Display:

Confidentiality

  • Working remotely? Protect your data!

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • Handling Personal Information?

    Handling Personal Information?

    This easy-to-use chart covers what counts as personal information—and how to think through managing it. Handling personal information—whether it’s your customers’ or your own employees’—is risky, so help your...

    8✨
    View
  • Preparing to gather competitive intelligence?

    Preparing to gather competitive intelligence?

    While going undercover and being a super sleuth sounds like fun, it’s not something you want your employees doing to sniff out what your competitors are up to. Use this piece to explain the right way to gather information and what’s totally...

    8✨
    View
  • Insider Trading Basics

    Insider Trading Basics

    Gordon Gekko may think that greed is good, but your company doesn't when it comes to insider trading. Educate your employees on the basics with this graphic piece. Aimed at a general audience, this piece lays out three common categories of material...

    8✨
    View
  • What happens when I make a disclosure?

    What happens when I make a disclosure?

    Employees are hesitant to disclose their personal interests for a conflict review because they’re worried they’ll be in trouble, have to ditch their side gig, or who will see their personal information. Eliminate the uncertainty of...

    8✨
    View
  • Careful virtual communications

    Careful virtual communications

    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...

    8✨
    View
  • You are responsible for what you know - horizontal

    You are responsible for what you know - horizontal

    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...

    2✨
    View
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.

    How to use AI Chatbots at work

    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...

    6✨
    View
  • We protect our data

    We protect our data

    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...

    6✨
    View
  • Is it confidential?

    Is it confidential?

    This elegant decision tree helps your team quickly determine if they can share info—or keep it private. One of our favorite pieces, this breaks down the main elements of what constitutes info that should NOT be made public without approval. Even...

    8✨
    View
  • Notify Privacy when mistakes happen

    Notify Privacy when mistakes happen

    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...

    6✨
    View
  • When should I contact the Privacy Team?

    When should I contact the Privacy Team?

    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...

    8✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • Would you trade on it?

    Would you trade on it?

    This graphic guide simplifies the types of information that should be protected to avoid insider trading. Without getting too far in the weeds of securities terminology (woof), this piece highlights common categories of material non-public...

    6✨
    View
  • Finalizing, Submitting, or Storing Company Records?

    Finalizing, Submitting, or Storing Company Records?

    This simple checklist helps employees keep good records without getting bogged down with trying to remember what to do. It’s easy to forget how vital recordkeeping is, but sometimes the mere act of insufficient documentation is itself a violation...

    6✨
    View
  • Want to collect customer data?

    Want to collect customer data?

    A handy infographic based on FTC guidance, this walks your teams through the main issues involved in collecting and using customer data. Rather than give hard-and-fast rules, this piece asks critical questions about the use of customer...

    8✨
    View
  • Video: AI Chatbots

    Video: AI Chatbots

    Your employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk.  Help them understand how to use AI Chatbots without introducing a whole host of risks with this easy to digest...

    8✨
    View
  • Video: Attending a conference?

    Video: Attending a conference?

    Prepare your employees to avoid the risks associated with attending external events using this short, targeted training video (1:20). In 80 seconds, your folks will know which conversation topics are off-limits, how to trust their gut when it comes to...

    7✨
    View
  • Knowing what qualifies as a business record and needs to be maintained can be tricky. Unravel the mystery and avoid confusion with this infographic.

    What is a business record?

    Good records management keeps your business running smoothly, but knowing what qualifies as a business record and needs to be maintained can be tricky. Unravel the mystery and avoid confusion with this most excellent infographic.  It starts with...

    8✨
    View
  • This checklist outlines everything your employees need to verify before they use ephemeral messaging apps.

    Vanishing Words: A Guide to Ephemeral Messaging

    Ephemeral messaging—aka self-destructing apps—are an easy way to send a quick status update. But, when it comes to business discussions, your employees need to know the DOs and DON’Ts of using these apps to keep your company out of hot...

    6✨
    View
  • This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters. 

It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and closes with one major way employees can keep data safe. A perfect assortment of bite-sized privacy tidbits! 

Hungry for more? Order the We protect our data, Finalizing, Submitting, or Storing Company Records?, 4 ways bad guys get your password or Working remotely? Protect your data job aids for the whole enchilada.

    Video: We protect our data

    This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters.  It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and...

    10✨
    View
  • Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law).
 
Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits with folks from the other company—like pricing, contract terms, territories, product innovation, or any other strategic plans. That way, you’ll know they’re conducting business the right way and your integration won’t get disrupted by an honest, but illegal, mistake. 

For greater impact, follow this up with our before an integration job aid.

    What not to discuss during a merger

    Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...

    6✨
    View
  • What are side letters?

    What are side letters?

    Packing sandwich condiments on the side reduces risk (of mushy bread, bleh!), but contract terms on the side only increases it. Use this checklist to make sure your teams don't spoil the deal!  Perfectly proportioned, it starts with a short, but...

    8✨
    View
  • Video: Watch out for red flags from third parties

    Video: Watch out for red flags from third parties

    In this short, targeted training video (1:45), employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with government officials or...

    10✨
    View