Skip to main content Skip to Footer

04

PROTECT PEOPLE,
INFORMATION AND
OUR BUSINESS
We work together to build a better, stronger and more durable company for future generations, protecting the Accenture brand, meeting our commitments to protect information and intellectual property, acting with an owner mentality and protecting and developing our people.


Information Security

Includes: Confidential information, Proper use of technology, Reporting security breaches


Intellectual Property

Includes: Protecting and honoring IP rights of others, Use of copyrighted materials, Safeguarding Accenture IP


Social Media

Includes: Constructive online dialogues, Internal and external posting


Brand

Includes: Media relations, Industry analyst activities, Corporate Communications


Asset Protection

Includes: Theft, Misuse, Intangible assets


Workplace Safety and Business Continuity

Includes: Emergency procedures, Business continuity measures, Reporting security incidents

Information Security


We protect confidential information of Accenture, clients and others from unauthorized use or disclosure.

PROTECT CONFIDENTIAL INFORMATION


When you receive confidential information from a client or others, make sure you understand our legal, contract and policy obligations and follow them. If you are unsure if the information is confidential, treat it as such.


ONLY USE CONFIDENTIAL INFORMATION AS PERMITTED


Use confidential information only for the purpose provided. After that purpose has passed, dispose of non-Accenture confidential information, unless otherwise required by law, contracts or policies.


GET PERMISSION TO SHARE OTHERS’ INFORMATION


Do not review, discuss, disclose, copy or use any copyrighted, licensed or confidential Accenture, client, supplier or third-party information except as authorized, and without first making sure we have proper permission. Be cautious about discussing business matters with anyone outside of Accenture, on the internet or within hearing distance of outsiders (for example, in elevators), including family and friends.


ONLY THOSE WITH A NEED TO KNOW USE CONFIDENTIAL INFORMATION


Make sure that only authorized people with a current need to know have access to confidential information. Reach out to supervisors, Accenture Leaders or Legal to help understand any limitations and answer any questions.

We follow Accenture’s requirements for protecting and using information, devices and technology belonging to Accenture, clients, suppliers and other parties.

REDUCE INFORMATION SECURITY RISK


We are individually and collectively responsible for reducing our information security risk—which includes protecting devices, as well as data and information. If you don’t know whether a particular action presents an information security risk, reach out for guidance before doing it. If you become aware of security weaknesses—whether with respect to individuals, processes or technology—speak up.


PROTECT DATA AND INFORMATION


Exercise good judgment to maintain and protect the security of data and information entrusted to your care. Be vigilant in protecting devices from loss or theft. Protect our own data and information, and that of our clients, by classifying and marking it properly, and by implementing protective technology and processes (for example, secure your technology devices through security software and configurations that have been approved by Accenture). Share data and information only if there is a valid business requirement to do so and only on a need to know basis. Do not access or handle data or information for which you do not have a business need. Do not retain data or information after the business need has passed or after leaving a project or Accenture. Securely dispose of data or information when it is no longer needed, whether it is electronic or on paper.


USE THE SOLUTIONS AND SERVICES PROVIDED BY ACCENTURE TO PROTECT DATA AND INFORMATION


Use Accenture-approved or client-provided computers or an approved Bring Your Own Computer (BYOC) solution for business purposes to reduce the risk of a breach because they are configured with hardware specifications and software controls that have an encrypted hard drive and other security controls that meet our standards. Use tools to encrypt email and portable media, conduct periodic scans and check for malware and viruses.


BE CAREFUL WHEN USING NON-ACCENTURE TECHNOLOGY SOLUTIONS OR SERVICES


Do not install software or modify configurations that compromise our technology’s security. Do not use third-party web-based services to do Accenture or client work unless these services are approved by Accenture (and the client) for such use. If third-party web services are authorized, first confirm that we will not be uploading any Accenture or client data or confidential information. Only use Accenture-approved solutions to back up data.


USE TECHNOLOGY APPROPRIATELY


Use Accenture-provided technology for business purposes and limited and appropriate personal use only. Do not use devices provided by our clients to conduct internal Accenture business or for personal use. When using personal workstations or mobile devices for Accenture business purposes, limit the use to email, Accenture-provided applications and browser-based access to Accenture sites and never store Accenture or client information on them, unless using the approved Bring Your Own Computer (BYOC) solution.


REPORT SECURITY BREACHES IMMEDIATELY


Report suspected information security incidents to the Accenture Security Operations Center (ASOC) (+1-202-728-0645) immediately.

Intellectual Property


We protect and honor the intellectual property rights of others and safeguard Accenture’s intellectual property, including its packaged knowledge.

