-
Working remotely? Protect your data!Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...8✨Tokens -
Careful virtual communicationsWe may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn. At best: cringey embarrassing...8✨Tokens -
How to use AI Chatbots at workYour employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...6✨Tokens -
We protect our dataFoster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...6✨Tokens -
Notify Privacy when mistakes happenBeing accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...6✨Tokens -
When should I contact the Privacy Team?Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...8✨Tokens -
Vanishing Words: A Guide to Ephemeral MessagingEphemeral messaging—aka self-destructing apps—are an easy way to send a quick status update. But, when it comes to business discussions, your employees need to know the DOs and DON’Ts of using these apps to keep your company out of hot...6✨Tokens -
Is it confidential?Your employees handle confidential info all the time. So much so, they can stop "seeing" it as private; it simply becomes... work. This elegant decision tree breaks down the core elements of what shouldn't be made public without approval, helping your...8✨Tokens -
What is a business record?Good records management keeps your business running smoothly, but knowing what qualifies as a business record and needs to be maintained can be tricky. Unravel the mystery and avoid confusion with this most excellent infographic. It starts with...8✨Tokens -
Video: AI ChatbotsYour employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk. Help them understand how to use AI Chatbots without introducing a whole host of risks with this easy to digest...8✨Tokens -
What to expect during an internal investigationInvestigations often make employees anxious, even if they’re not the subject of any allegations. And when emotions run high, their brains stop processing all the info you are sharing with them. So, instead of hoping they remember all the stuff you...8✨Tokens -
Finalizing, Submitting, or Storing Company Records?This simple checklist helps employees keep good records without getting bogged down with trying to remember what to do. It’s easy to forget how vital recordkeeping is, but sometimes the mere act of insufficient documentation is itself a violation...6✨Tokens -
Suspect a privacy breach?Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...8✨Tokens -
Records Management: Simplified (mini-module)The way your teams handle company records can either make your org super efficient or create a complete mess. Even worse, poor practices hinder productivity and can lead to legal woes. Keep everyone organized and compliant with this 8-slide...8✨Tokens -
Video: Careful CommunicationsGive your teams clear guidance on the do’s and don’ts of virtual communications with this short video. In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the audience, the...8✨Tokens -
Video: We protect our dataThis short, targeted training video (roughly 90 seconds) outlines what counts as data and WHY protecting it matters. It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information...10✨Tokens -
What not to discuss during a mergerJoining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...6✨Tokens -
Video: Before You PostIn this short, targeted training video (less than 90 seconds), employees will learn how to steer clear of work-related hazards on social media. Like a trusty Driver’s Ed instructor, we’ll talk your employees through how to think proactively,...8✨Tokens -
Piecing together confidential info - horizontalEmployees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.2✨Tokens -
Every employee is responsible for - horizontalKeep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course, Basic Code of Conduct Obligations infographic, and corresponding...2✨Tokens -
Report unattended informationMake sure each employee knows their responsibility to look out for sensitive info being left around—and if they find some, raise it to management.2✨Tokens -
If it's confidential...Provide your team with the simple—but not always understood—rules of keeping your company's private info confidential.2✨Tokens -
Check the background before you share itEncourage your team to avoid inadvertently posting photos with your company's confidential info.2✨Tokens -
Piecing together confidential infoEmployees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.2✨Tokens