Featured Products
-
Video: It takes all of us to stop human trafficking
In this short, targeted training video (1:23), employees will learn how to identify the red flags of human trafficking when working with other companies. First we’ll explain what to look for, like...
8✨ -
4 ways bad guys get your password
This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s...
8✨ -
Respecting Others’ IP
Don’t bore your team with the complexities of intellectual property (IP). Instead, use this delightfully concise infographic to explain it all in simple terms without overwhelming. Whether folks are...
6✨
Job aids
Checklists
InfoSec Team
-
Data Processing Agreement checklist
Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
8✨ -
Handling Personal Information?
This easy-to-use chart covers what counts as personal information—and how to think through managing it. Handling personal information—whether it’s your customers’ or your own employees’—is risky, so help your...
8✨ -
Approving employee transfers?
Transfers aren’t simply logistics—they involve trade, IT, and ethics issues, too. Use this simple checklist to confirm relevant issues have been vetted before the employee is already at their new desk. Not only does this piece work across...
8✨