13.07.2015 Views

Victaulic Code of Conduct

Victaulic Code of Conduct

Victaulic Code of Conduct

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Protecting Company AssetsProtecting company assets against loss, theft and misuseis the responsibility <strong>of</strong> every employee. <strong>Victaulic</strong> assetsconsist <strong>of</strong> both tangible and intangible assets.Tangible Assets:• Facilities• Money• Equipment• Information SystemsIntangible Assets:• Intellectual property• Invention disclosure• Manufacturing know-how• Trade secrets• Computer programsThese assets must be used properly and as authorized bymanagement. Any suspected theft, fraud or inappropriateuse <strong>of</strong> the company’s assets should be reported to anemployee’s manager or your regional compliance <strong>of</strong>ficer.Assets should not be used for personal gain. However,we trust our employees with reasonable and permissibleactivities like calling home to check on a sick child,emailing a spouse to stop at the bank on the way home orprinting a simple grocery list on a company printer. Theseare reasonable and permissible because they are donewithin limits and work goals can still be accomplished.It becomes a problem when employees abuse companyassets for their personal use or gain. Taken too far, it caneven be considered theft or fraud.Use good judgment and ask your manager if you arenot sure.Computers and Data SecurityOnly <strong>Victaulic</strong> employees canaccess company systems.Third parties can accesssystems only if <strong>Victaulic</strong> IThas provided approval.Company supplied computers,telephones and mobile devicesare property <strong>of</strong> <strong>Victaulic</strong>. Alle-mail, voice mail and filesstored on <strong>Victaulic</strong> systems arecompany property.There should be no expectation<strong>of</strong> personal privacy inconnection with informationstored on company computersand systems.The company reserves theright and where permitted bylaw will monitor and review allinformation sent or receivedusing company resources.Use <strong>of</strong> company computers,networks, email or internetresources to access, view,transmit archive or distributeracist, sexist, threateningor otherwise objectionableor illegal material is strictlyprohibited.Using company resources toviolate laws or regulations <strong>of</strong>any nation is prohibited.An Example <strong>of</strong> Improper Use <strong>of</strong> Company Assets:Ron, a manufacturing manager, is on the board <strong>of</strong> alocal charity that is conducting a fundraising drive.He has asked his administrative assistant to organizethe event and to solicit companies in the area to makecontributions to support the organization.<strong>Victaulic</strong> awareness lineRefer to the ‘Our Company’section <strong>of</strong> <strong>Victaulic</strong>.com forspecific contact information.www.victaulic.com[ 5 ]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!