Search Video Library (388 Assets Found)

Results for Learning Path: Ethics & Compliance

  • Cybersecurity is serious business. Millions of dollars are lost each day to cyber crime. Sometimes you hear about it in the news… most of the time you don’t. The four dramatic situations (and information) presented in Avoiding the Scam! tackle the most common gap companies often face in the war against cyber-attacks... the human factor.

    #1 ID:2578
    Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Off-The-Shelf Video Program (ILT) Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Learning Reinforcement, Workplace Safety & Awareness Closed Captioned
  • JUST RELEASED! Your organization probably operates at a fast pace—which means real choices have to be made quickly by employees, team members, managers and others... every day. And every time they make a choice, they hold the future well-being of your organization in their hands. A.C.T. with Integrity™ is a proven tool and model for helping people learn how to “do the right thing, for the right reasons, in the right way.”

    #2 ID:2600
    Topic: Ethics Learning Path: Ethics & Compliance Type: Off-The-Shelf Video Program (ILT) Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Communication, Compliance, Interpersonal Skills, Leadership, Onboarding, Professionalism Closed Captioned
  • Third-party sexual harassment occurs when someone outside of the employer's organization harasses an employee in or outside the workplace. Such third parties may include customers, vendors, consultants, or anyone that the employer has a business relationship with. This video also highlights the active bystander/ally concept.

    #3 ID:2508
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Abusive Conduct, Active Bystander / Ally, Harassment Prevention, Professionalism, Workplace Civility Closed Captioned
  • Joking can make the workplace fun, but it is also an area that can easily cross the line from being inappropriate to being illegal. People who work together sometimes engage in ‘harmless flirting’. As long as that behavior is welcome for those who are flirting, and those who are around to see it, it isn’t sexual harassment. When someone changes their mind, however, the welcomeness ends, and it’s time to stop.

    #4 ID:2511
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Abusive Conduct, Harassment Prevention, Professionalism, Workplace Civility Closed Captioned
  • Quid pro quo sexual harassment occurs when an employee's supervisor, manager, or someone else in authority offers or suggests that an employee will be given something, such as a raise or promotion, in exchange for some sort of sexual favor. This also includes refusing someone a promotion.

    #5 ID:2510
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Abusive Conduct, Harassment Prevention, Interpersonal Skills, Professionalism, Workplace Civility Closed Captioned
  • Sexual harassment can take place anywhere. Any gender can unlawfully harass another other gender. Women can harass men, women, and transgender people; men can harass women, men, and transgender people; and transgender people can harass men, women, and transgender people.

    #6 ID:2513
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Abusive Conduct, Harassment Prevention, Interpersonal Skills, Professionalism, Workplace Civility Closed Captioned
  • What do you do when a co-worker (or employee) takes compromising pictures of fellow worker and decides to post them on social media? Are you prepared for the fallout? Understanding how this behavior could be the basis of disciplinary action and even a hostile environment sexual harassment lawsuit.

    #7 ID:2509
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Abusive Conduct, Harassment Prevention, Interpersonal Skills, Professionalism, Workplace Civility Closed Captioned
  • Could you recognize how an unwelcome pursuit can become harassing behavior? What if it was a manager pursuing an employee? Inappropriate or illegal?

    #8 ID:2507
    Topic: Sexual Harassment Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Harassment Prevention, Professionalism, Workplace Civility Closed Captioned
  • Conflicts between our obligations to friends and the organization can make decisions difficult; in those situations, we must let the law and the organization’s policy be our guide. Confidential information must always remain confidential. So, the bottom line is, we all have a responsibility to know and follow the organization’s policy on handling confidential information.

    #9 ID:2608
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • Fraudsters have a huge toolkit of tricks to pull from. Let's take a case of social engineering – also known as phishing. Hackers can take advantage of the fact that a company is engaged in a merger and/or acquisition, and can target employees who are responsible for personally identifiable information with emails that appeared to be from others within the organization. It happens all the time... especially when policies and procedures are not followed.

    #10 ID:2579
    Topic: Cybersecurity Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned
  • Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.

    #11 ID:2580
    Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned
  • It's important not to skip processes or procedures when dealing with wire transfers, invoice payments and personally identifiable information. It only takes one missed step in the process to cause lots of financial devastation within an organization. And... Never. Ever. Share system passwords with other employees. That's just an big accident waiting to happen!

    #12 ID:2581
    Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned
  • We all want to help our customers or vendors... but a fake email (or an unconfirmed phone call) can get the organization into some real trouble. It only takes one missed step in the process to cause lots of financial devastation. Cyber attacks are increasing each and every day. If your employees don't know how to spot a bad email - or more importantly - ignore organizational policies and procedures when it comes to security, chances are, you're going to get scammed.

    #13 ID:2582
    Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned
  • We must be careful not to participate in any activities where our personal interests or actions might interfere or compete with our obligation to the organization. Even the appearance of a conflict of interest can create problems for ourselves and our organizations. So, the bottom line is, we all have a responsibility to know and follow the organization’s policy on dealing with conflicts of interest.

    #14 ID:2609
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • Sensitive information left out on a desk can easily be taken by thieving hands and seen by prying eyes. All sensitive and confidential information should be securely stored – especially things like system passwords. The bottom line is simple. You need to know and follow the organization’s secure/sensitive information policies and procedures – especially when it comes to passwords. Cybersecurity policies are not to be taken lightly.

    #15 ID:2610
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Cybersecurity Closed Captioned
  • Time theft hurts the company. A recent study estimates that it costs U.S. employers more than $400 billion per year in lost productivity. Five to ten minutes here and there add up to big losses over time. So, the bottom line is, we all have a responsibility to know and follow the organization’s policy on our work responsibilities. Remember, it doesn't matter if 'everybody's doing it’... simply put, it breaks trust.

    #16 ID:2611
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • To summarize, business documents (including paper files, reports emails and electronic files) need to be retained in accordance with the law and organization requirements/policies. And, if documents are destroyed improperly, it can result in serious problems for the organization and the individual. So, the bottom line is, we all have a responsibility to know and follow the organization’s policy on document retention and destruction.

    #17 ID:2612
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • In most organizations, managers and supervisors have an obligation to help employees resolve business practice or compliance concerns. Remember, all reports of violations must be taken seriously, and appropriate action taken in a timely manner. Again, no matter what our role in the organization—we all have a responsibility to know and follow the organization’s policy on handling reports of violations.

    #18 ID:2613
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • Interactions with auditors, inspectors, or investigators—internal or external—must be conducted in an open, honest, and ethical manner. And all information provided to auditors, inspectors or investigators must be accurate and truthful. There can be no exceptions, which mean the bottom line is, we all have a responsibility to know and follow the organization’s policy on providing accurate information.

    #19 ID:2614
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned
  • We all know that situations where we’re trying to win business put a lot of pressure on everyone involved. And we also know that comparing our products and services to the competition must be done in a truthful manner. The bottom line is, we all have a responsibility to know and follow the organization’s policies relating to how we talk about our competitors.

    #20 ID:2615
    Topic: Ethics Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance Closed Captioned