or find store locations through his screenreader.
The court mandated Winn-Dixie had to adopt a Web Accessibility Policy ensuring the website conformed with WCAG 2.0 criteria.
As the digital age continues to bring new challenges for accessibility, this groundbreaking ruling is shining a light on the need for corporate web accessibility.
This webinar will be presented by Bobby Silverstein, a nationally-recognized disability attorney and one of the architects of the ADA. In this webinar, Bobby will take us through this and other historical rulings and the impact they have for corporate entities.
Including Everyone: Web Accessibility 101Helena Zubkow
Shouldn’t the web be awesome for everyone? That's not always the case, but it could be.
Designed for developers, project managers, and directors alike, the goal of this session is to introduce everyone to the wonderful world of web accessibility. We'll cover the basic standards and regional expectations for accessibility, as well as the principles and concepts that make up the accessibility field. This session will touch on Section 508, WCAG 2.0 standards, and the financial viability of a web accessibility initiative in an industry where time is money.
This session is proposed as a conceptual prelude to our more developer-oriented accessibility session that is taking place at the Higher Ed Summit. Based on my experience as a web accessibility specialist from both the perspective of a project manager and a front-end developer, I'll share the knowledge I've gained with you to address the following important questions:
- What is web accessibility?
- Why does web accessibility matter to my users?
- Why does web accessibility matter for my company and clients?
- How will a web accessibility initiative affect my bottom line?
- How can I include web accessibility in my company's culture and work plans?
- What tools can I use to assess and improve accessibility in my projects?
- How can I help the web accessibility community?
The document discusses the impact of information technology (IT) on productivity, quality of life, and healthcare costs. IT has helped increase worker productivity and standards of living over time. However, the digital divide exists between those who can and cannot access new technologies. Implementing electronic health records, telemedicine, and mobile health apps can help reduce skyrocketing healthcare costs while improving quality of care.
The document discusses privacy and related laws and issues. It covers several topics:
- Laws governing privacy of financial, health, children's data, and electronic surveillance, as well as state security breach laws.
- Issues around identity theft, consumer profiling, responsible treatment of customer data, and advanced surveillance technologies.
- International standards like the EU Data Protection Directive and initiatives like BBBOnLine and TRUSTe that promote data privacy.
This chapter discusses computer and internet crime. It begins by outlining the objectives of understanding key ethical issues around data security, reasons for the rise in security incidents, common attack types, perpetrator objectives, and elements of a multilayer security process. It then discusses why incidents are so prevalent due to increasing complexity, user expectations, and reliance on commercial software with vulnerabilities. Common attack types like viruses, worms, Trojan horses, and phishing are also outlined. The chapter concludes by discussing prevention, detection, response, and establishing security policies and risk assessments to implement trustworthy computing.
From Level Access, Sam Joehl, Principal Technical Consultant, talks about the common mistakes he sees when auditing websites, as well as talk about the essential regulations one must know when working in the digital accessibility space, particularly when it comes to complying with CVAA requirements.
This document discusses key issues relating to freedom of expression and the use of information technology. It covers the basis for protection of freedom of expression in the US and what types of speech are not protected. It also discusses federal laws like the Communications Decency Act, Child Online Protection Act, and Children's Internet Protection Act which affect online freedom of expression. Additionally, it addresses issues like controlling access to internet information, anonymity online, defamation and hate speech, corporate blogging, and pornography.
How to Navigate the Galaxy of Accessibility Laws3Play Media
Next up we have legal rebel Lainey Feingold, an internationally recognized disability rights lawyer and pioneer of Structured Negotiation known for negotiating landmark accessibility agreements. In this session, Lainey will take us through key cases, court decisions, government agency activity, settlements, and other recent developments in the digital accessibility legal landscape.
What We Can Learn About Web Accessibility from 2,285 ADA Lawsuits3Play Media
This webinar explores the trends they uncovered, and how organizations can learn from rulings in these lawsuits to ensure their websites are accessible.
This document discusses some of the legal and ethical issues associated with expanding the use of modern technologies. It proposes allowing University of Phoenix (UOP) students to use the UOP application on their HTC phones. This raises questions about data usage and ownership. The document outlines several relevant privacy laws and policies, including the Freedom of Information Act, Privacy Act of 1974, Children's Internet Protection Act, and issues around encryption and acceptable use of data.
The document discusses proposed new rules from the FCC regarding privacy practices related to customer information collected by mobile carriers and stored on devices. It summarizes questions posed by the FCC on the appropriate obligations for carriers regarding privacy and data security. Industry groups argue against regulation, claiming self-regulation is sufficient, while consumer advocates support clarifying carriers' obligations to better protect customer privacy and data. The document predicts new FCC rules will be issued but face legal challenges from carriers.
This document provides an overview of handling mobile devices in the public sector. It discusses the rise of mobile computing and BYOD programs. It provides guidance on developing mobile security policies and case studies on implementing mobile device management. The case study of Fairfax County Public Schools is presented, which implemented a BYOD program for 180k students and 23k staff using iOS, Android and Blackberry devices managed through an MDM solution. Lessons learned included choosing battles carefully, having policy in place first, and future plans for malware detection and app whitelisting.
