Display:

Use of Company Assets

  • Equip your teams with the strategic soft skills they need to engage in tough conversations with this short contrasting-examples video (2:15).

    Video: Careful Communications

    Give your teams clear guidance on the do’s and don’ts of virtual communications with this short video (2:15). In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the...

    8✨
    View
  • Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to ease some of your anxiety...  Prepare your employees for the integration with this one-pager that carefully lists everything to do (and not to do) premerger. Share this gun-jumping infographic for extra impact.

    Before a merger or acquisition...

    Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...

    8✨
    View
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid.

    Careful virtual communications (mini-module)

    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • No inappropriate websites at work (phone version) - horizontal

    No inappropriate websites at work (phone version) - horizontal

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • No inappropriate websites at work (phone version)

    No inappropriate websites at work (phone version)

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • No inappropriate websites at work (desk version) - horizontal

    No inappropriate websites at work (desk version) - horizontal

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.

    2✨
    View
  • No inappropriate websites at work (desk version)

    No inappropriate websites at work (desk version)

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.

    2✨
    View
  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • Lock it down - horizontal

    Lock it down - horizontal

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Harassment: Cyberbullying

    Harassment: Cyberbullying

    “Stop being a jerk on Facebook, Caitlyn.” But like, in a fun campaign format. Using collateral you can print in multiple formats (screensavers, posters, mousepads, and coasters), this campaign drives home the simple message that your company...

    12✨
    View
  • Harassment: Inappropriate Computer Usage

    Harassment: Inappropriate Computer Usage

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful. Everyone “knows” they’re not supposed to look at dirty...

    12✨
    View
  • Travel & expenses training module for managers

    Travel & expenses training module for managers

    This simple visual guide shows your management team how to quickly identify any impermissible expenses prior to approving payment. This visual guide syncs up with our deep-dive travel and expense checklist. Each page expands on one of the 24 checklist...

    15✨
    View
  • Lock it down

    Lock it down

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Only approve known expenses

    Only approve known expenses

    Remind your employees that vague details in expense reports aren't harmless—they could be hiding fraud or bribes.

    2✨
    View
  • Protect your password!

    Protect your password!

    Give your folks these simple rules to lock down their passwords—and protect your info.

    2✨
    View
  • Away from your computer?

    Away from your computer?

    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.

    2✨
    View
  • Laptop get swiped? Report it!

    Laptop get swiped? Report it!

    Make sure your folks know that when their tech is stolen, call the company—now.

    2✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View