Skip to main content
Filters & Sort
  • Make sure you have permission
    Make sure you have permission
    Get straight to the point with this graphic: If you don’t have permission—or don’t know if you have permission—contact the Privacy Team.
    2✨Tokens
  • Data Processing Agreement checklist
    Data Processing Agreement checklist
    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
    8✨Tokens
  • Interacting with clients and service providers
    Interacting with clients and service providers
    While treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...
    8✨Tokens
  • Video: Before You Post
    Video: Before You Post
    In this short, targeted training video (less than 90 seconds), employees will learn how to steer clear of work-related hazards on social media. Like a trusty Driver’s Ed instructor, we’ll talk your employees through how to think proactively,...
    8✨Tokens
  • Every employee is responsible for - horizontal
    Every employee is responsible for - horizontal
    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course, Basic Code of Conduct Obligations infographic, and corresponding...
    2✨Tokens
  • Overseas Travel Module Overseas Travel Module Overseas Travel Module Overseas Travel Module
    Overseas Travel Module
    Behold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...
    15✨Tokens
  • Conference Room kit Conference Room kit Conference Room kit Conference Room kit
    Conference Room kit
    Gary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Game of Thrones fanfic that he forgot...and now your engineering data's been leaked. Help all your Garys keep it together with...
    12✨Tokens
  • Mark it, protect it
    Mark it, protect it
    Making sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...
    6✨Tokens
  • Report unattended information
    Report unattended information
    Make sure each employee knows their responsibility to look out for sensitive info being left around—and if they find some, raise it to management.
    2✨Tokens
  • Lock it down
    Lock it down
    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.
    2✨Tokens
  • Social Media for Sensitive Projects
    Social Media for Sensitive Projects
    Don’t let your employees give away secret information for free. This handy decision tree shows employees the potential pitfalls of social media use while working on highly confidential matters. Postings pics, tagging coworkers/vendors, checking...
    8✨Tokens
  • Protect your password!
    Protect your password!
    Give your folks these simple rules to lock down their passwords—and protect your info.
    2✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Shred it! (blue version) Shred it! (blue version)
    Shred it! (blue version)
    It's not hard, but it can be boring. Use this super-graphic piece to remind your team to shred confidential information—each and every time.
    2✨Tokens
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.
    Insider threat red flags
    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
    8✨Tokens
  • Three simple questions guide your employees through whether it’s OK to share info freely or they need an NDA before spilling the company beans.
    Do you need to get an NDA signed?
    Ever wonder if something you're about to share needs to be kept hush-hush? This handy guide is here to help! Think of it like a three-question quiz: answer yes or no, and it'll tell you if a Non-Disclosure Agreement (NDA) is needed before anyone spills...
    8✨Tokens
  • Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office.

Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us before keying in a password or checking if our work is visible in the background of our virtual meeting. These signs serve as friendly reminders to your folks that even the smallest actions play a role in keeping info secure.
    Awareness Campaign: Around the workplace
    Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...
    8✨Tokens
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid. Careful virtual communications (mini-module) Careful virtual communications (mini-module) Careful virtual communications (mini-module)
    Careful virtual communications (mini-module)
    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...
    8✨Tokens
  • Only dolphins make breaches cool
    Only dolphins make breaches cool
    If you’re a dolphin, keep doing you, you majestic being! If you’re not a dolphin—and you don’t work with them—use this graphic to make your point: Avoid a data breach by contacting the Privacy Team whenever you have...
    2✨Tokens
  • We never collect sensitive personal data
    We never collect sensitive personal data
    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...
    8✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products