Display:

Use of Company Assets

  • Working remotely? Protect your data!

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • Watch out for red flags from third parties

    Watch out for red flags from third parties

    Do your employees know what to look out for when managing third parties? This piece supports their due diligence efforts by covering the five red flags they need to spot and tell you about ASAP!

    8✨
    View
  • Basic Code of Conduct Obligations

    Basic Code of Conduct Obligations

    This general guide is a quick reminder (with tips!) of day-to-day things that every employee needs to know, including how each of us has responsibilities related to ethics and compliance. Meant as a refresher and thought-provoker, this piece...

    8✨
    View
  • Annual Refresher Course & Code Obligations Job Aid

    Annual Refresher Course & Code Obligations Job Aid

    Still stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...

    30✨
    View
  • Module: Annual Refresher Course

    Module: Annual Refresher Course

    Still stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...

    25✨
    View
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.

    How to use AI Chatbots at work

    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...

    6✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Notify Privacy when mistakes happen

    Notify Privacy when mistakes happen

    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...

    6✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Module: Personal Data & Privacy

    Module: Personal Data & Privacy

    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...

    15✨
    View
  • When should I contact the Privacy Team?

    When should I contact the Privacy Team?

    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...

    8✨
    View
  • Taking an active role in politics?

    Taking an active role in politics?

    Your employees will appreciate this clear guidance on how to participate in political activities without breaking the rules. While political debates are best left to awkward family dinners—let’s face it—personal views are bound to come...

    8✨
    View
  • Anatomy of a strong password

    Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • If someone asks for your password, report it!

    If someone asks for your password, report it!

    Prepare your team to be smarter than the scammers by reminding them to never give their passwords over the phone.

    2✨
    View
  • Destroy It Securely

    Destroy It Securely

    This simple graphic instructs your team that shredding—not the trash can—is how you get rid of docs securely.

    2✨
    View
  • This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters. 

It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and closes with one major way employees can keep data safe. A perfect assortment of bite-sized privacy tidbits! 

Hungry for more? Order the We protect our data, Finalizing, Submitting, or Storing Company Records?, 4 ways bad guys get your password or Working remotely? Protect your data job aids for the whole enchilada.

    Video: We protect our data

    This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters.  It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and...

    10✨
    View
  • Video: Attending a conference?

    Video: Attending a conference?

    Prepare your employees to avoid the risks associated with attending external events using this short, targeted training video (1:20). In 80 seconds, your folks will know which conversation topics are off-limits, how to trust their gut when it comes to...

    7✨
    View
  • Give your teams the clarity they need when it comes to handling and managing personal data. 

In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it and delete it.

Add this micromodule to theAnnual Refresher Course & Code Obligations Job Aid or pair with our Is this personal data? infographic, and deal with less data breaches and reports of misused data.

    Handling personal data (mini-module)

    Give your teams the clarity they need when it comes to handling and managing personal data.  In eight brief slides, this deck gives employees an overview of how to identify personal data, then walks them through how to use it, handle it, store it...

    7✨
    View
  • Video: Watch out for red flags from third parties

    Video: Watch out for red flags from third parties

    In this short, targeted training video (1:45), employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with government officials or...

    10✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Make sure you have permission

    Make sure you have permission

    Get straight to the point with this graphic: If you don’t have permission—or don’t know if you have permission—contact the Privacy Team.

    2✨
    View
  • Use your own resources - horizontal

    Use your own resources - horizontal

    Remind your team that politics aren't banned at the office, but folks should use their own time and resources when showing political support.

    2✨
    View
  • Overseas Travel Module

    Overseas Travel Module

    Behold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...

    15✨
    View