-
This is a third party (definition version)The concept of government intermediaries can be complicated. Enable your employees to understand who "third parties" are and why they're important to identify. This piece lives between our simple graphic on uniformed third parties and our more complex...
Log in for pricing
-
4 ways bad guys get your passwordThis is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
Log in for pricing
-
What can you give to a government official?Based DOJ guidance on the FCPA, this explainer breaks down how to think about what is appropriate to give folks in government. Contrasting examples are used to highlight what are truly acceptable gifts and entertainment when government officials are...
Log in for pricing
-
Can you throw it away?Use this elegant decision tree to help your people understand the ifs, whens, and hows of getting rid of documents. Keep versus shred may feel like second nature to your compliance and legal teams, but your other employees often need more guidance. This...
Log in for pricing
-
Conflicts of InterestMake sure your employees know what's a conflict of interest—and, just as important, what to do about it. It’s too easy for folks to just “go with their gut” about potential conflicts. This piece uses simple icons to explain when...
Log in for pricing
-
If it's disclosed, it can be managedEveryone thinks they can manage their own conflicts. Use this graphic piece to help your team identify and disclose all conflicts, all while reducing the stigma of doing so. One of employees’ core misunderstandings about conflicts of interests is...
Log in for pricing
-
Cooperating with internal investigationsWhen Happy Cloud is involved, it's a good day. Reassure your employees with this calming guide by setting expectations and educating them on the process of being a part of an investigation. Drawing from our team’s background in investigations, we...
Log in for pricing
-
Don't get fooled by email scammersSuccessful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...
Log in for pricing
-
Would you trade on it?This graphic guide simplifies the types of information that should be protected to avoid insider trading. Without getting too far in the weeds of securities terminology (woof), this piece highlights common categories of material non-public...
Log in for pricing
-
Trading Blackout EffectiveStand out with this notice that a trading blackout is in effect.
Log in for pricing
-
Trading Blackout LiftedStand out with this notice that a trading blackout is lifted and trading is OK.
Log in for pricing
-
Insider Trading BasicsGordon Gekko may think that greed is good, but your company doesn't when it comes to insider trading. Educate your employees on the basics with this graphic piece. Aimed at a general audience, this piece lays out three common categories of material...
Log in for pricing