PROTECT AND HONOR THE INTELLECTUAL PROPERTY RIGHTS OF COMPETITORS, BUSINESS PARTNERS, CLIENTS, SUPPLIERS, FORMER EMPLOYERS AND OTHER PARTIES


Honor your commitments to prior employers. Do not allow any employee to use, disclose or bring to Accenture any electronic or hard-copy documents of a prior employer, or any other party, without explicit written permission, even if the employee created the document, and even if the documents do not contain sensitive or confidential information.


Do not use, distribute, copy or remove client materials from a client site, absent a written agreement reflecting Accenture’s right to do so.


Do not download or use copyrighted materials—such as pictures, films, music files, software programs or source code—without a proper license. Recognize that the availability of material to view or download on the internet is not an indication that the material can be used without a license.


SAFEGUARD ACCENTURE’S INTELLECTUAL PROPERTY, INCLUDING ITS PACKAGED KNOWLEDGE


Accenture’s intellectual property helps us outperform our competitors. Our intellectual property is a sales credential that differentiates Accenture from the rest of the market and highlights to clients the significant investment we have made to create unique value that only Accenture can offer. Protect, retain and leverage our ownership in Accenture’s intellectual property rights during negotiations and engagements with clients, suppliers and other parties.


Mark all Accenture confidential proposals, documents and other materials per our guidelines. Share such information only with people who have a need to know and, where appropriate, only after confirming that a non-disclosure agreement and other safeguards are in place.


Understand and comply with any restrictions on packaged knowledge before you use it.

Social Media


We participate in constructive online dialogues and use our best judgment when posting to external or internal social media.

POST CONSTRUCTIVELY TO SOCIAL MEDIA SITES


Contributing to online communities—including social networks, blogs, wikis, podcasts and virtual worlds—allows us to demonstrate Accenture’s innovative and collaborative nature and is a key element of the Accenture Way. Online discourse helps us promote our capabilities, build stronger relationships and enhance our reputation.


When using these sites:

  • Communicate thoughtfully and never post content that is disrespectful, harassing or discriminatory in any message or post that relates to Accenture, our business, our clients, our business partners or our people.

  • Provide sufficient context and support in personal online communications to help readers understand your statements.

  • Get appropriate approvals before providing an official Accenture position about a topic related to Accenture’s business—and otherwise do not make statements that could be perceived by others as speaking on behalf of Accenture.

  • Be transparent and identify yourself and your association with Accenture when commenting on Accenture matters.

  • Protect nonpublic information that relates to Accenture’s business, research and development activities, clients or other business partners; and protect Accenture’s intellectual property and respect the rights of others.

  • Do not identify a company as an Accenture client unless you have authorization to do so.

  • Be mindful of your own privacy and respect the privacy of others.

Brand


We centrally manage all media relations and industry analyst activities and events rather than through employees’ or engagement teams’ own initiatives.

ENSURE THE POWER OF OUR BRAND AND APPROPRIATELY COORDINATE CORPORATE COMMUNICATIONS


The Accenture name and brand are powerful and valuable assets that differentiate us from our competitors. Our individual behavior and business decisions—as well as the business decisions we make as a company—advance our brand consistently across the world. All of us have the privilege and responsibility to contribute to the meaning and power of our brand.


To ensure that Accenture’s communications are focused and consistent, and to prevent us from violating the law, all media and industry analyst relations activities should be coordinated through Corporate Communications.

Asset Protection


We act as owners of the company and do not jeopardize Accenture’s future by losing our assets through theft, misuse or carelessness.

PROTECT OUR ASSETS


We vigorously protect our assets—both physical and intangible. Intangible assets—our brand, reputation, intellectual property and confidential information—are as worthy of protection as our equipment and computers.

Workplace Safety and Business Continuity


We follow all safety and emergency procedures at our facilities and at client sites—including incident response guidance and business continuity measures—and we immediately report safety threats, security breaches and disaster/crisis incidents that could affect service delivery.


MAKE PERSONAL SAFETY A TOP PRIORITY


We make personal safety a top priority. Follow all safety and emergency procedures at our facilities and at client sites. Immediately report any of the following incidents to the Accenture Security Operations Center (ASOC) (+1-202-728-0645):

  • Threats to the life, health and safety of our people

  • Security breaches (including information security)

  • Disaster/crisis incidents that could affect the delivery of services to our clients and/or our internal operations


In the case of any such incidents, follow any incident response guidance and/or business continuity measures.


As Accenture is committed to providing a safe, secure and non-threatening work environment, do not bring weapons to Accenture facilities (except to the extent otherwise permitted by any applicable state, provincial, federal or national laws). This includes public or outdoor venues where an Accenture-sponsored event or an Accenture training event occurs, conducting Accenture business at non-Accenture locations and attending client or other work-related events.


To protect Accenture, our people and our assets, Accenture may ask to search personal property at a company worksite, and to the extent permitted by law, may monitor at any time all Accenture assets, including e-mail, instant messaging and internet usage.