This document discusses intellectual property and related ethical issues in information technology. It covers key topics like copyrights, patents, trade secrets, plagiarism, reverse engineering, open source code, competitive intelligence, trademark infringement, and cybersquatting. The objectives are to understand what intellectual property encompasses and why it is important, the strengths and limitations of different protections, how to combat plagiarism, issues with reverse engineering, the premise of open source code, the difference between competitive intelligence and industrial espionage, and how to protect against cybersquatting.
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
Employee's are bringing tablets and smartphones onto corporate networks, increasing IT workload without adding resources. See how the Cisco Identity Services Engine and Cisco Prime Network Control System will help IT take control of the onslaught of mobile devices entering the network. Learn more: http://cisco.com/go/wireless
The document discusses strategies for engineering quality software, including the importance of using rigorous software development methodologies. It covers common types of software product liability claims and outlines the Capability Maturity Model Integration (CMMI), which defines levels of software development maturity to improve processes. Special precautions are required when developing safety-critical systems to account for risks of failure.
With increased complaints and legal action for organisations of inaccessible websites (Coles, Peapod) and apps (Westpac), now is the time for all web and app Project Managers, Developers, UX/Designers, Content Producers, Business Analysts and Testers to be ‘baking in’ accessibility into processes and work practices.
This presentation will show that accessibility is everyone’s responsibility and it is not difficult to get started or find resources that will help you and your team produce a website, app or digital presence that works for everyone!
An article on the company's experiences with the 'istay@home' project, which explored ways in which technology can assist older people in remaining independent in their own homes.
Web accessibility 101: The why, who, what, and how of "a11y"ecentricarts
Our in-house ecentricarts Accessibility Team (known as EAT) has compiled a ton of resources to help you understand the ins and outs of web accessibility. This includes: why it matters, who it impacts, common misconceptions, a beginner's guide to WCAG 2.0 and accessibility legislation, and how you can test, design, develop, and create more accessible websites.
This presentation also includes examples of before/after screenreader demos, and our 2017 company video made with described audio.
Investigating ATM System Accessibility for People with Visual ImpairmentsIOSR Journals
Abstract: The aim of this paper is to draw attention for the evaluation of the accessibility and usability of
Automated Teller Machine (ATM) systems from the point of view of visually impaired persons. It suggests that
there is a need for a more precise application of assistive technologies in order to develop user friendly ATMs
that will aid effective accessibility without the requirement of assistance by ordinary people who may take
advantage of their visual challenges and project them to all odds of insecurity for their cash. The paper suggests
that, while ATMs, as opposed to across the counter services, are now a widely accepted means of easing long
queues in the banks and as a time saving factor for the banking services to the consumers. An accepted feature
of the ATMs is to incorporate assistive technologies which still remain a challenge even with the formative years
of ATM applications. It proposes possible contexts that may benefit the visually impaired from far-reaching
exploration and incorporation of relevant assistive technologies. The paper should be of interest to financial
institutions whose passion is to render better services to their customers in this era of technology considering
that there are those customers who wish to transact with them and even need privacy with the ATMs but cannot
access such benefits because of their cognitive challenges and specifically the visually impaired. Finally the
paper offers a snap-shot of some of the widely-used assistive technologies for the visually impaired when using
ATMs and their associated procedures and potential pitfalls.
Keywords: accessibility, Automated Teller Machines, Assistive Technology, usability, visually impaired
Accessibility Update: Section 508 and WCAG in a Library 2.0 WorldNina McHale
This document provides an agenda for a two-day training on web accessibility standards and best practices. Day 1 will cover an introduction to Section 508 and WCAG guidelines, how to validate code for accessibility, and how screen readers work. Day 2 will include demonstrations of popular screen readers like JAWS and VoiceOver as well as case studies evaluating the accessibility of different types of library web resources.
Web Accessibility Compliance in Higher Education - Fully Meet Legal Requireme...Percussion Software
Universities face liability if their web content is inaccessible. As college campuses adopt new technologies and make their communication increasingly digital, disability rights advocates fight to ensure students with disabilities aren’t left behind. Navigating the complex legal landscape isn’t easy, and many schools aren’t aware of their unintentional violations.
View these slides to make sure your college website complies with sections 504 and 508 of the Rehabilitation Act, and that you can extend full web and IT access to every student.
Learn more about HiSoftware & Percussion's recent partnership announcement:
http://www.percussion.com/about/news-and-events/press-releases/2014/hisoftware-and-percussion-announce-partnership
Including Everyone: Web Accessibility 101Helena Zubkow
Shouldn’t the web be awesome for everyone? That's not always the case, but it could be.
Designed for developers, project managers, and directors alike, the goal of this session is to introduce everyone to the wonderful world of web accessibility. We'll cover the basic standards and regional expectations for accessibility, as well as the principles and concepts that make up the accessibility field. This session will touch on Section 508, WCAG 2.0 standards, and the financial viability of a web accessibility initiative in an industry where time is money.
This session is proposed as a conceptual prelude to our more developer-oriented accessibility session that is taking place at the Higher Ed Summit. Based on my experience as a web accessibility specialist from both the perspective of a project manager and a front-end developer, I'll share the knowledge I've gained with you to address the following important questions:
- What is web accessibility?
