Display:

Confidentiality

Business Development Team

  • Preparing to gather competitive intelligence?

    Preparing to gather competitive intelligence?

    While going undercover and being a super sleuth sounds like fun, it’s not something you want your employees doing to sniff out what your competitors are up to. Use this piece to explain the right way to gather information and what’s totally...

    8✨
    View
  • Insider Trading Basics

    Insider Trading Basics

    Gordon Gekko may think that greed is good, but your company doesn't when it comes to insider trading. Educate your employees on the basics with this graphic piece. Aimed at a general audience, this piece lays out three common categories of material...

    8✨
    View
  • Would you trade on it?

    Would you trade on it?

    This graphic guide simplifies the types of information that should be protected to avoid insider trading. Without getting too far in the weeds of securities terminology (woof), this piece highlights common categories of material non-public...

    6✨
    View
  • Want to collect customer data?

    Want to collect customer data?

    A handy infographic based on FTC guidance, this walks your teams through the main issues involved in collecting and using customer data. Rather than give hard-and-fast rules, this piece asks critical questions about the use of customer...

    8✨
    View
  • Video: Watch out for red flags from third parties

    Video: Watch out for red flags from third parties

    In this short, targeted training video (1:45), employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with government officials or...

    10✨
    View
  • Module: Personal Data & Privacy

    Module: Personal Data & Privacy

    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...

    15✨
    View
  • Do you know your third parties? - horizontal

    Do you know your third parties? - horizontal

    When managing third party relationships, clarity is key. This on-point graphic serves as a simple reminder of what things your employees need to be aware of to make sure everyone is on the same page.

    3✨
    View
  • Three simple questions guide your employees through whether it’s OK to share info freely or they need an NDA before spilling the company beans.

    Do you need to get an NDA signed?

    Ever wonder if something you're about to share needs to be kept hush-hush? This handy guide is here to help! Think of it like a three-question quiz: answer yes or no, and it'll tell you if a Non-Disclosure Agreement (NDA) is needed before anyone spills...

    8✨
    View
  • Give your teams the clarity they need when it comes to handling and managing personal data. 

In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it and delete it.

Add this micromodule to theAnnual Refresher Course & Code Obligations Job Aid or pair with our Is this personal data? infographic, and deal with less data breaches and reports of misused data.

    Handling personal data (mini-module)

    Give your teams the clarity they need when it comes to handling and managing personal data.  In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it...

    7✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Social Media for Sensitive Projects

    Social Media for Sensitive Projects

    Don’t let your employees give away secret information for free. This handy decision tree shows employees the potential pitfalls of social media use while working on highly confidential matters. Postings pics, tagging coworkers/vendors, checking...

    8✨
    View
  • Quickly train your third parties on your org’s core values and expectations with this thorough and straightforward module.

    Third Party Code of Conduct Training

    Your third parties—like vendors, consultants, suppliers, and business partners—are essentially an extension of your org, so they need to know and uphold your standards. Share this practical module with them to make sure they get it. In about...

    12✨
    View
  • Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to ease some of your anxiety...  Prepare your employees for the integration with this one-pager that carefully lists everything to do (and not to do) premerger. Share this gun-jumping infographic for extra impact.

    Before a merger or acquisition...

    Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...

    8✨
    View
  • Interacting with clients and service providers

    Interacting with clients and service providers

    While treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...

    8✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View