Having one set of values and behaviors and clear ethical expectations in our Code of Conduct helps us consistently make choices, in many different contexts.
The Advantesco Code of Conduct, updated in June 2016, is our guide to doing the right thing in business. It is founded on our values and clarifies the ethics and compliance expectations for everyone who works at Advantesco. Our Code reflects a principles-based approach, where rules are not stated explicitly, and everyday business decisions will be guided by our values, with reference to other resources where relevant.
We promote an environment where employees feel comfortable raising concerns without fear of retaliation. We expect third parties with which we do business to adhere to the standards set out in our Code of Conduct.
The Code clarifies the basic rules, standards, and behavior necessary to achieve our objectives and uphold our values. It summarizes minimum legal and ethical standards and gives practical advice to ensure that we conduct our business in an ethical and compliant manner. The Code also identifies the main elements of our compliance program and explains where you can seek help and support.
The Code applies to everyone who works directly for/or represents Advantesco.
The code helps us understand the responsibilities we share, and identifies some of the important legal and ethical issues that may arise. However, keep in mind that no guidelines can cover every instance; and that the absence of a guideline to deal with a particular situation does not relieve the responsibility to act with the highest ethical standards of business conduct at all times.
If you have any enquiries about this Code, or if you come aware of any breach of this Code of Conduct please bring it to our attention and contact us per email: email@example.com
Strive to know yourself and be honest about your capability.
Strive for technical excellence in the IT profession by maintaining and enhancing your own knowledge and skills. Acknowledge that there are many free resources available on the Internet and affordable books.
Demonstrate performance capability via projects, leadership, and/or accredited educational programs and encourage others to do so as well.
Not to hesitate to seek assistance or guidance when faced with a task beyond abilities or experience.
Embrace other professionals' advice and learn from their experiences and mistakes. Treat this as an opportunity to learn new techniques and approaches.
When the situation arises that assistance is called upon, respond willingly to share knowledge with others.
Strive to convey any knowledge (specialist or otherwise) that is gained to others so everyone gains the benefit of each other's knowledge.
Teach the willing and empower others with IT Best Practices. Offer your knowledge to show others how to become professionals in their own right. Strive to be perceived as and be an honest and trustworthy employee.
Not to take advantage of the lack of knowledge or inexperience on the part of others for personal gain.
Not to advance private interests at the expense of end users, colleagues, or employer.
Not to abuse power. Use technical knowledge, user rights, and permissions only to fulfill responsibilities to the employer.
Avoid and be alert to any circumstances or actions that might lead to conflicts of interest or the perception of conflicts of interest. If such circumstance occurs, notify the employer or business partners.
Not to steal property, time or resources.
Reject bribery or kickbacks and report such illegal activity.
Report on the illegal activities of yourself and others without respect to the punishments involved. Not to tolerate those who lie, steal, or cheat as a means of success in IT. However, to bring charges against any person only when there is a reasonable basis for believing in the truth of the allegations and without regard to personal interest.
Conduct business in a manner that assures the IT profession is considered one of integrity and professionalism.
Not to injure others, their property, reputation, or employment by false or malicious action.
Not to use availability and access to information for personal gains through corporate espionage.
Distinguish between advocacy and engineering and not to present analysis and opinion as fact.
Obligation to report all system vulnerabilities that might result in significant damage.
Respect intellectual property and being careful to give credit for other's work. To never steal or misuse copyrighted, patented material, trade secrets or any other intangible asset.
To accurately document setup procedures and any modifications done to equipment. This will ensure that others will be informed of procedures and changes made.
Respect privacy and confidentiality. And respect the privacy of co-workers' information. Not to peruse or examine their information including data, files, records, or network traffic except as defined by the appointed roles, the organization's acceptable use policy, as approved by Human Resources, and without the permission of the end user.
Obtain permission before probing systems on a network for vulnerabilities.
Respect the right to confidentiality with your employers, clients, and users except as dictated by applicable law. I respect human dignity.
Treasure and will defend equality, justice and respect for others.
Not to participate in any form of discrimination, whether due to race, color, national origin, ancestry, sex, sexual orientation, gender/sexual identity or expression, marital status, creed, religion, age, disability, veteran's status, or political ideology.
How can we help you today?
We are just a click away ...