- Why does web accessibility matter to my users?
- Why does web accessibility matter for my company and clients?
- How will a web accessibility initiative affect my bottom line?
- How can I include web accessibility in my company's culture and work plans?
- What tools can I use to assess and improve accessibility in my projects?
- How can I help the web accessibility community?
The document discusses the impact of information technology (IT) on productivity, quality of life, and healthcare costs. IT has helped increase worker productivity and standards of living over time. However, the digital divide exists between those who can and cannot access new technologies. Implementing electronic health records, telemedicine, and mobile health apps can help reduce skyrocketing healthcare costs while improving quality of care.
The document discusses privacy and related laws and issues. It covers several topics:
- Laws governing privacy of financial, health, children's data, and electronic surveillance, as well as state security breach laws.
- Issues around identity theft, consumer profiling, responsible treatment of customer data, and advanced surveillance technologies.
- International standards like the EU Data Protection Directive and initiatives like BBBOnLine and TRUSTe that promote data privacy.
This chapter discusses computer and internet crime. It begins by outlining the objectives of understanding key ethical issues around data security, reasons for the rise in security incidents, common attack types, perpetrator objectives, and elements of a multilayer security process. It then discusses why incidents are so prevalent due to increasing complexity, user expectations, and reliance on commercial software with vulnerabilities. Common attack types like viruses, worms, Trojan horses, and phishing are also outlined. The chapter concludes by discussing prevention, detection, response, and establishing security policies and risk assessments to implement trustworthy computing.
From Level Access, Sam Joehl, Principal Technical Consultant, talks about the common mistakes he sees when auditing websites, as well as talk about the essential regulations one must know when working in the digital accessibility space, particularly when it comes to complying with CVAA requirements.
This document discusses key issues relating to freedom of expression and the use of information technology. It covers the basis for protection of freedom of expression in the US and what types of speech are not protected. It also discusses federal laws like the Communications Decency Act, Child Online Protection Act, and Children's Internet Protection Act which affect online freedom of expression. Additionally, it addresses issues like controlling access to internet information, anonymity online, defamation and hate speech, corporate blogging, and pornography.
How to Navigate the Galaxy of Accessibility Laws3Play Media
Next up we have legal rebel Lainey Feingold, an internationally recognized disability rights lawyer and pioneer of Structured Negotiation known for negotiating landmark accessibility agreements. In this session, Lainey will take us through key cases, court decisions, government agency activity, settlements, and other recent developments in the digital accessibility legal landscape.
What We Can Learn About Web Accessibility from 2,285 ADA Lawsuits3Play Media
This webinar explores the trends they uncovered, and how organizations can learn from rulings in these lawsuits to ensure their websites are accessible.
This document discusses some of the legal and ethical issues associated with expanding the use of modern technologies. It proposes allowing University of Phoenix (UOP) students to use the UOP application on their HTC phones. This raises questions about data usage and ownership. The document outlines several relevant privacy laws and policies, including the Freedom of Information Act, Privacy Act of 1974, Children's Internet Protection Act, and issues around encryption and acceptable use of data.
The document discusses proposed new rules from the FCC regarding privacy practices related to customer information collected by mobile carriers and stored on devices. It summarizes questions posed by the FCC on the appropriate obligations for carriers regarding privacy and data security. Industry groups argue against regulation, claiming self-regulation is sufficient, while consumer advocates support clarifying carriers' obligations to better protect customer privacy and data. The document predicts new FCC rules will be issued but face legal challenges from carriers.
This document provides an overview of handling mobile devices in the public sector. It discusses the rise of mobile computing and BYOD programs. It provides guidance on developing mobile security policies and case studies on implementing mobile device management. The case study of Fairfax County Public Schools is presented, which implemented a BYOD program for 180k students and 23k staff using iOS, Android and Blackberry devices managed through an MDM solution. Lessons learned included choosing battles carefully, having policy in place first, and future plans for malware detection and app whitelisting.
This document discusses intellectual property and related ethical issues in information technology. It covers key topics like copyrights, patents, trade secrets, plagiarism, reverse engineering, open source code, competitive intelligence, trademark infringement, and cybersquatting. The objectives are to understand what intellectual property encompasses and why it is important, the strengths and limitations of different protections, how to combat plagiarism, issues with reverse engineering, the premise of open source code, the difference between competitive intelligence and industrial espionage, and how to protect against cybersquatting.
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
Employee's are bringing tablets and smartphones onto corporate networks, increasing IT workload without adding resources. See how the Cisco Identity Services Engine and Cisco Prime Network Control System will help IT take control of the onslaught of mobile devices entering the network. Learn more: http://cisco.com/go/wireless
The document discusses strategies for engineering quality software, including the importance of using rigorous software development methodologies. It covers common types of software product liability claims and outlines the Capability Maturity Model Integration (CMMI), which defines levels of software development maturity to improve processes. Special precautions are required when developing safety-critical systems to account for risks of failure.
With increased complaints and legal action for organisations of inaccessible websites (Coles, Peapod) and apps (Westpac), now is the time for all web and app Project Managers, Developers, UX/Designers, Content Producers, Business Analysts and Testers to be ‘baking in’ accessibility into processes and work practices.
