15.06.2014 Views

Communication on progress for the UN Global ... - Roland Berger

Communication on progress for the UN Global ... - Roland Berger

Communication on progress for the UN Global ... - Roland Berger

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Commitment<br />

implementati<strong>on</strong><br />

goals<br />

>> Principle 10: Businesses should work against corrupti<strong>on</strong><br />

in all its <strong>for</strong>ms, including extorti<strong>on</strong> and bribery.<br />

Our commitment<br />

As a leading strategy c<strong>on</strong>sultancy <strong>Roland</strong> <strong>Berger</strong> Strategy C<strong>on</strong>sultants is committed to operating<br />

with a clear c<strong>on</strong>science and speaking out against any and every <strong>for</strong>m of unethical behavior.<br />

Thus we assert our oppositi<strong>on</strong> to corrupti<strong>on</strong>, extorti<strong>on</strong> and bribery within our company or by<br />

outsiders.<br />

Current status of implementati<strong>on</strong><br />

Our Code of C<strong>on</strong>duct c<strong>on</strong>veys a clear understanding of ethical behavior and guides us in our<br />

day-to-day business decisi<strong>on</strong>s.<br />

To prevent any abuse all payments to freelancers or Senior Advisors are made via bank transfer,<br />

without excepti<strong>on</strong>. Fur<strong>the</strong>rmore, c<strong>on</strong>tracts <strong>for</strong> all <strong>Roland</strong> <strong>Berger</strong> freelancers have been<br />

standardized and <strong>the</strong>ir payment is c<strong>on</strong>trolled via "proApproval", a newly introduced tool <strong>for</strong><br />

avoiding disproporti<strong>on</strong>ate remunerati<strong>on</strong>. During our annual audit <strong>the</strong> c<strong>on</strong>tracts <strong>for</strong> Senior<br />

Advisors and all related payments are subject to strict scrutiny.<br />

PRODUCT RESPONSIBILITY<br />

DATA SECURITY<br />

To avoid potential c<strong>on</strong>flicts of interest am<strong>on</strong>gst clients' teams a steering body and strict<br />

guidelines in <strong>the</strong> <strong>for</strong>m of Chinese walls are in place. All employees must adhere to binding<br />

c<strong>on</strong>fidentiality rules, in accordance with both <strong>the</strong>ir employment c<strong>on</strong>tract and our Code of<br />

C<strong>on</strong>duct. Our clean desk policy is regularly checked in our German offices. E-learning courses<br />

are compulsory <strong>for</strong> all employees, to keep <strong>the</strong>m aware of <strong>the</strong> issue. Just like employees,<br />

freelancers also must adhere to our Code of C<strong>on</strong>duct and partake in <strong>the</strong> refresher trainings.<br />

We treat all our clients' n<strong>on</strong>-public in<strong>for</strong>mati<strong>on</strong> in strict c<strong>on</strong>fidentiality and keep proprietary and<br />

c<strong>on</strong>fidential in<strong>for</strong>mati<strong>on</strong> secure at all times. To ensure utmost security in all our electr<strong>on</strong>ic<br />

communicati<strong>on</strong>s, our in<strong>for</strong>mati<strong>on</strong> and communicati<strong>on</strong> equipment – IT infrastructure, hard- and<br />

software – fulfills highest security and technology standards. We operate our own IT security <strong>for</strong><br />

business communicati<strong>on</strong>, using encrypted notebooks and secure Blackberry smartph<strong>on</strong>es<br />

allowing <strong>for</strong> e-mail encrypti<strong>on</strong>. Fur<strong>the</strong>rmore, all <strong>Roland</strong> <strong>Berger</strong> employees have to know and<br />

comply with our IT User Policy which is part of <strong>the</strong> company's Code of C<strong>on</strong>duct and as such<br />

also subject of regular e-trainings. The IT User rules cover issues like password and access<br />

c<strong>on</strong>trol, data protecti<strong>on</strong>, installing and using IT-equipment, using e-mail and <strong>the</strong> Internet,<br />

mobile working or <strong>the</strong> protecti<strong>on</strong> against malware. We do not use public cloud programs,<br />

such as freeware provided by Yahoo!, Google or Skype <strong>for</strong> our business communicati<strong>on</strong>.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!