XYZ Tech
Corporate Onboarding
Learning Goal: By the end of this training, you will be able to state XYZ Tech's three pillars of compliance and their elements.
Start
Pillars of Compliance
Employees are held to standards of excellence in...
Legal Compliance
Ethical Conduct
Internal Policies
Ethical Conduct
XYZ Tech strives to maintain exemplary business ethics, as reflected by our team members' decsions in three important areas.
Fair Dealing & Anti-Bribery
Use of Company Assets
Conflicts of Interest
How well do you know the XYZ Tech Code of Ethics?
A vendor offers you a $75 gift card to a local restaurant as a thank you for finalizing a contract. According to XYZ Tech’s Fair Dealing & Anti-Bribery guidelines, what is the most appropriate course of action?
Accept the gift, as it is infrequent and can be considered a minor courtesy.
Accept the gift and immediately report it to your direct supervisor.
Politely decline the gift because its value exceeds the company's $50 USD limit.
Internal Policies
Public data is available to all users.
Data Security and Classification: Data is categorized according to security level, and must be stored accordingly.
Internal data is available to employees only.
Confidential data is available only to specific team members.
How well do you know the XYZ Tech Internal Policies?
An engineer is working remotely and needs to share a newly developed, unreleased feature specification (which contains proprietary information and is classified as Confidential Data) with a team member. Which of the following actions violates XYZ Tech's data handling policy?
Storing the document temporarily on a personal laptop's desktop folder because it is quicker to access later.
Saving the document on the designated, secured, and access-controlled internal network drive.
Emailing the document to the team member using the standard, encrypted XYZ Tech corporate email system.
Legal Obligations
There are four main areas in which legal obligations should be considered before action. Keep an eye out for:
Information Law
Compliance Mechanism
Workplace Conduct
Financial Law
Refer to company guidelines regarding categories of information.
Should you report inapporpriate behaviors, you will be protected.
Your choices in the workplace impact others.
Confidential data must not be used for personal gain.
Info
Info
Info
Info
How well do you know XYZ Tech's legal obligations?
According to XYZ Tech's Insider Trading guidelines, which of the following scenarios involves the misuse of Non-Public Information (NPI)?
An employee overhears a rumor about a potential new competitor and sells a small amount of their company stock.
An employee advises their spouse to purchase XYZ Tech stock after learning the company is two weeks away from officially announcing record quarterly profits.
An employee reads a public news report speculating on a future merger and decides to buy more company stock.
Congratulations!
🎉
🎉
You are now a Compliance Champion for XYZ Tech.
You have demonstrated an understanding of the three foundational pillars of integrity at our company:
- Ethical Conduct: You know how to recognize and address conflicts of interest and maintain fair dealing.
- Secure Operations: You understand the critical importance of classifying and protecting Confidential Data.
- Legal Compliance: You are aware of your legal obligations regarding data privacy, insider trading, and mandatory reporting procedures.
What Happens Next? Your completion has been recorded. These guidelines are a continuous commitment, not a one-time event. Please save this information for future reference:
- Review: Access the complete XYZ Tech Code of Conduct [Insert Link to Document Here] for detailed procedures.
- Report: Remember the Integrity Hotline is available 24/7 as your primary confidential channel for reporting violations or seeking guidance.
Welcome to the team!
References
Barao, J. (2025). What is legal compliance: A guide for businesses in 2025. Convene. https://www.azeusconvene.com/articles/legal-compliance Google. (2025). Gemini [Large language model]. https://gemini.google.com/
SBToolkit. (2024). Essential corporate policy guidelines for effective governance. Sustainable Business Toolkit. https://www.sustainablebusinesstoolkit.com/corporate-policy/
Twin, A. (2025). Business ethics: Key principles and their importance in today’s market. Investopedia. https://www.investopedia.com/terms/b/business-ethics.asp
Internal Data
Examples Organizational charts, internal communications (memos, non-sensitive emails), general training materials, department budgets, non-client internal project names. Handling/Storage Must be stored on the secured XYZ Tech corporate network (shared drives or internal cloud platforms). May be shared via internal email or company messaging platforms. Must not be shared externally or transmitted over personal devices. Permission Access is granted to all authorized XYZ Tech employees.
Confidential Data
Examples Client Personally Identifiable Information (PII), proprietary source code, passwords, intellectual property (patents, trade secrets), merger and acquisition plans, internal investigations, unreleased financial earnings. Handling/Storage MUST be stored only in designated, highly-secured, encrypted folders (e.g., restricted access network vaults). MUST NOT be stored on personal devices (laptops, phones, USB drives) or sent via external email, consumer messaging apps, or unencrypted channels. Permission Access is granted on a strict "Need-to-Know" basis only. Access requests require manager approval and are logged.
Public Data
Examples Press releases, marketing materials, general job postings, public website content, annual reports, corporate addresses. Handling/Storage May be stored on public-facing servers (e.g., website), transmitted via standard email, and accessed without authentication. No special security required. Permission No restrictions on access or distribution.
