Display:

Handling Information

Job aids

  • Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to ease some of your anxiety...  Prepare your employees for the integration with this one-pager that carefully lists everything to do (and not to do) premerger. Share this gun-jumping infographic for extra impact.

    Before a merger or acquisition...

    Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...

    8✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • What can I ask a candidate during the hiring process?

    What can I ask a candidate during the hiring process?

    Hiring is exciting (finally, all hands on deck!) but if anyone on the team slips up and asks the wrong question during the interview process—stormy seas are ahead! Fear not matey, because this infographic maps out what’s OK to ask, what...

    8✨
    View
  • Mark it, protect it

    Mark it, protect it

    Making sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...

    6✨
    View
  • Social Media for Sensitive Projects

    Social Media for Sensitive Projects

    Don’t let your employees give away secret information for free. This handy decision tree shows employees the potential pitfalls of social media use while working on highly confidential matters. Postings pics, tagging coworkers/vendors, checking...

    8✨
    View
  • Competitive Information: New Hire Screening

    Competitive Information: New Hire Screening

    Hiring someone from a competitor? You've got risks. This guide breaks down responsibilities and tasks to make sure everyone is coordinated—and it works as a record for due diligence, too! In the rush to hire someone, it’s easy to forget that...

    8✨
    View
  • This delightfully concise infographic explains what IP is, how to avoid misusing it, and ways to safeguard assets without overwhelming.

    Respecting Others’ IP

    Don’t bore your team with the complexities of intellectual property (IP). Instead, use this delightfully concise infographic to explain it all in simple terms without overwhelming. Whether folks are creating presentations, marketing content, or...

    6✨
    View
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.

    Insider threat red flags

    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...

    8✨
    View
  • How to handle a personal data request

    How to handle a personal data request

    Charades is fun, but, when it comes to handling requests for personal data, the last thing you want is for employees to play guessing games. Remove the ambiguity with this nifty infographic. It reveals the types of data requests they might receive and...

    8✨
    View
  • How to protect our data from imposters

    How to protect our data from imposters

    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers...

    8✨
    View
  • Collecting sensitive personal data?

    Collecting sensitive personal data?

    Collecting consumer data is risky business. Your company needs this information to run, but your people should only be collecting what they absolutely need, and tracking those reasons. But do they know this? This nifty infographic makes sure your people...

    8✨
    View
  • We never collect sensitive personal data

    We never collect sensitive personal data

    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...

    8✨
    View
  • Interacting with clients and service providers

    Interacting with clients and service providers

    While treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...

    8✨
    View
  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • We compete for talent

    We compete for talent

    Make sure your team knows "no-hire" agreements are illegal with this graphic reminder. Based on recent DOJ antitrust litigation, this piece explains that antitrust behavior extends beyond products, services, and illegally sharing info. Instead, your...

    8✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View