Skip to main content
Filters & Sort
  • This delightfully concise infographic explains what IP is, how to avoid misusing it, and ways to safeguard assets without overwhelming.
    Respecting Others’ IP
    Don’t bore your team with the complexities of intellectual property (IP). Instead, use this delightfully concise infographic to explain it all in simple terms without overwhelming. Whether folks are creating presentations, marketing content, or...
    6✨Tokens
  • Equip your teams with the strategic soft skills they need to engage in tough conversations with this short contrasting-examples video (2:15).
    Video: Careful Communications
    Give your teams clear guidance on the do’s and don’ts of virtual communications with this short video. In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the audience, the...
    8✨Tokens
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid. Careful virtual communications (mini-module) Careful virtual communications (mini-module) Careful virtual communications (mini-module)
    Careful virtual communications (mini-module)
    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...
    8✨Tokens
  • Careful virtual communications
    Careful virtual communications
    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...
    8✨Tokens
  • No inappropriate websites at work (phone version)
    No inappropriate websites at work (phone version)
    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...
    2✨Tokens
  • Submitting a Timesheet?
    Submitting a Timesheet?
    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...
    8✨Tokens
  • Working remotely? Protect your data!
    Working remotely? Protect your data!
    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...
    8✨Tokens
  • Lock it down - horizontal
    Lock it down - horizontal
    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.
    2✨Tokens
  • You are responsible for what you know - horizontal
    You are responsible for what you know - horizontal
    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...
    2✨Tokens
  • Harassment: Cyberbullying
    Harassment: Cyberbullying
    “Stop being a jerk on Facebook, Caitlyn.” But like, in a fun campaign format. Using collateral you can print in multiple formats (screensavers, posters, mousepads, and coasters), this campaign drives home the simple message that your company...
    12✨Tokens
  • Harassment: Inappropriate Computer Usage
    Harassment: Inappropriate Computer Usage
    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful. Everyone “knows” they’re not supposed to look at dirty...
    12✨Tokens
  • Lock it down
    Lock it down
    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.
    2✨Tokens
  • 4 ways bad guys get your password
    4 ways bad guys get your password
    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
    8✨Tokens
  • Protect your password!
    Protect your password!
    Give your folks these simple rules to lock down their passwords—and protect your info.
    2✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Going on a trip? Protect your data!
    Going on a trip? Protect your data!
    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...
    6✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products