EID 525 Benchmark - Corporate Ethics Module
Caroline
Created on October 3, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Basic Interactive Microsite
View
Beauty catalog mobile
View
3D Corporate Reporting
View
Higher Education Microsite
View
Basic Shapes Microsite
View
Microsite Vibrant Travel Guide
View
Tourism Guide Microsite
Explore all templates
Transcript
XYZ Tech
Corporate Onboarding
Learning Goal: By the end of this training, you will be able to state XYZ Tech's three pillars of compliance and their elements.
Start
Pillars of Compliance
Employees are held to standards of excellence in...
Legal Compliance
Ethical Conduct
Internal Policies
Ethical Conduct
XYZ Tech strives to maintain exemplary business ethics, as reflected by our team members' decsions in three important areas.
Fair Dealing & Anti-Bribery
Use of Company Assets
Conflicts of Interest
How well do you know the XYZ Tech Code of Ethics?
A vendor offers you a $75 gift card to a local restaurant as a thank you for finalizing a contract. According to XYZ Tech’s Fair Dealing & Anti-Bribery guidelines, what is the most appropriate course of action?
Accept the gift, as it is infrequent and can be considered a minor courtesy.
Accept the gift and immediately report it to your direct supervisor.
Politely decline the gift because its value exceeds the company's $50 USD limit.
Internal Policies
Public data is available to all users.
Data Security and Classification: Data is categorized according to security level, and must be stored accordingly.
Internal data is available to employees only.
Confidential data is available only to specific team members.
How well do you know the XYZ Tech Internal Policies?
An engineer is working remotely and needs to share a newly developed, unreleased feature specification (which contains proprietary information and is classified as Confidential Data) with a team member. Which of the following actions violates XYZ Tech's data handling policy?
Storing the document temporarily on a personal laptop's desktop folder because it is quicker to access later.
Saving the document on the designated, secured, and access-controlled internal network drive.
Emailing the document to the team member using the standard, encrypted XYZ Tech corporate email system.
Legal Obligations
There are four main areas in which legal obligations should be considered before action. Keep an eye out for:
Information Law
Compliance Mechanism
Workplace Conduct
Financial Law
Refer to company guidelines regarding categories of information.
Should you report inapporpriate behaviors, you will be protected.
Your choices in the workplace impact others.
Confidential data must not be used for personal gain.
Info
Info
Info
Info
How well do you know XYZ Tech's legal obligations?
According to XYZ Tech's Insider Trading guidelines, which of the following scenarios involves the misuse of Non-Public Information (NPI)?
An employee overhears a rumor about a potential new competitor and sells a small amount of their company stock.
An employee advises their spouse to purchase XYZ Tech stock after learning the company is two weeks away from officially announcing record quarterly profits.
An employee reads a public news report speculating on a future merger and decides to buy more company stock.
Congratulations!
🎉
🎉
You are now a Compliance Champion for XYZ Tech.
You have demonstrated an understanding of the three foundational pillars of integrity at our company:
- Ethical Conduct: You know how to recognize and address conflicts of interest and maintain fair dealing.
- Secure Operations: You understand the critical importance of classifying and protecting Confidential Data.
- Legal Compliance: You are aware of your legal obligations regarding data privacy, insider trading, and mandatory reporting procedures.
What Happens Next? Your completion has been recorded. These guidelines are a continuous commitment, not a one-time event. Please save this information for future reference:- Review: Access the complete XYZ Tech Code of Conduct [Insert Link to Document Here] for detailed procedures.
- Report: Remember the Integrity Hotline is available 24/7 as your primary confidential channel for reporting violations or seeking guidance.
Welcome to the team!References
Barao, J. (2025). What is legal compliance: A guide for businesses in 2025. Convene. https://www.azeusconvene.com/articles/legal-compliance Google. (2025). Gemini [Large language model]. https://gemini.google.com/ SBToolkit. (2024). Essential corporate policy guidelines for effective governance. Sustainable Business Toolkit. https://www.sustainablebusinesstoolkit.com/corporate-policy/ Twin, A. (2025). Business ethics: Key principles and their importance in today’s market. Investopedia. https://www.investopedia.com/terms/b/business-ethics.asp
Internal Data
Examples Organizational charts, internal communications (memos, non-sensitive emails), general training materials, department budgets, non-client internal project names. Handling/Storage Must be stored on the secured XYZ Tech corporate network (shared drives or internal cloud platforms). May be shared via internal email or company messaging platforms. Must not be shared externally or transmitted over personal devices. Permission Access is granted to all authorized XYZ Tech employees.
Confidential Data
Examples Client Personally Identifiable Information (PII), proprietary source code, passwords, intellectual property (patents, trade secrets), merger and acquisition plans, internal investigations, unreleased financial earnings. Handling/Storage MUST be stored only in designated, highly-secured, encrypted folders (e.g., restricted access network vaults). MUST NOT be stored on personal devices (laptops, phones, USB drives) or sent via external email, consumer messaging apps, or unencrypted channels. Permission Access is granted on a strict "Need-to-Know" basis only. Access requests require manager approval and are logged.
Public Data
Examples Press releases, marketing materials, general job postings, public website content, annual reports, corporate addresses. Handling/Storage May be stored on public-facing servers (e.g., website), transmitted via standard email, and accessed without authentication. No special security required. Permission No restrictions on access or distribution.