This presentation will show that accessibility is everyone’s responsibility and it is not difficult to get started or find resources that will help you and your team produce a website, app or digital presence that works for everyone!
An article on the company's experiences with the 'istay@home' project, which explored ways in which technology can assist older people in remaining independent in their own homes.
Web accessibility 101: The why, who, what, and how of "a11y"ecentricarts
Our in-house ecentricarts Accessibility Team (known as EAT) has compiled a ton of resources to help you understand the ins and outs of web accessibility. This includes: why it matters, who it impacts, common misconceptions, a beginner's guide to WCAG 2.0 and accessibility legislation, and how you can test, design, develop, and create more accessible websites.
This presentation also includes examples of before/after screenreader demos, and our 2017 company video made with described audio.
Investigating ATM System Accessibility for People with Visual ImpairmentsIOSR Journals
Abstract: The aim of this paper is to draw attention for the evaluation of the accessibility and usability of
Automated Teller Machine (ATM) systems from the point of view of visually impaired persons. It suggests that
there is a need for a more precise application of assistive technologies in order to develop user friendly ATMs
that will aid effective accessibility without the requirement of assistance by ordinary people who may take
advantage of their visual challenges and project them to all odds of insecurity for their cash. The paper suggests
that, while ATMs, as opposed to across the counter services, are now a widely accepted means of easing long
queues in the banks and as a time saving factor for the banking services to the consumers. An accepted feature
of the ATMs is to incorporate assistive technologies which still remain a challenge even with the formative years
of ATM applications. It proposes possible contexts that may benefit the visually impaired from far-reaching
exploration and incorporation of relevant assistive technologies. The paper should be of interest to financial
institutions whose passion is to render better services to their customers in this era of technology considering
that there are those customers who wish to transact with them and even need privacy with the ATMs but cannot
access such benefits because of their cognitive challenges and specifically the visually impaired. Finally the
paper offers a snap-shot of some of the widely-used assistive technologies for the visually impaired when using
ATMs and their associated procedures and potential pitfalls.
Keywords: accessibility, Automated Teller Machines, Assistive Technology, usability, visually impaired
Accessibility Update: Section 508 and WCAG in a Library 2.0 WorldNina McHale
This document provides an agenda for a two-day training on web accessibility standards and best practices. Day 1 will cover an introduction to Section 508 and WCAG guidelines, how to validate code for accessibility, and how screen readers work. Day 2 will include demonstrations of popular screen readers like JAWS and VoiceOver as well as case studies evaluating the accessibility of different types of library web resources.
Web Accessibility Compliance in Higher Education - Fully Meet Legal Requireme...Percussion Software
Universities face liability if their web content is inaccessible. As college campuses adopt new technologies and make their communication increasingly digital, disability rights advocates fight to ensure students with disabilities aren’t left behind. Navigating the complex legal landscape isn’t easy, and many schools aren’t aware of their unintentional violations.
View these slides to make sure your college website complies with sections 504 and 508 of the Rehabilitation Act, and that you can extend full web and IT access to every student.
Learn more about HiSoftware & Percussion's recent partnership announcement:
http://www.percussion.com/about/news-and-events/press-releases/2014/hisoftware-and-percussion-announce-partnership
In this deck I aim to broaden our definitions of accessibility and disability to create a more effective and useful mindset to approach the challenge. To be clear, web accessibility is not a simple of matter of "designing for blind people." It's not even just about hman disabilities. Accessibility is also not the sole responsibility if developers. While code plays a critical role in accessibility the real challenge, and the majority accessibility failure, comes in the form of content and visual design. If reaching the largest possible audience is a primary goal you'll need to be accessible. Enjoy.
Delivering Accessible Content with WCAG 2.0Mike Paciello
The document discusses web accessibility and WCAG 2.0 guidelines. It provides an overview of the four principles of WCAG 2.0 - Perceivable, Operable, Understandable, and Robust. Each principle contains guidelines to ensure web content is accessible to people with disabilities. The document also outlines the WCAG 2.0 success criteria and references key WCAG documents for further information.
This document provides an overview of a web accessibility workshop held on March 3rd, 2016. The workshop covered several topics related to web accessibility including target user groups, empathy exercises using the web with limited abilities, frameworks for accessible web design, and preparing for WCAG 2.0 testing. The workshop was led by Vladimir Tomberg, PhD from Tallinn University. Participants were provided login credentials to use the Mac lab and instructions for completing in-class and home assignments. Today's workshop sessions included discussions of target user groups who benefit from accessible design, an empathy exercise using the web with limited abilities, an introduction to the principles of accessible web design, and an overview of WCAG 2.0 guidelines for web content accessibility testing
The document discusses the Web Content Accessibility Guidelines (WCAG) which provide a framework for making web content more accessible. It covers what WCAG is, the principles of Perceivable, Operable, Understandable and Robust, and how WCAG has evolved from version 1 to version 2 to be more testable and flexible. Key changes include clearer success criteria and support for newer technologies like scripting. The document provides examples and guidance on meeting WCAG, including techniques for things like text contrast, navigation and captions.
