Skip to main content
Filters & Sort
  • Is this personal data?
    Is this personal data?
    Maintaining customer and employee privacy has always been important, but with GDPR, CCPA and other privacy regs across the globe, not only is it important—it’s also the law. Ensure your teams know what qualifies as “personal data”...
    8✨Tokens
  • Get asked to click on a link? (job aid)
    Get asked to click on a link? (job aid)
    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...
    6✨Tokens
  • Has a government regulator contacted you?
    Has a government regulator contacted you?
    If a regulator reaches out, this guide explains step-by-step who is supposed to do what and when. It’s scary when someone from the government initiates contact, and scared people often don’t make rational decisions—this is an obvious...
    8✨Tokens
  • Template: Visual Legal Hold
    Template: Visual Legal Hold
    Help employees easily understand their obligations when lawsuits happen. When litigation lands, it’s critical that employees know how to navigate a legal hold. Why, then, are so many of them basically unreadable mountains of legalese? Use this...
    8✨Tokens
  • You might need an export license (deemed exports version)
    You might need an export license (deemed exports version)
    This easy tool explains the completely non-intuitive concept of "deemed exports" in trade compliance. Focusing on deemed export elements that would surprise most employees, we’ve designed this piece to drive employees to seek help from compliance...
    8✨Tokens
  • Boost efficiency, avoid legal risks, and reduce storage expenses with this 8-slide mini-module on best practices for managing business records. Records Management: Simplified (mini-module) Records Management: Simplified (mini-module) Records Management: Simplified (mini-module)
    Records Management: Simplified (mini-module)
    The way your teams handle company records can either make your org super efficient or create a complete mess. Even worse, poor practices hinder productivity and can lead to legal woes.  Keep everyone organized and compliant with this 8-slide...
    8✨Tokens
  • Received a request to transfer data?
    Received a request to transfer data?
    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...
    8✨Tokens
  • Expenses must have a clear business purpose
    Expenses must have a clear business purpose
    Help your people reviewing invoices avoid fraud or bribery by showing them what red flags look like—they'll love you for it! Use these graphics alongside our other invoice red flag pieces for a strategic campaign tackling this compliance priority.
    2✨Tokens
  • Loose lips cause stock dips
    Loose lips cause stock dips
    Not everyone knows when sensitive business info gets out, but everyone knows when your stock plummets. This piece vividly illustrates the connection.
    2✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...
    8✨Tokens
  • We compete for talent
    We compete for talent
    Make sure your team knows "no-hire" agreements are illegal with this graphic reminder. Based on recent DOJ antitrust litigation, this piece explains that antitrust behavior extends beyond products, services, and illegally sharing info. Instead, your...
    8✨Tokens
  • Check the document retention schedule
    Check the document retention schedule
    People forget that—even if they're finished with a document—your document-retention policy prohibits destroying it. Remind them that your company's policy gives them a handy schedule.
    2✨Tokens
  • This delightfully concise infographic explains what IP is, how to avoid misusing it, and ways to safeguard assets without overwhelming.
    Respecting Others’ IP
    Don’t bore your team with the complexities of intellectual property (IP). Instead, use this delightfully concise infographic to explain it all in simple terms without overwhelming. Whether folks are creating presentations, marketing content, or...
    6✨Tokens
  • Quickly train your third parties on your org’s core values and expectations with this thorough and straightforward module. Third Party Code of Conduct Training Third Party Code of Conduct Training Third Party Code of Conduct Training
    Third Party Code of Conduct Training
    Your third parties—like vendors, consultants, suppliers, and business partners—are essentially an extension of your org, so they need to know and uphold your standards. Share this practical module with them to make sure they get it. In about...
    12✨Tokens
  • Equip your teams with the strategic soft skills they need to engage in tough conversations with this short contrasting-examples video (2:15).
    Video: Careful Communications
    Give your teams clear guidance on the do’s and don’ts of virtual communications with this short video. In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the audience, the...
    8✨Tokens
  • This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters. 

It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and closes with one major way employees can keep data safe. A perfect assortment of bite-sized privacy tidbits! 

Hungry for more? Order the We protect our data, Finalizing, Submitting, or Storing Company Records?, 4 ways bad guys get your password or Working remotely? Protect your data job aids for the whole enchilada.
    Video: We protect our data
    This short, targeted training video (roughly 90 seconds) outlines what counts as data and WHY protecting it matters.  It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information...
    10✨Tokens
  • Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law).
 
Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits with folks from the other company—like pricing, contract terms, territories, product innovation, or any other strategic plans. That way, you’ll know they’re conducting business the right way and your integration won’t get disrupted by an honest, but illegal, mistake. 

For greater impact, follow this up with our before an integration job aid.
    What not to discuss during a merger
    Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...
    6✨Tokens
  • Give your teams the clarity they need when it comes to handling and managing personal data. 

In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it and delete it.

Add this micromodule to theAnnual Refresher Course & Code Obligations Job Aid or pair with our Is this personal data? infographic, and deal with less data breaches and reports of misused data. Handling personal data (mini-module) Handling personal data (mini-module) Handling personal data (mini-module)
    Handling personal data (mini-module)
    Give your teams the clarity they need when it comes to handling and managing personal data.  In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it...
    7✨Tokens
  • What are side letters?
    What are side letters?
    Packing sandwich condiments on the side reduces risk (of mushy bread, bleh!), but contract terms on the side only increases it. Use this checklist to make sure your teams don't spoil the deal!  Perfectly proportioned, it starts with a short, but...
    8✨Tokens
  • Video: Watch out for red flags from third parties
    Video: Watch out for red flags from third parties
    In this short (less than 2 minutes), targeted training video, employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with...
    10✨Tokens
  • Module: Personal Data & Privacy Module: Personal Data & Privacy Module: Personal Data & Privacy Module: Personal Data & Privacy
    Module: Personal Data & Privacy
    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...
    15✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products