Display:

Use of Company Assets

Job aids

  • Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool, which neatly contrasts the DOs and DON’Ts of remote working. That way, your people are crystal clear on what they need to do to protect company assets.

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • Watch out for red flags from third parties

    Watch out for red flags from third parties

    Do your employees know what to look out for when managing third parties? This piece supports their due diligence efforts by covering the five red flags they need to spot and tell you about ASAP!

    8✨
    View
  • Basic Code of Conduct Obligations

    Basic Code of Conduct Obligations

    This general guide is a quick reminder (with tips!) of day-to-day things that every employee needs to know, including how each of us has responsibilities related to ethics and compliance. Meant as a refresher and thought-provoker, this piece...

    8✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • Anatomy of a strong password

    Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • What counts as personal data to one person might be meaningless info to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how.
In five simple steps, it guides them through  what documentation and approvals must be in order before anything goes outside the company. That way, they’ll know if it’s ok to hit “send” or if they’ll need to check with the Privacy Team first.
Clarity + consistency = privacy cure all

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping hands—from everyday slip-ups (like sending a private email to the wrong person) to stuff they stumble upon (like finding confidential info lying around).
Share this with your people so they know exactly when and how to escalate a privacy issue when it happens.

    Notify Privacy when mistakes happen

    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...

    6✨
    View
  • Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training and have a Chief Privacy Officer. But — do your people know who to contact if they have questions about Privacy?

This job aid outlines when your employees should reach out to you — like if they receive a customer request or need to make a business change related to data.

    When should I contact the Privacy Team?

    Living your values means ensuring data privacy throughout your org. You’ve written all the policies, operationalized training, and have a Chief Privacy Officer. But do your people know when to pick up the phone and contact the Privacy Team? This...

    8✨
    View
  • Your employees will appreciate this clear guidance on how to participate in political activities without breaking the rules.
While political debates are best left to awkward family dinners—let’s face it—personal views are bound to come up in the workplace. And that’s fine as long as the boundaries are defined. This piece does just that by neatly framing what’s OK and what’s totally off limits. Metaphoric guardrails!

    Taking an active role in politics?

    Your employees will appreciate this clear guidance on how to participate in political activities without breaking the rules. While political debates are best left to awkward family dinners—let’s face it—personal views are bound to come...

    8✨
    View
  • Approving employee transfers?

    Approving employee transfers?

    Transfers aren’t simply logistics—they involve trade, IT, and ethics issues, too. Use this simple checklist to confirm relevant issues have been vetted before the employee is already at their new desk. Not only does this piece work across...

    8✨
    View
  • Suspect a privacy breach?

    Suspect a privacy breach?

    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...

    8✨
    View
  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • Departing Employee checklists

    Departing Employee checklists

    Employees departing may be routine nowadays, and that's exactly why you need these checklists. Make sure you and your teams get what you need before the employee is out the door! We created two checklists for completion—one for the employee, one...

    8✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View