Preparing the enterprise for 508 refresh, ibm csun2017Michael Gower
This document summarizes the key points from a presentation on preparing for the Section 508 Refresh. It discusses the major changes in the Refresh, including incorporating WCAG 2.0 and harmonizing with European standards. It also provides an overview of the rule and requirements for reviewing the final rule, comparing to existing guidance, and producing new guidance and resources to support compliance.
Accessibility metrics Accessibility Data Metrics and Reporting – Industry Bes...Ted Drake
Accessible version: http://www.last-child.com/a11y-data-metrics/
Learn how top companies are tracking and graphing product accessibility progress and incorporating data from automated, manual, and user testing to create management dashboards.
The document discusses the functions and types of operating systems. It defines an operating system as the most important program that runs on a computer and performs basic tasks like recognizing input/output and managing files. The major functions of an operating system are providing an interface for users, managing system resources like memory and CPU time, running applications, and handling security and access rights. The document outlines different types of operating systems including real-time, single-user/multi-tasking, multi-user, distributed, and embedded operating systems. Examples of specific operating systems are also provided.
The operating system controls the computer by providing an interface between the user and hardware to make the computer more convenient to use. It manages processes, memory, files, security, and interprets commands. The operating system allows users to start and stop processes, allocate memory, create and manage files and directories, implement security measures like passwords and firewalls, and interacts with users through either a command line or graphical user interface.
The document discusses different types of operating systems. It defines an operating system as software that allows computer hardware and software to communicate and function. It then describes GUI operating systems as using graphics and icons navigated by a mouse. It also covers multi-user systems that allow multiple users to access a computer simultaneously or at different times, as well as multiprocessing systems that support more than one processor, and multitasking and multithreading systems that run multiple processes concurrently. Finally, it mentions embedded systems designed for devices like PDAs with limited resources.
The document discusses the architecture and functions of operating systems. It describes operating systems as system software that acts as an interface between hardware and application software. The key functions of operating systems include managing memory, files, devices, and providing common services for application programs. Examples of common operating systems like Windows, UNIX, and VAX/VMS are given.
The document discusses operating systems and real-time operating systems. It defines an operating system as software that manages computer hardware resources and provides common services for programs. It then describes the main functions of an operating system including managing resources and devices, running applications, and providing a user interface. The document also discusses different types of operating systems including single-user/single-tasking, single-user/multi-tasking, and multi-user/multi-tasking. It defines a real-time operating system as one intended for real-time applications that has advanced scheduling algorithms to ensure deterministic timing behavior.
This document provides strategies and resources for improving web usability and accessibility through DIY methods. It discusses performing usability tests with low-cost tools, following standards like WCAG 2.0 AA, and using free accessibility evaluation tools. Vendors should be told to comply with Section 508 and WCAG 2.0 and contracts can include penalties for non-compliance. Accessibility involves considerations for many types of disabilities and screen readers can help evaluate sites.
The document discusses making educational technology accessible to students with disabilities by following accessibility standards and guidelines. It provides an overview of principles of accessible design, built-in accessibility features in common technologies, and resources for evaluating the accessibility of web-based products and determining technical standards compliance. The document also describes an activity where participants formed groups to discuss implementation of accessibility regulations and develop action plans.
This document outlines a workshop about accessibility standards Section 508 and WCAG 2.0, and how they apply to digital content and blended learning. It discusses key aspects of Section 508, including the changes in the recent refresh, and how WCAG 2.0 criteria can be used to measure accessibility. It provides guidance on how these standards apply to SUNY Empire's digital content and blended courses, emphasizing the need to make all content and technologies conform with Level AA WCAG 2.0 guidelines. Exceptions for undue burden and legacy content are also summarized.
Forms for All: Building Accessibility into UiPath App DesignDianaGray10
Explore the world of accessible app design. We'll dive into common accessibility challenges faced by users in online forms and uncover practical solutions. Learn how to identify and rectify barriers that hinder user interaction, ensuring your forms are navigable and usable by all. This session will provide valuable insights into creating more inclusive online experiences, making your apps not just functional, but more accessible.
Topics covered in this session include:
• The Importance of Accessibility
• UX Accessibility Examples
• Adding Accessibility to Apps
Speaker:
David Kroll, Director, Product Marketing @Ashling Partners and UiPath MVP
Web accessibility is important because it allows people with disabilities to access websites. Over 285 million people are blind or visually impaired and 275 million are deaf or hearing impaired. Accessible websites follow guidelines like WCAG to address the needs of people with visual, auditory, motor, and cognitive disabilities. W3C leads initiatives to promote web accessibility through standards, guidelines, and resources to help make websites accessible to people with disabilities.
2016-09-28 Are You ADA Compliant? Ensuring Your Website is Accessible to Peop...Raffa Learning Community
This document provides information about ensuring website accessibility for people with disabilities. It discusses what accessibility and usability mean, important laws and standards, types of disabilities and assistive technologies, and an organization's accessibility assurance services. The agenda includes introductions, accessibility definitions, business drivers for compliance, relevant laws and regulations, disability types, and a question and answer session.
This document summarizes a presentation titled "Architect a Winning Mobile Application" given by Shadi Saifan of FIS Mobile. The presentation covered key topics for developing successful mobile applications such as selecting a mobile development approach, security considerations, performance, data access, and connectivity. It compared native, web, and hybrid mobile app frameworks and outlined advantages and disadvantages of each. The presentation emphasized starting with the right architecture and making design decisions early that consider user experience, value, security, and long-term maintenance needs.
