Skip to main content
Filters & Sort
  • Get asked to click on a link? (job aid)
    Get asked to click on a link? (job aid)
    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...
    6✨Tokens
  • Template: Visual Legal Hold
    Template: Visual Legal Hold
    Help employees easily understand their obligations when lawsuits happen. When litigation lands, it’s critical that employees know how to navigate a legal hold. Why, then, are so many of them basically unreadable mountains of legalese? Use this...
    8✨Tokens
  • You might need an export license (deemed exports version)
    You might need an export license (deemed exports version)
    This easy tool explains the completely non-intuitive concept of "deemed exports" in trade compliance. Focusing on deemed export elements that would surprise most employees, we’ve designed this piece to drive employees to seek help from compliance...
    8✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...
    8✨Tokens
  • We compete for talent
    We compete for talent
    Make sure your team knows "no-hire" agreements are illegal with this graphic reminder. Based on recent DOJ antitrust litigation, this piece explains that antitrust behavior extends beyond products, services, and illegally sharing info. Instead, your...
    8✨Tokens
  • Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law).
 
Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits with folks from the other company—like pricing, contract terms, territories, product innovation, or any other strategic plans. That way, you’ll know they’re conducting business the right way and your integration won’t get disrupted by an honest, but illegal, mistake. 

For greater impact, follow this up with our before an integration job aid.
    What not to discuss during a merger
    Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...
    6✨Tokens
  • Dawn Raid: How to Respond
    Dawn Raid: How to Respond
    Dawn Raids can be scary, but Happy Cloud knows what to do. Educate your team on how to respond when government agents come knocking. Your team shouldn’t be unprepared for a surprise visit from regulators. This piece offers some tried-and-true...
    6✨Tokens
  • AI: These aren’t your grandpa’s phishing scams
    AI: These aren’t your grandpa’s phishing scams
    Phishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...
    8✨Tokens
  • How to handle a personal data request
    How to handle a personal data request
    Charades is fun, but, when it comes to handling requests for personal data, the last thing you want is for employees to play guessing games. Remove the ambiguity with this nifty infographic. It reveals the types of data requests they might receive and...
    8✨Tokens
  • Collecting sensitive personal data?
    Collecting sensitive personal data?
    Collecting consumer data is risky business. Your company needs this information to run, but your people should only be collecting what they absolutely need, and tracking those reasons. But do they know this? This nifty infographic makes sure your people...
    8✨Tokens
  • What can I ask a candidate during the hiring process?
    What can I ask a candidate during the hiring process?
    Hiring is exciting (finally, all hands on deck!) but if anyone on the team slips up and asks the wrong question during the interview process—stormy seas are ahead! Fear not matey, because this infographic maps out what’s OK to ask, what...
    8✨Tokens
  • Mark it, protect it
    Mark it, protect it
    Making sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...
    6✨Tokens
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.
    Insider threat red flags
    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
    8✨Tokens
  • How to protect our data from imposters
    How to protect our data from imposters
    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers are...
    8✨Tokens
  • We never collect sensitive personal data
    We never collect sensitive personal data
    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...
    8✨Tokens
  • Going on a trip? Protect your data!
    Going on a trip? Protect your data!
    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target hotel...
    6✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products