Display:

Privacy

Job aids

  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.

    Insider threat red flags

    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...

    8✨
    View
  • Suspect a privacy breach?

    Suspect a privacy breach?

    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...

    8✨
    View
  • Gathering information for a personal data request

    Gathering information for a personal data request

    Expeditious Ex·pe·di·tious | /ˌekspəˈdiSHəs/ Definition : to do something with speed and efficiency How to use expeditious in a sentence:  This checklist helps your employees expeditiously gather and prepare information for...

    8✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • We protect our data

    We protect our data

    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...

    6✨
    View
  • Notify Privacy when mistakes happen

    Notify Privacy when mistakes happen

    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...

    6✨
    View
  • How to handle a personal data request

    How to handle a personal data request

    Charades is fun, but, when it comes to handling requests for personal data, the last thing you want is for employees to play guessing games. Remove the ambiguity with this nifty infographic. It reveals the types of data requests they might receive and...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • How to protect our data from imposters

    How to protect our data from imposters

    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers...

    8✨
    View
  • Can I use personal data for this purpose?

    Can I use personal data for this purpose?

    If COVID taught us one thing, it’s that we all like a good puzzle…occasionally. But when it comes to using personal data, there should be nothing puzzling about it. This decision tree helps your employees piece together when they CAN and...

    8✨
    View
  • Careful virtual communications

    Careful virtual communications

    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...

    8✨
    View
  • When should I contact the Privacy Team?

    When should I contact the Privacy Team?

    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...

    8✨
    View
  • Collecting sensitive personal data?

    Collecting sensitive personal data?

    Collecting consumer data is risky business. Your company needs this information to run, but your people should only be collecting what they absolutely need, and tracking those reasons. But do they know this? This nifty infographic makes sure your people...

    8✨
    View
  • We never collect sensitive personal data

    We never collect sensitive personal data

    Collecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...

    8✨
    View
  • Is this personal data?

    Is this personal data?

    Maintaining customer and employee privacy has always been important, but with GDPR, CCPA and other privacy regs across the globe, not only is it important—it’s also the law. Ensure your teams know what qualifies as “personal data”...

    8✨
    View
  • Handling Personal Information?

    Handling Personal Information?

    This easy-to-use chart covers what counts as personal information—and how to think through managing it. Handling personal information—whether it’s your customers’ or your own employees’—is risky, so help your...

    8✨
    View
  • Finalizing, Submitting, or Storing Company Records?

    Finalizing, Submitting, or Storing Company Records?

    This simple checklist helps employees keep good records without getting bogged down with trying to remember what to do. It’s easy to forget how vital recordkeeping is, but sometimes the mere act of insufficient documentation is itself a violation...

    6✨
    View
  • Want to collect customer data?

    Want to collect customer data?

    A handy infographic based on FTC guidance, this walks your teams through the main issues involved in collecting and using customer data. Rather than give hard-and-fast rules, this piece asks critical questions about the use of customer...

    8✨
    View