Hellow

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

A blue hexagon with people working on computers Description automatically generated.

Scene 2 (9s)

[Virtual Presenter] Introduction Welcome to our Company Guidelines and Rule Book Presentation. This comprehensive guide outlines the essential Do's and Don'ts that form the foundation of our workplace culture. By adhering to these principles we collectively contribute to a positive and successful environment. Let's explore the key aspects that shape our commitment to excellence and foster a thriving workplace community. Happy Working at IDC Technologies! © 2024 IDC Technologies. All rights reserved..

Scene 3 (37s)

[Audio] Note – For the purpose of this document IDC Technologies will be referred as the Company. Rule Mastery: Key Do's for a Positive Workplace Culture 01 Use information or data received from the Company solely for the purpose of providing services to the Company or its clients or other business partners. Restricted Data Usage: Service Provision Only 02 Use information or data received from Company solely to the extent authorized and not beyond the scope of authorization. Authorized Data Use: Adhere to Scope Limits 03 Use information only as authorized by the end-user or customer in their consent or the applicable privacy notice. Data Use: Adherence to End User or Customer Authorization Slide 1/6.

Scene 4 (1m 27s)

[Audio] Rule Mastery: Key Do's for a Positive Workplace Culture 04 Immediately report any unauthorized use or storage of Sensitive Confidential or Internal Information of Company or its clients or business partners. Prompt Reporting: Unauthorized Use or Storage of Confidential Information 05 Adhere with the applicable data privacy laws including General Data Protection Regulation (GDPR) policies rules and regulations of local and domestic laws which are duly applicable in the respective countries where the services by the employee have to be rendered. Adhere with the applicable data privacy laws 06 Securely shred documents containing Sensitive Information Confidential Information or other non-public information immediately once no longer needed Securely shred documents containing Sensitive Information Slide 2/6.

Scene 5 (1m 37s)

[Audio] 07 Proper shredding is required for all documentation including without limitation documentation used by people working from home or remotely. Proper shredding is required for all documentation 08 Use a shredding machine or third-party service to securely shred documents so that such information cannot practicably be read or reconstructed. Shredding machine or third-party service 09 Conduct reasonable due diligence and enter into a written contract with any third party that will be responsible for carrying out the above shredding requirements. Conduct reasonable due diligence 10 Exercise caution while accessing or displaying Sensitive Information or Confidential Information in public places. Handling Sensitive and Confidential Information Slide 3/6.

Scene 6 (1m 47s)

[Audio] 11 Lock all rooms cabinets briefcases or any other storage facilities for Sensitive Information or Confidential Information of Company or its clients or business partners – during breaks and overnight. Lock all rooms cabinets briefcases or any other storage 12 Clean each desk and put away all papers at the end of each working day. Daily Workspace Maintenance 13 Electronic Storage Devices may be used only if encrypted in accordance with best industry practices. Secure usage - Electronic Storage Devices 14 Keep updated internet security software and firewall protection on any desktop laptop or other Electronic Storage Device used to store information. Internet security software and firewall protection Slide 4/6.

Scene 7 (1m 57s)

[Audio] 15 Written approval must be received by the Company contact and Company’s Technology group prior to any transmission by Internet or any transfer of Sensitive Information or Confidential Information of Company or its clients or business partners from any Company system to any portable Electronic Storage Device. Approval Required: Secure Transmission of Sensitive Information via Internet or Portable Devices 16 Keep a written inventory of all Electronic Storage Devices that are used. Maintain Inventory 17 If any third party that will be responsible for carrying out the above destruction requirements conduct reasonable due diligence and enter into a written contract prior to providing any information to such party. Third party that will be responsible 18 If directed by the Company contact store all client information only on the designated shared folder and do not store such client information in a local drive or other Electronic Storage Device. Store all client information Slide 5/6.

Scene 8 (2m 7s)

[Audio] 19 At all times adhere to the Code of Ethics Policies of the Company. Code of Ethics Compliance 20 Show respect for your surroundings colleagues and seniors. Promoting Respect 21 Support flexible work arrangements for co-workers with different needs abilities /and or obligations. Encouraging Flexibility 22 Be open minded and listen when given constructive feedback regarding others’ perception of your conduct. Open-Mindedness 23 Talk to your immediate senior or HR for any wrong done with you. Reporting Wrongful Incidents Slide 6/6.

Scene 9 (2m 17s)

[Audio] Navigating No-Go Zones: Understanding Company Rules Don'ts 01 Do not disclose information or data to any third party without prior written approval from the contact at Company. Do not disclose information or data 02 Do not share Company or client information with unauthorized personnel – either within or outside Company (or its client) Do not share Company or Client Information 03 Do not contact any individuals for any purpose other than in connection with the authorized purpose of the services provided to the Company or its clients. Do not contact any individuals for any purpose 04 Do not broadcast the client’s logo name or disclose and disseminate any information including Intellectual Property rights as may be defined in the Employment Contract on any social media platform or to public at large. Do not broadcast the client’s information Slide 1/8.