This document discusses web and mobile app accessibility testing. It covers laws regarding accessibility, how people with disabilities access apps using assistive technologies, and the difference between accessibility compliance and usability. The document provides guidelines for building and testing apps throughout development to ensure accessibility compliance and usability for people with disabilities. It also includes examples of accessibility standards, developer checklists, and ways to test for accessibility.
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
This document describes new and advanced features in InduSoft Web Studio v8.1+SP5. It includes enhancements to Mobile Access thin clients like support for images on buttons and navigation improvements. It also details improvements to the OPC UA client like better reliability and scalability. The document outlines security system enhancements for LDAP as well as improvements to debugging tools and cybersecurity features.
This document summarizes recent developments in web standards. Key points include: the rise of mobile and JavaScript, new real-time communication technologies like WebRTC, debates around DRM extensions, advances in offline capabilities and push notifications, evolving system application APIs, and work on payments, HTTP 2.0, and securing the web. It also discusses upcoming elections for the W3C Technical Architecture Group and encourages getting involved in W3C working groups.
Accessible UX in Government - OZeWAI 2015Ross Mullen
The document discusses accessibility issues with web applications created by the Australian government using third party controls like Telerik, noting that while the vendors claim the controls are accessible, they have problems that make them inaccessible for users of assistive technologies; it provides examples of issues with controls like grids and filters lacking proper ARIA attributes and relationships between elements, and suggests alternatives like custom controls that are fully accessible without workarounds.
Making night and day difference as a developer introduces the topic of web accessibility and compliance with standards like Section 508 and the Web Content Accessibility Guidelines. Ensuring applications are accessible is important for people with disabilities and limitations. While Oracle Application Express aims to comply out of the box, developers need to take extra care when adding custom HTML, CSS, JavaScript or plugins to avoid common issues like invalid code, low color contrast, lack of keyboard support, improper use of colors or labels, and invalid ARIA attributes. Tools are available to test for and address accessibility.
Marketing Without Barriers: Considering Digital Accessibility for Customers a...Whole Brain Group, LLC
There are 57 million Americans living with a disability, and many of these people need to use assistive technology to interact with websites and digital marketing materials. If your website and marketing materials aren't created properly, they won't be compatible with these devices, and you could be unintentionally excluding customers who would otherwise like to buy from you. You can also be at risk for legal liability if you're in an industry that is subject to accessibility compliance regulations.
This talk illustrates why businesses and marketers should be thinking about accessibility when they develop marketing plans and launch digital campaigns.
Section 508 accessibility is a term used in reference to the requirement under Section 508 of the Rehabilitation Act that all federal agencies ensure that their information and communication technology (ICT) is accessible to people with disabilities, unless certain exceptions apply.
The document discusses web accessibility and why it is important. It defines web accessibility as making websites usable by as many people as possible, including those with disabilities. It notes that web accessibility benefits both disabled and non-disabled users. The document outlines the major areas of accessibility including visual, audio, physical, and cognitive and provides examples of how to make content accessible in each of these areas. It also discusses common web accessibility standards and guidelines like WCAG.
The document discusses the key stages in the IoT product life cycle: design, deployment, ongoing management, and decommissioning. It notes that design is the most important stage as developers must consider requirements for all subsequent stages to ensure ease of support. Deployment involves proof-of-concepts, pilots and commercial roll-out and requires access by multiple stakeholders. Ongoing management, the longest stage, allows remote monitoring, maintenance and updates. Decommissioning is often overlooked but properly planning for end-of-life supports transitioning to new models.
The document describes new and advanced features in InduSoft Web Studio version 8.1 and later. Key features include enhanced support for HTML5 thin clients like improved alarm handling and animations. It also details improved security options, expanded platform support, and new custom widgets. Tag integration for OPC servers and enhanced database connectivity for IoT applications are highlighted as well.
Section 508 Accessibility for U.S. Government ContractorsJennifer Smith
Learn why 508 accessibility is important for all and how, as government contractors, we can aid in fulfilling the need to provide proper 508 compliance to not only meet the requirements of the law, but also the intent.
Presentation on testing web sites for accessibility without spending much money. Includes links to tools I use for automatic testing, like the WAVE toolbar from WebAIM, The Paciello Group Colour Contrast Analyzer and others.
Similar to Section 508 & Accessibility - IDRAC 2014 - Timothy Creagon - US Access Board (20)
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
3. Today’s topics:
I. Introduction
II. Barriers to Information Technology
III. §508 of the Rehabilitation Act
IV. Complying with Section 508:
A. Testing and policies
B. “Equivalent Facilitation”
V. The “Refresh” of Sections 508 & 255
VI. Q & A
4. I. Introduction: Access Board Programs
• Guidelines and standards development
• Architectural Barriers Act of 1968
• Americans with Disabilities Act of 1990
• Telecommunications Act of 1996
• Rehabilitation Act Amendments of 1998
• Patient Protection and Affordable Care Act
• Technical assistance and training ***
• Research
• ABA enforcement
5. II. Barriers to Information
Technology for persons with
disabilities
6. Have you ever struggled to see
the characters on a screen?
