Protecting customer information

Slides:



Advertisements
Similar presentations
ETHICS AS CULTURE KEY ELEMENTS Stage One (primary) – Key Elements of a Culture of Ethics Appoint an ethics program manager to oversee your ethics-related.
Advertisements

4.02 Compliance Training Brian A. Dahl Senior Counsel Takeda Pharmaceuticals North America, Inc. November 14, 2003.
What is Corporate Governance?
WELCOME GHANAHR TRAINING. OUR VISION & MISSION OUR VISION To be the recognised Consultancy Firm with the highest ethical standard that delivers unrivalled.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
MANAGING CONTRACTORS PERSPECTIVES FROM THE MHSA. copyright reserved 2003, department, company INTRODUCTION More work is being outsourced to contractors.
HEMS Vision & Mission Our Program, LLC. Vision Vision Mission Mission Principles Principles Collaboration Collaboration Authenticity Authenticity Mission.
Confidentiality and HIPAA
Westbrook Technologies from Document Management’s Role in HIPAA.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
Sizewise Code of Ethics, Conflict of Interest and Disclosure HR-CECID.
Welcome Vendor Representative Orientation
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
Transportation/Fleet Safety and Environmental Safety Travel - Hazardous Materials Transportation Security- Sandra J. Perry Consulting Services & Treatment.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
2005Linn-Benton Housing Authority The Section 8 Triangle Presented by The Linn-Benton Housing Authority Click or Press Enter to begin.
Vision, Mission & Values
Conflict of Interest and Technology Transfer Sherrie Settle Assistant Director, Research Compliance Program Institutional Conflict of Interest Officer.
Information Systems Security Officer
Security Governance Technology Executive Club
Supplier Ethics: Program Checklist
Chapter 19 OPERATIONS AND VALUE CHAIN MANAGEMENT © 2003 Pearson Education Canada Inc.19.1.
Information Systems Controls for System Reliability -Information Security-
HIPAA Health Insurance Portability & Accountability Act of 1996.
Lead from the front Texas Nodal 1 Texas Nodal Market Implementation Program Detailed Design Document Review Process Compiled by.
Know More. Do More. Spend Less. January 24, 2006 Monica Loomis, Senior Sales Consultant Oracle Contract Management.
How To Prepare To Sell Your Business: Steps To Take Now Susan Wissink Fennemore Craig.
Chapter 12 Managing the Team. Objectives Developing a strong corporate culture. Finding and hiring the best people. Dealing with firing an employee. Dealing.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Ruth E. Kim General Counsel, SVP & Sr. Partner FLEISHMAN-HILLARD INC.
HIPAA PRIVACY AND SECURITY AWARENESS.
ESTABLISHING A FRANCHISE ASSOCIATION Brian Duckett
Janet H. Davis Helene DesRuisseaux Judy Coy Key Strategies to Maximize Quality Performance in Your Compliance Program.
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
What is C-TPAT? C-TPAT is a voluntary government-business initiative to build cooperative relationships that strengthen and improve overall international.
1 Harvard University Cambridge, MA March 29, 2007 Medical Device Congress AdvaMed’s Efforts to Promote Compliance Christopher L. White, Esq. Executive.
Responsible Care® Awareness for Managers 1. DISCUSSION POINTS 2 WHAT IS RESPONSIBLE CARE®? FEATURES OF RESPONSIBLE CARE® HOW DOES RESPONSIBLE CARE® ADD.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Copyright © 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Fine Tuning Anti-Corruption.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Law Firm Data Security: What In-house Counsel Need to Know
The accounting profession requires its members to follow a code of ethics.
Data Minimization Framework
Principles Of Women Empowerment
Privacy & Confidentiality
How to Improve Recruitment Strategies
"Praise Temple Ministries" Privacy Statement "Praise Temple Ministries" is highly sensitive to the privacy interests of consumers and believes that the.
ISCOM 424 Competitive Success/snaptutorial.com
ISCOM 361 Enthusiastic Study/snaptutorial.com
ISCOM 361 AID Lessons in Excellence-- iscom361aid.com.
ISCOM 361 PAPERS Lessons in Excellence -- iscom361papers.com.
ISCOM 361 PAPERS Education for Service--iscom361papers.com.
Pre-Close Rules of Engagement
Introduction.
Vision, Mission & Values of the Health Authority – Abu Dhabi
Code of Conduct/ Fraud, Waste & Abuse
Welcome Back Glencoe Accounting.
Ethics as Culture key elements
Creganna Medical.
Purchasing Contracts Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
EICC/GeSI focus: Corporate Responsibility
Ethics as Culture key elements
Explain the role of ethics in financial- information management
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Protecting customer information Do Not Compete with Customers Annual Training & Recertification: Confidentiality Obligations HONORED 2015, 2016, 2017, 2018 IT Protocols NDAs “We demand of ourselves, our partners and each other the highest standards of ethics and integrity.” Terrence Curtin CEO, TE Connectivity Employee Contracts & Agreements Facility Visit Protocols & Protections

Protecting customer information – explained Annual Training & Recertification NDAs Facility Visit Protocols & Protections Every year we require all of our employees to participate in training on the protection of our customers’ confidential information, and to reinforce that training we also require all employees to certify their compliance with their obligations. We are committed to protecting our customers’ valuable confidential information and we demand the same commitment from our employees. We use NDAs to create legally enforceable obligations to protect our customers’ sensitive information -- from unauthorized disclosures and also from unauthorized use. Our in-house legal counsel negotiates broad NDAs with all suppliers, consultants, contractors, and other parties with whom we do business. Customers and other stakeholders are welcome to visit our facilities. We secure our facilities and safeguard them against unauthorized access through a balanced approach of employee commitment, operational procedures, and physical controls. Photo ID cardkey access is required to access facilities and visitors must sign an NDA before escorted entry. Visits are limited to authorized areas only, photos/videos are not permitted, and precautions to prevent access to confidential information while on the premises are in place. Employee Contracts & Agreements IT Protocols We Don’t Compete with Our Customers We are committed to ensuring that every employee understands and adheres to our strict guidelines for safeguarding confidential information. Upon hire, every employee is required to enter into a confidentiality agreement which extends protections to our customers’ confidential information as well as our own. The protection of the sensitive and confidential information entrusted to us by our customers is enshrined in our information security team’s mission. We protect the integrity and security of our data through best in class security systems and continuous improvement of our protocols. Our Enterprise Risk & Security Management team has been recognized for program management excellence, placing 7th in the Industrial/Manufacturing sector of the Security 500. Our vision is to become the partner of choice to medical device companies and to serve the healthcare market by assisting our 400+ global customers to build medical devices that save lives. As an outsourcing partner, we do not sell directly into our customers’ end markets or to hospitals, as doing so would be inconsistent with our vision and strategy.