Scene 10 (2m 27s)

[Audio] 05 Never place documents with Sensitive Information Confidential Information or other nonpublic information in the trash without first securely shredding them. Never place documents with Sensitive Information 06 Do not leave any key or paper with a password visible and unattended. Password visible and unattended 07 Do not just tear documents to shred them – use a shredding machine or third-party service. Shredding machine or third-party service 08 Do not leave any documents or print material unattended on printers or fax machines. Printers or fax machines Slide 2/8.

Scene 11 (2m 37s)

[Audio] 09 Do not print Sensitive Information or Confidential Information of Company or its clients or business partners without prior approval from client and the contact at Company. Printing Protocol 10 Do not tailgate or allow unauthorized entry into operations areas or designated secured areas. Security Protocol 11 Do not carry any Sensitive Information or Confidential Information of Company or its clients or business partners out of operations areas or other designated secured areas without approval from the contact at Company and if applicable Company’s Information Security group. Strict Guidelines for Handling Company Confidential Information 12 Do not use any Electronic Storage Device that is not encrypted in accordance with best industry standards unless the Company contact and Company’s Information Security group provide a written waiver of this encryption requirement. Ensuring Encryption Compliance for Electronic Storage Devices Slide 3/8.

Scene 12 (2m 47s)

[Audio] 13 Do not use portable Electronic Storage Devices to transfer client or Company Confidential Information unless specifically authorized in writing by the Company. Authorized Use of Portable Storage for Confidential Information 14 Do not leave data on an Electronic Storage Device used for transfer for any period longer than required to transfer the data and immediately delete data after transfer. Secure Data Management: Timely Transfer and Deletion Protocols 15 Do not save any of your personal information or any of your personal details in any of the IT Assets handed over to you by the Company. Company Policy: Avoiding Personal Information Storage on IT Assets 16 Do not destroy any Electronic Storage Device that stores Sensitive Confidential or Internal Information of Company or its clients or business partners. Preserving Sensitive Data: Avoid Destruction of Electronic Storage Devices Slide 4/8.

Scene 13 (2m 57s)

[Audio] 17 Do not permit any other person to remove any proprietary or other legends or restrictive notices contained in or included in any Confidential Information. Protecting Confidential Information: Preserving Notices and Legends 18 Do not indulge in publishing posting commenting or remarking publicly which leads to the discrimination with regard to any job openings or any services to be rendered to the Company or while performing or fulfilling the requirement for the Company’s client. Company Conduct: Avoid Discriminatory Remarks in Public Discourse 19 Do not pass any threats epithets slurs derogatory comments negative stereotyping or offensive jokes. Maintaining Respectful Communication 20 Do not ridicule insult belittle or show hostility to an individual or a group. Promoting Respectful Behavior Slide 5/8.

Scene 14 (3m 7s)

[Audio] 21 Do not get involve with drugs or alcohol during work hours. Workplace Policy 22 Do not indulge in any behavior of a sexual nature or other sex-based conduct affecting the dignity of men and women at – workplace. Maintaining Professional Conduct: Prohibition of Inappropriate Sexual Behavior in the Workplace 23 Do not indulge in nepotism or favoritism or biasness towards a particular individual or group for your advantage Fair Workplace Practices: Prohibiting Nepotism Favoritism and Bias 24 Do not share your laptop or any confidential information with any of your colleagues or coworkers. Confidentiality Guidelines Slide 6/8.

Scene 15 (3m 16s)

[Audio] 25 Do not without explicit approval of your HR carry any of the IT Assets handed over to you by the Company outside the geographic confines of the location you are placed by the virtue of your employment contract. Workplace Policy 26 Do not indulge in any posting of work-related matters or information on social media. Social Media Policy 27 Do not sign any document on behalf of the Company. Company Policy 28 Do not retaliate against any board member officer employee or volunteer who in good faith reports an ethics violation or a suspected violation of law such as a complaint of discrimination or suspected fraud or suspected violation of any regulation governing the operations of IDC. Whistleblower Protection: Non-Retaliation Policy for Ethics Violation Reports Slide 7/8.

Scene 16 (3m 26s)

[Audio] 29 Do not for a period of twelve (12) months during the term of employment and thereafter directly or indirectly through any other person firm corporation or other entity (whether as an officer director employee partner consultant holder of equity or debt investment lender or in any other manner or capacity): Non-Compete Clause: Restriction on Engagement for Twelve Months Post-Employment Solicit induce encourage or attempt to induce or encourage any employee or consultant of the Company to terminate his or her employment or consulting relationship with the Company or to breach any other obligation to the Company detrimental or prejudicial or adverse or harmful to the interest of the Company. 1) 2) Solicit interfere with disrupt alter or attempt to disrupt or alter the relationship contractual or otherwise between the Company and any other person including without limitation any consultant contractor customer potential customer or supplier of the Company; or in the event of the employee leaving IDC Technologies Solutions India Pvt Ltd. Slide 8/8.

Scene 17 (3m 36s)

[Audio] THANK YOU For any queries please reach us at [email id] © 2024 IDC Technologies. All rights reserved..