Display:

Confidentiality

Job aids

  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • Mark it, protect it

    Mark it, protect it

    Making sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...

    6✨
    View
  • Social Media for Sensitive Projects

    Social Media for Sensitive Projects

    Don’t let your employees give away secret information for free. This handy decision tree shows employees the potential pitfalls of social media use while working on highly confidential matters. Postings pics, tagging coworkers/vendors, checking...

    8✨
    View
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.

    Insider threat red flags

    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...

    8✨
    View
  • We never collect sensitive personal data

    We never collect sensitive personal data

    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...

    8✨
    View
  • Interacting with clients and service providers

    Interacting with clients and service providers

    While treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...

    8✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View