7. Seeing:
• Phones
• Illuminated displays
• High contrast controls
• Large buttons
• Computers
• Zoom display
• High contrast display
• Screen reader
8. Hearing:
• Phones
• Hearing aid compatibility
• Text capability
• Vibrating alerts
• Computers
• Video captions
• Visual alerts
11. §508 General Requirements:
• Each Federal department and agency, as well as the
U.S. Postal Service, when procuring, maintaining,
developing or using electronic and information
technology, must ensure that:
• Federal employees with disabilities, and members of the
public with disabilities seeking information or services,
have access to and use of information and data that is
comparable to the access and use by persons who are
not individuals with disabilities, unless…
Standard:
….an “Undue Burden” would be imposed on the agency.
12. Section 508 Standards focus on
product categories of ICT:
• “Software applications and operating
systems” §1194.21
• “Web-based internet and intranet information
and applications” §1194.22
• “Telecommunications products” §1194.23
• “Video and Multimedia products” §1194.24
• “Self contained, closed products” §1194.25
• “Desktop and portable computers” §1194.26
13. Section 508 also focuses on the USER:
*Known as Part C – Functional Performance Criteria
• §1194.31(a) …does not require user vision…support for AT used by
blind or visually impaired
• §1194.31(b) …does not require visual acuity greater than 20/70
shall be provided in audio and enlarged print, or support for AT….
• §1194.31(c) …does not require user hearing…support for AT used
by …deaf or hard of hearing…
• §1194.31(d) …where audio information is important,… enhanced
audio…or support for AT…
• §1194.31(e) …does not require user speech…support AT…
• §1194.31(f) …does not require fine motor control or simultaneous
actions and …is operable /w limited reach
14. What technology is covered by §508?
Includes, but is not limited to…
Computers Telecommunications
Websites
Kiosks
Printers
Software
Office Equipment
15. However, time has passed…
….and technology has changed.
Today, what a product DOES is more
important that what a product is CALLED.
“Feature”/“Function” versus “Product name”
Question:
How Can we use Section 508 to evaluate
today’s technology?
16. For example, what features are
included in §1194.23
“Telecommunications Products” ?
• 2 way voice communication
• Controls and keys
• Hardware
• Minimize Hearing aid interference
• Text messaging(TTYs)
• IVR (Interactive Voice Response, menus)
17. Today there are many more products
available with many more features :
FOR EXAMPLE, “Telecommunications Products”:
• “Landline” phones, wireless phones, Smart phones: Voice
communication
• TTYs, SMS, Blackberry, iPhone, Sidekick, Twitter: Text
messaging
• SKYPE: Calls/ Video Conferencing
• Zoomtext or other software: Adjust size of text
• Web sites: Contain information about product features
18. Section 508 still applies; analyze the
features of the technology:
• Subpart B Technical Standards - do any apply?
• E.g. §§1194.23, 1194.21, 1194.22
• Subpart C Functional Performance Criteria – do any apply?
• E.g. §1194.31(a) – (f)
• §1194.5 Equivalent Facilitation - the new technology or
design [not necessarily in Section 508] results in substantially
equivalent or greater access to and use of a product for
people with disabilities – DOES THAT APPLY?
• E.g. voiceover for Apple iOS
• §1194.3 General Exceptions: Do any apply?
• E.g. §1194.3 (e ) Fundamental Alteration
19. What about technology that has
features not addressed by §508?
EXAMPLE:
• Mobile Telecommunications
• iPods and Podcasting -
Operate without buttons
• Smart Phones with touch screens
• [Voiceover]
• [Talkback]
20. Making technology accessible:
• Captions
• Alternative formats: text for audio, alt tags
for images
• Use of API (Application Programming
Interface) to address compatibility
between AT and IT software (make
products interoperate)
• “Apps” or “Applications” on Smart phones
21. IV. Complying with Section 508:
A. Policies and testing
B. Equivalent Facilitation
22. Implementing Section 508
• Agencies use the Section 508 technical
standards and Functional Performance
Criteria when they “procure, use, maintain
or develop” Electronic and Information
technology (E&IT)
• Agencies are responsible for developing
their own policies as to how they
implement Section 508 within their own
agencies
24. Sample policies and resources:
• HHS Section 508 web standards and
checklists: http://508.hhs.gov/
• VA Section 508 Support:
http://www.section508.va.gov/support/index.
asp
• U.S. Access Board:
• http://www.access-board.gov/guidelines-and-standards/
communications-and-it/about-the-section-
508-standards/guide-to-the-section-508-
standards
25. Free testing tool bars:
Webaim: WAVE: http://wave.webaim.org/
Web Accessibility tool bar:
http://www.paciellogroup.com/resources/wat
26. CIOC Best Practices Webinar
series
SEE:
“How Four Federal Agencies Handle Section
508 Testing: A Case Study”
http://www.adaconferences.org/CIOC/Archiv
es March 25, 2014
28. 28
§1194.5 Equivalent Facilitation
“Nothing in this part is intended to prevent
the use of designs or technologies as
alternatives to those prescribed in this part
provided they result in substantially
equivalent or greater access to and use of a
product for people with disabilities.”
