Display:

Use of Company Assets

Office Employees

  • Working remotely? Protect your data!

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • You are responsible for what you know - horizontal

    You are responsible for what you know - horizontal

    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...

    2✨
    View
  • Travel & expense red flags checklist

    Travel & expense red flags checklist

    Stop fraud and corruption risks in their tracks with this thorough checklist for reviewing T&E reports. Help your managers externalize their memory of procedures and red flags with this piece—they can focus on the harder questions when they...

    8✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Overseas Travel Module

    Overseas Travel Module

    Behold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...

    15✨
    View
  • Lock it down

    Lock it down

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Away from your computer?

    Away from your computer?

    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.

    2✨
    View
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid.

    Careful virtual communications (mini-module)

    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...

    8✨
    View
  • No inappropriate websites at work (phone version) - horizontal

    No inappropriate websites at work (phone version) - horizontal

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • No inappropriate websites at work (phone version)

    No inappropriate websites at work (phone version)

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • Lock it down - horizontal

    Lock it down - horizontal

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Protect your password!

    Protect your password!

    Give your folks these simple rules to lock down their passwords—and protect your info.

    2✨
    View
  • Laptop get swiped? Report it!

    Laptop get swiped? Report it!

    Make sure your folks know that when their tech is stolen, call the company—now.

    2✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View