We protect confidential information of Accenture, clients and others from unauthorized use or disclosure.
PROTECT CONFIDENTIAL INFORMATION
When you receive confidential information from a client or others, make sure you understand our legal, contract and policy obligations and follow them. If you are unsure if the information is confidential, treat it as such.
ONLY USE CONFIDENTIAL INFORMATION AS PERMITTED
Use confidential information only for the purpose provided. After that purpose has passed, dispose of non-Accenture confidential information, unless otherwise required by law, contracts or policies.
GET PERMISSION TO SHARE OTHERS’ INFORMATION
Do not review, discuss, disclose, copy or use any copyrighted, licensed or confidential Accenture, client, supplier or third-party information except as authorized, and without first making sure we have proper permission. Be cautious about discussing business matters with anyone outside of Accenture, on the internet or within hearing distance of outsiders (for example, in elevators), including family and friends.
ONLY THOSE WITH A NEED TO KNOW USE CONFIDENTIAL INFORMATION
Make sure that only authorized people with a current need to know have access to confidential information. Reach out to supervisors, Accenture Leaders or Legal to help understand any limitations and answer any questions.
We follow Accenture’s requirements for protecting and using information, devices and technology belonging to Accenture, clients, suppliers and other parties.
REDUCE INFORMATION SECURITY RISK
We are individually and collectively responsible for reducing our information security risk—which includes protecting devices, as well as data and information. If you don’t know whether a particular action presents an information security risk, reach out for guidance before doing it. If you become aware of security weaknesses—whether with respect to individuals, processes or technology—speak up.
PROTECT DATA AND INFORMATION
Exercise good judgment to maintain and protect the security of data and information entrusted to your care. Be vigilant in protecting devices from loss or theft. Protect our own data and information, and that of our clients, by classifying and marking it properly, and by implementing protective technology and processes (for example, secure your technology devices through security software and configurations that have been approved by Accenture). Share data and information only if there is a valid business requirement to do so and only on a need to know basis. Do not access or handle data or information for which you do not have a business need. Do not retain data or information after the business need has passed or after leaving a project or Accenture. Securely dispose of data or information when it is no longer needed, whether it is electronic or on paper.
USE THE SOLUTIONS AND SERVICES PROVIDED BY ACCENTURE TO PROTECT DATA AND INFORMATION
Use Accenture-approved or client-provided computers or an approved Bring Your Own Computer (BYOC) solution for business purposes to reduce the risk of a breach because they are configured with hardware specifications and software controls that have an encrypted hard drive and other security controls that meet our standards. Use tools to encrypt email and portable media, conduct periodic scans and check for malware and viruses.
BE CAREFUL WHEN USING NON-ACCENTURE TECHNOLOGY SOLUTIONS OR SERVICES
Do not install software or modify configurations that compromise our technology’s security. Do not use third-party web-based services to do Accenture or client work unless these services are approved by Accenture (and the client) for such use. If third-party web services are authorized, first confirm that we will not be uploading any Accenture or client data or confidential information. Only use Accenture-approved solutions to back up data.
USE TECHNOLOGY APPROPRIATELY
Use Accenture-provided technology for business purposes and limited and appropriate personal use only. Do not use devices provided by our clients to conduct internal Accenture business or for personal use. When using personal workstations or mobile devices for Accenture business purposes, limit the use to email, Accenture-provided applications and browser-based access to Accenture sites and never store Accenture or client information on them, unless using the approved Bring Your Own Computer (BYOC) solution.
REPORT SECURITY BREACHES IMMEDIATELY
Report suspected information security incidents to the Accenture Security Operations Center (ASOC) (+1-202-728-0645) immediately.
We protect and honor the intellectual property rights of others and safeguard Accenture’s intellectual property, including its packaged knowledge.
PROTECT AND HONOR THE INTELLECTUAL PROPERTY RIGHTS OF COMPETITORS, BUSINESS PARTNERS, CLIENTS, SUPPLIERS, FORMER EMPLOYERS AND OTHER PARTIES
Honor your commitments to prior employers. Do not allow any employee to use, disclose or bring to Accenture any electronic or hard-copy documents of a prior employer, or any other party, without explicit written permission, even if the employee created the document, and even if the documents do not contain sensitive or confidential information.
Do not use, distribute, copy or remove client materials from a client site, absent a written agreement reflecting Accenture’s right to do so.
Do not download or use copyrighted materials—such as pictures, films, music files, software programs or source code—without a proper license. Recognize that the availability of material to view or download on the internet is not an indication that the material can be used without a license.
SAFEGUARD ACCENTURE’S INTELLECTUAL PROPERTY, INCLUDING ITS PACKAGED KNOWLEDGE
Accenture’s intellectual property helps us outperform our competitors. Our intellectual property is a sales credential that differentiates Accenture from the rest of the market and highlights to clients the significant investment we have made to create unique value that only Accenture can offer. Protect, retain and leverage our ownership in Accenture’s intellectual property rights during negotiations and engagements with clients, suppliers and other parties.
Mark all Accenture confidential proposals, documents and other materials per our guidelines. Share such information only with people who have a need to know and, where appropriate, only after confirming that a non-disclosure agreement and other safeguards are in place.
Understand and comply with any restrictions on packaged knowledge before you use it.
We centrally manage all media relations and industry analyst activities and events rather than through employees’ or engagement teams’ own initiatives.
ENSURE THE POWER OF OUR BRAND AND APPROPRIATELY COORDINATE CORPORATE COMMUNICATIONS
The Accenture name and brand are powerful and valuable assets that differentiate us from our competitors. Our individual behavior and business decisions—as well as the business decisions we make as a company—advance our brand consistently across the world. All of us have the privilege and responsibility to contribute to the meaning and power of our brand.
To ensure that Accenture’s communications are focused and consistent, and to prevent us from violating the law, all media and industry analyst relations activities should be coordinated through Corporate Communications.
We act as owners of the company and do not jeopardize Accenture’s future by losing our assets through theft, misuse or carelessness.
PROTECT OUR ASSETS
We vigorously protect our assets—both physical and intangible. Intangible assets—our brand, reputation, intellectual property and confidential information—are as worthy of protection as our equipment and computers.
We follow all safety and emergency procedures at our facilities and at client sites—including incident response guidance and business continuity measures—and we immediately report safety threats, security breaches and disaster/crisis incidents that could affect service delivery.
MAKE PERSONAL SAFETY A TOP PRIORITY
We make personal safety a top priority. Follow all safety and emergency procedures at our facilities and at client sites. Immediately report any of the following incidents to the Accenture Security Operations Center (ASOC) (+1-202-728-0645):
Threats to the life, health and safety of our people
Security breaches (including information security)
Disaster/crisis incidents that could affect the delivery of services to our clients and/or our internal operations
In the case of any such incidents, follow any incident response guidance and/or business continuity measures.
As Accenture is committed to providing a safe, secure and non-threatening work environment, do not bring weapons to Accenture facilities (except to the extent otherwise permitted by any applicable state, provincial, federal or national laws). This includes public or outdoor venues where an Accenture-sponsored event or an Accenture training event occurs, conducting Accenture business at non-Accenture locations and attending client or other work-related events.
To protect Accenture, our people and our assets, Accenture may ask to search personal property at a company worksite, and to the extent permitted by law, may monitor at any time all Accenture assets, including e-mail, instant messaging and internet usage.