Use of Company Assets
-
When should I contact the Privacy Team?
Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...
8✨ -
Expense approval checklist
Give your team an easy-to-understand checklist for walking through the major issues when approving expense reports. Proper approval of expenses requires thoughtful reflection about what, exactly, your organization is paying for—something not...
8✨ -
🔥 Trending
Starting a side gig or second job?
Hobbies, interests, and secondary employment… OH MY! Side gigs—from hobbies-turned-hustles to volunteering and traditional employment—can sometimes be viewed as don’t-tell-anyone-or-you’ll-get-in-trouble pursuits, which is...
8✨ -
Notify Privacy when mistakes happen
Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...
6✨ -
4 ways bad guys get your password
This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
8✨ -
Suspect a privacy breach?
Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...
8✨ -
Third Parties Code of Conduct
Your third-parties are essential to your success, especially when they’re acting on your behalf. Keep everyone on the same page and avoid any nasty surprises with this concise infographic. Packed with practical guidance, it clearly outlines...
6✨ -
Insider threat red flags
Educate your employees on what insider threats are, where they come from, and some common red flag behaviors. This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
8✨ -
Going on a trip? Protect your data!
Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...
6✨