29. Using Equivalent Facilitation to achieve
access by alternative means:
• Use WCAG 2.0 (Web Content
Accessibility Guidelines)
• What is WCAG 2.0?
• International standard for web documents
and web applications
• W3C Standard (2008)
• ISO Standard (2012): ISO/IEC JTC-1 40500:2012
• W3C/WAI: World Wide Web Consortium /
Web Accessibility Initiative
• Developed through open and inclusive standards
process
30. 30
Why use WCAG 2.0?
• Technology Neutral
• Unlike 508 1194.22, not HTML specific
• Success Criteria: (aka “Requirements”)
• Address existing 508 technical criteria (1194.21
and .22)
• Address 508 functional performance criteria
• Hearing, Sight, Manual Dexterity, Speech
• Partially address Cognition, Language, and
Learning (CLL)
• Are Objectively Testable
Written to be evaluated as yes/no or true/false statements.
31. 31
Is WCAG 2.0 being used now?
FEDERAL AGENCIES:
• Department of Transportation, Non-Discrimination on the Basis of
Disability in Air Travel: Accessibility of Web Sites and Automated
Kiosks at U.S. Airports, Final rule December 13, 2013
• Department of Justice, Accessibility of Web Information and
Services of State and Local Government Entities and Public
Accommodations, ANPRM July 2010 (Proposed)
INTERNATIONALLY:
• Canada
• Australia
• New Zealand
• European Union (EU) (Mandate 376)
32. 32
WCAG 2.0: POUR Concept
The 4 Principles
• Perceivable
Content is made available
to the senses - sight,
hearing, and/or touch
• Operable
Interface forms, controls,
and navigation are operable
• Understandable
Content and interfaces are
understandable
• Robust
Content can be used
reliably by a wide variety of
user agents, including
assistive technologies
POUR’s Overlapping Tenets
33. 33
“How to Meet WCAG 2.0”
“How To Meet WCAG2.0” - daily resource
document for the day-to-day Developer
• is a Database
• Quick Reference:
• http://www.w3.org/WAI/WCAG20/quickref/
• Customizable
• Searchable
• A way to get to the Techniques and Failures
34. 34
Concluding thoughts about WCAG 2.0 :
• The Success Criteria are the Requirements
• The Techniques are not required but provide
guidance
• WCAG 2.0 can be used – Equivalent Facilitation
(§1194.5)
• Built-in Prioritization Path/Plan
(for Development/Remediation/QA)
• WCAG 2.0 Support Documents are Regularly
Updated
35. 35
W3C Resources:
• Web Content Accessibility Guidelines (WCAG) 2.0:
URL: http://www.w3.org/TR/WCAG20/
• Understanding WCAG 2.0:
Stable URL: http://www.w3.org/TR/UNDERSTANDING-WCAG20/
• How to Meet WCAG 2.0:
URL: http://www.w3.org/WAI/WCAG20/quickref/
• Techniques for WCAG 2.0:
Stable URL: http://www.w3.org/TR/WCAG20-TECHS/
• Guidance on Applying WCAG 2.0 to Non-Web Information
and Communications Technologies (WCAG2ICT)
URL: http://www.w3.org/tr/wcag2ict/
37. The “Refresh” of Section 508:
The “Refresh” is an update of:
Section 508 standards for electronic and
information technology (“E&IT”) (procured by
Federal agencies)
Section 255 guidelines for telecommunications
products
38. Why Refresh?
• Statutory requirement:
• “The Access Board shall periodically review and, as appropriate, amend the
standards to reflect technological advances or changes in electronic and
information technology.” (Section 508 of the Rehabilitation Act)
• “The Board shall review and update the Telecommunications Act Accessibility
Guidelines periodically” (Section 255 of the Telecommunications Act)
• Changes in technology
• 13 years since the first Section 508 standards
• 15 years since the first Telecommunications Act Accessibility Guidelines
• Clarify ambiguities in current standards and guidelines
• What products are covered?
• Improve testability
39. ICT Refresh Steps
• TEITAC establishment: July 2006
• TEITAC report: April 2008
• First ANPRM and draft text: March 2010
• Public comments: March-June 2010
• Review comments
• Second ANPRM and draft text: Dec. 8, 2011
• *Harmonization draft published*
• Public Comments: Dec . 2011– March 2012
• Review comments, revise text of proposed rule
40. Final Steps
• Develop proposed rule (NPRM):
Text, preamble & regulatory assessment
• ** Submit to OMB for review **
• Publish NPRM in the Federal Register
• Public comment period – 60 days
• Analyze comments
• Develop final rule & regulatory assessment
• Publish Final Rule in the Federal Register
41. Some trends in updating the 508
standards (2010 and 2011
ANPRM):
1. Organize technical provisions by functions,
rather than product types –
“two way voice communication” NOT
“telephones”
2. Reference external standards –
WCAG 2.0; ANSI C63.19-2011
3. Provide technical assistance within the
document.
4. Define “covered electronic content”
43. To keep track of the “Refresh”
process:
Sign up for progress updates here:
https://public.govdelivery.com/accounts/USA
CCESS/subscriber/new?topic_id=USACCE
SS_3