第15页- tata_code -of-导电t_2015
p . 15
20.我们的员工不得使用公司的所有资产,内幕交易的有形和无形,包括计算机22。我们的员工不得沉迷于任何形式的通讯设备,进行内幕交易,也不得协助他人,包括他们被提供的目的、直系亲属、朋友或业务目的来开展我们的业务。该资产不得被滥用,不得从中获得任何利益。我们将建立获取和拥有价格敏感流程的途径,以最大限度地减少欺诈风险,以及非公共领域的信息。挪用或滥用我们的资产。这种资料将包括资料21。我们将遵守有关我们公司、我们集团公司、反洗钱、反欺诈以及我们的客户和供应商的所有适用规定。我们将建立程序来检查和防止任何违反此类法律的行为。我们公司最近宣布启动一项新的业务计划。 In connection with this, your friend who is a journalist with a leading business newspaper has asked you to provide some information that he could cover in his forthcoming article. He has promised not to quote you, or reveal your identity. Should you be giving him this information? No. You should not be sharing information of this nature with the media, even if it is assured that the source would remain anonymous. Only authorised personnel in the company are permitted to speak to the media and provide information of this nature. our company has a “Use of Social Media” policy that lays down the “dos and don’ts” for use of social media even if you may access such media on your own time. Why is there such a policy? External communication is a serious matter. It must be carefully managed because information put out with reference to our company or its businesses needs to be clear, truthful and not violate any undertakings we have given to other parties. In each business there are managers nominated to authorise and make different types of statements to the outside world. These managers should be consulted about any request for information you may receive or information you think we should give out. In using social media, in particular blogs or social networking sites, you should exercise great caution while talking about our company or the business we do. It may feel like you are chatting with friends or expressing a personal opinion but even while doing so you cannot share any confidential information of our company. RemembeR… We must respect the property rights of others by never misusing their assets, intellectual property or trade secrets, including the copying or downloading of unauthorised software, trademarks, copyrighted material or logos. We should never make unauthorised copies of computer software programs or use unlicensed personal software on company computers. 13 TCOC_Booklet_CVR_P001_P036 Final.indd 13 8/25/16 12:38 PM