Skip to main content
Filters & Sort
  • What happens when I make a disclosure?
    What happens when I make a disclosure?
    Employees are hesitant to disclose their personal interests for a conflict review because they’re worried they’ll be in trouble, have to ditch their side gig, or who will see their personal information. Eliminate the uncertainty of...
    8✨Tokens
  • Insider Trading Basics
    Insider Trading Basics
    Gordon Gekko may think that greed is good, but your company doesn't when it comes to insider trading. Educate your employees on the basics with this graphic piece. Aimed at a general audience, this piece lays out three common categories of material...
    8✨Tokens
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.
    How to use AI Chatbots at work
    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...
    6✨Tokens
  • When should I contact the Privacy Team?
    When should I contact the Privacy Team?
    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...
    8✨Tokens
  • We protect our data
    We protect our data
    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...
    6✨Tokens
  • This clever infographic reveals the five most common bribery tactics so your people can easily spot bribery attempts and notify you ASAP.
    How to tell if someone’s asking for a bribe
    Since shady people rarely come out and say, “pay this bribe,” it can be tricky to know when someone’s asking for one. especially when it involves non-monetary favors and sharing information. This clever infographic reveals the five...
    8✨Tokens
  • Notify Privacy when mistakes happen
    Notify Privacy when mistakes happen
    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...
    6✨Tokens
  • Would you trade on it?
    Would you trade on it?
    This graphic guide simplifies the types of information that should be protected to avoid insider trading. Without getting too far in the weeds of securities terminology (woof), this piece highlights common categories of material non-public...
    6✨Tokens
  • Knowing what qualifies as a business record and needs to be maintained can be tricky. Unravel the mystery and avoid confusion with this infographic.
    What is a business record?
    Good records management keeps your business running smoothly, but knowing what qualifies as a business record and needs to be maintained can be tricky. Unravel the mystery and avoid confusion with this most excellent infographic.  It starts with...
    8✨Tokens
  • What to expect during an internal investigation
    What to expect during an internal investigation
    Investigations often make employees anxious, even if they’re not the subject of any allegations. And when emotions run high, their brains stop processing all the info you are sharing with them. So, instead of hoping they remember all the stuff you...
    8✨Tokens
  • Want to collect customer data? Want to collect customer data?
    Want to collect customer data?
    A handy infographic based on FTC guidance, this walks your teams through the main issues involved in collecting and using customer data. Rather than give hard-and-fast rules, this piece asks critical questions about the use of customer...
    8✨Tokens
  • Suspect a privacy breach?
    Suspect a privacy breach?
    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...
    8✨Tokens
  • Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law).
 
Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits with folks from the other company—like pricing, contract terms, territories, product innovation, or any other strategic plans. That way, you’ll know they’re conducting business the right way and your integration won’t get disrupted by an honest, but illegal, mistake. 

For greater impact, follow this up with our before an integration job aid.
    What not to discuss during a merger
    Joining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...
    6✨Tokens
  • Mark it, protect it
    Mark it, protect it
    Making sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...
    6✨Tokens
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.
    Insider threat red flags
    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
    8✨Tokens
  • We never collect sensitive personal data
    We never collect sensitive personal data
    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...
    8✨Tokens
  • Going on a trip? Protect your data!
    Going on a trip? Protect your data!
    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...
    6✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products