Want to create interactive content? It’s easy in Genially!

Get started free

EID 525 Benchmark - Corporate Ethics Module

Caroline

Created on October 3, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Basic Interactive Microsite

Beauty catalog mobile

3D Corporate Reporting

Higher Education Microsite

Basic Shapes Microsite

Microsite Vibrant Travel Guide

Tourism Guide Microsite

Transcript

XYZ Tech

Corporate Onboarding

Learning Goal: By the end of this training, you will be able to state XYZ Tech's three pillars of compliance and their elements.

Start

Pillars of Compliance

Employees are held to standards of excellence in...

Legal Compliance

Ethical Conduct

Internal Policies

Ethical Conduct

XYZ Tech strives to maintain exemplary business ethics, as reflected by our team members' decsions in three important areas.

Fair Dealing & Anti-Bribery

Use of Company Assets

Conflicts of Interest

How well do you know the XYZ Tech Code of Ethics?

A vendor offers you a $75 gift card to a local restaurant as a thank you for finalizing a contract. According to XYZ Tech’s Fair Dealing & Anti-Bribery guidelines, what is the most appropriate course of action?

Accept the gift, as it is infrequent and can be considered a minor courtesy.

Accept the gift and immediately report it to your direct supervisor.

Politely decline the gift because its value exceeds the company's $50 USD limit.

Internal Policies

Public data is available to all users.

Data Security and Classification: Data is categorized according to security level, and must be stored accordingly.

Internal data is available to employees only.

Confidential data is available only to specific team members.

How well do you know the XYZ Tech Internal Policies?

An engineer is working remotely and needs to share a newly developed, unreleased feature specification (which contains proprietary information and is classified as Confidential Data) with a team member. Which of the following actions violates XYZ Tech's data handling policy?

Storing the document temporarily on a personal laptop's desktop folder because it is quicker to access later.

Saving the document on the designated, secured, and access-controlled internal network drive.

Emailing the document to the team member using the standard, encrypted XYZ Tech corporate email system.

Legal Obligations

There are four main areas in which legal obligations should be considered before action. Keep an eye out for:

Information Law

Compliance Mechanism

Workplace Conduct

Financial Law

Refer to company guidelines regarding categories of information.

Should you report inapporpriate behaviors, you will be protected.

Your choices in the workplace impact others.

Confidential data must not be used for personal gain.

Info

Info

Info

Info

How well do you know XYZ Tech's legal obligations?

According to XYZ Tech's Insider Trading guidelines, which of the following scenarios involves the misuse of Non-Public Information (NPI)?

An employee overhears a rumor about a potential new competitor and sells a small amount of their company stock.

An employee advises their spouse to purchase XYZ Tech stock after learning the company is two weeks away from officially announcing record quarterly profits.

An employee reads a public news report speculating on a future merger and decides to buy more company stock.

Congratulations!

🎉

🎉

You are now a Compliance Champion for XYZ Tech.

You have demonstrated an understanding of the three foundational pillars of integrity at our company:

  • Ethical Conduct: You know how to recognize and address conflicts of interest and maintain fair dealing.
  • Secure Operations: You understand the critical importance of classifying and protecting Confidential Data.
  • Legal Compliance: You are aware of your legal obligations regarding data privacy, insider trading, and mandatory reporting procedures.
What Happens Next? Your completion has been recorded. These guidelines are a continuous commitment, not a one-time event. Please save this information for future reference:
  • Review: Access the complete XYZ Tech Code of Conduct [Insert Link to Document Here] for detailed procedures.
  • Report: Remember the Integrity Hotline is available 24/7 as your primary confidential channel for reporting violations or seeking guidance.
Welcome to the team!

References

Barao, J. (2025). What is legal compliance: A guide for businesses in 2025. Convene. https://www.azeusconvene.com/articles/legal-compliance Google. (2025). Gemini [Large language model]. https://gemini.google.com/ SBToolkit. (2024). Essential corporate policy guidelines for effective governance. Sustainable Business Toolkit. https://www.sustainablebusinesstoolkit.com/corporate-policy/ Twin, A. (2025). Business ethics: Key principles and their importance in today’s market. Investopedia. https://www.investopedia.com/terms/b/business-ethics.asp

Internal Data

Examples Organizational charts, internal communications (memos, non-sensitive emails), general training materials, department budgets, non-client internal project names. Handling/Storage Must be stored on the secured XYZ Tech corporate network (shared drives or internal cloud platforms). May be shared via internal email or company messaging platforms. Must not be shared externally or transmitted over personal devices. Permission Access is granted to all authorized XYZ Tech employees.

Confidential Data

Examples Client Personally Identifiable Information (PII), proprietary source code, passwords, intellectual property (patents, trade secrets), merger and acquisition plans, internal investigations, unreleased financial earnings. Handling/Storage MUST be stored only in designated, highly-secured, encrypted folders (e.g., restricted access network vaults). MUST NOT be stored on personal devices (laptops, phones, USB drives) or sent via external email, consumer messaging apps, or unencrypted channels. Permission Access is granted on a strict "Need-to-Know" basis only. Access requests require manager approval and are logged.

Public Data

Examples Press releases, marketing materials, general job postings, public website content, annual reports, corporate addresses. Handling/Storage May be stored on public-facing servers (e.g., website), transmitted via standard email, and accessed without authentication. No special security required. Permission No restrictions on access or distribution.