Display:

Handling Information

Trade Compliance Team

  • You might need an export license (ways to export version)

    You might need an export license (ways to export version)

    This graphic one-pager shows your team how to spot trade-compliance issues when sharing with non-citizens. Just because you’re not handing it to a courier doesn't mean it’s not an export—but that’s not really intuitive. This...

    8✨
    View
  • You might need an export license (deemed exports version)

    You might need an export license (deemed exports version)

    This easy tool explains the completely non-intuitive concept of "deemed exports" in trade compliance. Focusing on deemed export elements that would surprise most employees, we’ve designed this piece to drive employees to seek help from compliance...

    8✨
    View
  • This clever infographic reveals the five most common bribery tactics so your people can easily spot bribery attempts and notify you ASAP.

    How to tell if someone’s asking for a bribe

    Since shady people rarely come out and say, “pay this bribe,” it can be tricky to know when someone’s asking for one. especially when it involves non-monetary favors and sharing information. This clever infographic reveals the five...

    8✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Are you on the restricted list?

    Are you on the restricted list?

    An easy reminder: you may have to get permission to trade stocks, so ask.

    2✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View