-
Third Party Code of Conduct TrainingYour third parties—like vendors, consultants, suppliers, and business partners—are essentially an extension of your org, so they need to know and uphold your standards. Share this practical module with them to make sure they get it. In about...12✨Tokens
-
Module: Annual Refresher CourseStill stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...25✨Tokens
-
Before a merger or acquisition...Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...8✨Tokens
-
Data Processing Agreement checklistEveryone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...8✨Tokens
-
Use your own resources - horizontalRemind your team that politics aren't banned at the office, but folks should use their own time and resources when showing political support.2✨Tokens
-
Harassment: Cyberbullying“Stop being a jerk on Facebook, Caitlyn.” But like, in a fun campaign format. Using collateral you can print in multiple formats (screensavers, posters, mousepads, and coasters), this campaign drives home the simple message that your company...12✨Tokens
-
Overseas Travel ModuleBehold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...15✨Tokens
-
Use your own resourcesRemind your team that politics aren't banned at the office, but folks should use their own time and resources when showing political support.2✨Tokens
-
Lock it downThis simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.2✨Tokens
-
Protect your password!Give your folks these simple rules to lock down their passwords—and protect your info.2✨Tokens
-
Away from your computer?Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.2✨Tokens
-
NEWVideo: Starting a side gig?This short video explains your policy on outside work in simple terms. Like, how doing volunteer work on the weekend is usually fine, but secretly working for our competitor? Not so much. The big takeaway here is folks need to be upfront about their...8✨Tokens
-
Is that QR code safe?Everywhere you look there’s a QR code begging to be scanned, but it's not always clear what lurks behind those mysterious black and white patterns. Help your teams stay vigilant with this ingenious awareness material, which calls out red flags in...4✨Tokens
-
Respecting Others’ IPDon’t bore your team with the complexities of intellectual property (IP). Instead, use this delightfully concise infographic to explain it all in simple terms without overwhelming. Whether folks are creating presentations, marketing content, or...6✨Tokens
-
Third Parties Code of ConductYour third-parties are essential to your success, especially when they’re acting on your behalf. Keep everyone on the same page and avoid any nasty surprises with this concise infographic. Packed with practical guidance, it clearly outlines...6✨Tokens
-
Insider threat red flagsEducate your employees on what insider threats are, where they come from, and some common red flag behaviors. This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...8✨Tokens
-
Careful virtual communications (mini-module)Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. In seven brief slides, this deck gives your employees everything they need to...8✨Tokens
-
No inappropriate websites at work (phone version) - horizontalEveryone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...2✨Tokens
-
No inappropriate websites at work (phone version)Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...2✨Tokens
-
No inappropriate websites at work (desk version) - horizontalNo matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.2✨Tokens
-
No inappropriate websites at work (desk version)No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.2✨Tokens
-
Submitting a Timesheet?Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...8✨Tokens
-
Lock it down - horizontalThis simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.2✨Tokens
-
Harassment: Inappropriate Computer UsageNo matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful. Everyone “knows” they’re not supposed to look at dirty...12✨Tokens