Skip to main content
Filters & Sort
  • Received a request to transfer data?
    Received a request to transfer data?
    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...
    8✨Tokens
  • Only dolphins make breaches cool
    Only dolphins make breaches cool
    If you’re a dolphin, keep doing you, you majestic being! If you’re not a dolphin—and you don’t work with them—use this graphic to make your point: Avoid a data breach by contacting the Privacy Team whenever you have...
    2✨Tokens
  • Make sure you have permission
    Make sure you have permission
    Get straight to the point with this graphic: If you don’t have permission—or don’t know if you have permission—contact the Privacy Team.
    2✨Tokens
  • We protect our data
    We protect our data
    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...
    6✨Tokens
  • Notify Privacy when mistakes happen
    Notify Privacy when mistakes happen
    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...
    6✨Tokens
  • Data Processing Agreement checklist
    Data Processing Agreement checklist
    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
    8✨Tokens
  • Can I use personal data for this purpose?
    Can I use personal data for this purpose?
    If COVID taught us one thing, it’s that we all like a good puzzle…occasionally. But when it comes to using personal data, there should be nothing puzzling about it. This decision tree helps your employees piece together when they CAN and...
    8✨Tokens
  • Careful virtual communications
    Careful virtual communications
    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...
    8✨Tokens
  • When should I contact the Privacy Team?
    When should I contact the Privacy Team?
    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...
    8✨Tokens
  • We never collect sensitive personal data
    We never collect sensitive personal data
    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...
    8✨Tokens
  • What happens when I make a disclosure?
    What happens when I make a disclosure?
    Employees are hesitant to disclose their personal interests for a conflict review because they’re worried they’ll be in trouble, have to ditch their side gig, or who will see their personal information. Eliminate the uncertainty of...
    8✨Tokens
  • Interacting with clients and service providers
    Interacting with clients and service providers
    While treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...
    8✨Tokens
  • Conference room combo - horizontal
    Conference room combo - horizontal
    Gary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Star Wars fanfic that he forgot...and now your engineering data's been leaked. Help all your Garys keep it together with these...
    2✨Tokens
  • Having a video call? - horizontal
    Having a video call? - horizontal
    Computer and phone cameras are everywhere, and your critical info is spread on boards and papers throughout your workplace—including at home. This simple graphic reminds the team to pay attention to their surroundings so they don’t...
    2✨Tokens
  • Having a video call?
    Having a video call?
    Computer and phone cameras are everywhere, and your critical info is spread on boards and papers throughout your workplace—including at home. This simple graphic reminds the team to pay attention to their surroundings so they don’t...
    2✨Tokens
  • Had a meeting? - horizontal
    Had a meeting? - horizontal
    Gary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Star Wars fanfic that he forgot...and now your engineering data's been leaked. Help all your Garys keep it together with this...
    2✨Tokens
  • Had a meeting?
    Had a meeting?
    Gary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Star Wars fanfic that he forgot...and now your engineering data's been leaked. Help all your Garys keep it together with this...
    2✨Tokens
  • What to expect during an internal investigation
    What to expect during an internal investigation
    Investigations often make employees anxious, even if they’re not the subject of any allegations. And when emotions run high, their brains stop processing all the info you are sharing with them. So, instead of hoping they remember all the stuff you...
    8✨Tokens
  • Video: Before You Post
    Video: Before You Post
    In this short, targeted training video (less than 90 seconds), employees will learn how to steer clear of work-related hazards on social media. Like a trusty Driver’s Ed instructor, we’ll talk your employees through how to think proactively,...
    8✨Tokens
  • Preparing to gather competitive intelligence?
    Preparing to gather competitive intelligence?
    While going undercover and being a super sleuth sounds like fun, it’s not something you want your employees doing to sniff out what your competitors are up to. Use this piece to explain the right way to gather information and what’s totally...
    8✨Tokens
  • Working remotely? Protect your data!
    Working remotely? Protect your data!
    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...
    8✨Tokens
  • Do you know your third parties? - horizontal
    Do you know your third parties? - horizontal
    When managing third party relationships, clarity is key. This on-point graphic serves as a simple reminder of what things your employees need to be aware of to make sure everyone is on the same page.
    3✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products