Use of Company Assets

Expense Claims

  • Every employee has an obligation to each other and to the Company to comply with Infosys business expenses and reimbursement policies and practices.
  • All business-related expense claims must be authorized by the manager.
  • Personal expenses will not be reimbursed by the Company.
More from the code
More from the code

PROTECTING COMPANY ASSETS

Company Confidential Information

For the Company, its confidential information is a valuable asset and every director, employee and agent of the Company must protect it. Confidential information includes all non-public information. It also includes personal information (regardless of its source) that we obtain in the course of business. We must take care that all confidential information is used for Company business purposes only and in case of personal information, in addition, it must be processed on instructions from the Company in accordance with laid out policies, procedures and guidelines and as per applicable privacy laws and regulations.

Upon joining Infosys, all employees sign a Confidentiality and Nondisclosure Agreement which details their confidentiality obligations to the Company. As employees, we have access to significant amounts of company information that may not be available to the public, and we should preserve the confidentiality of information obtained in the Company’s service. Information of a confidential, private and sensitive nature must be used responsibly and controlled and protected to prevent its prohibited, arbitrary or careless disclosure.

Unless the Company has provided its specific consent, which should preferably be in writing, or there is a legal or professional right or duty to disclose, we are prohibited from disclosing confidential Company information. Confidential or proprietary information about clients, our organization, or other parties, which has been gained through employment or affiliation with Infosys, may not be used for personal advantage or for the benefit of third parties.

Our Information Security Policy sets out the expectations on each of us to safeguard confidential information of Infosys and our third parties with the assurance of security, availability, integrity and confidentiality. The Acceptable Usage Policy provides the purposes for which Infosys IT resources may be legitimately used and our cybersecurity responsibilities. These policies, together provide employees with the mandatory directive of safeguarding Infosys and client information.

Our Infosys Privacy Policy sets out the expectations on each of us to process personal information belonging to our employees, clients, agents, consultants, suppliers, and contractors in a manner so as to ensure compliance with all applicable privacy laws and regulations, including processing through cross border data transfer between group entities. Unless authorized and contractually agreed, we are committed to protect the confidentiality of such personal information while processing such personal information, implement adequate technical and organizational measures and employees are made aware of and required to comply with mandated processes under Privacy Policy for responsible use, disclosure, storage, retaining or any other processing of such personal information.

Any incident involving personal data/information (actual or suspected) should be brought to the attention of Data Privacy Office by raising an AHD to DPO or via email at privacy@infosys.com.


Improper Opportunities

When we receive information as part of our job, we should not trade with it for our personal benefit. Neither should we pass on the information to our friends and family members or indirectly compete with the Company. Information obtained as part of our job should not be taken advantage of even after we leave the organization.


Company Intellectual Property

The intellectual property (IP) of the Company must be protected as a vital business asset. Our IP portfolio includes copyrights, patents, trademarks, service marks, trade secrets, design rights, logos, brands and know-how. We must use our IP focusing on protecting these assets. It is important to ensure that to the extent permitted by law, the rights to all IP created using the Company’s time and expense that which are within the scope of our duties are assigned to and are the property of the Company. We should promptly disclose any works, inventions or developments we create to obtain legal protection over them. Please contact the IP Cell at iphelp@infosys.com if you have any questions.


Providing Information to the Media

To protect our confidential information from misuse and to ensure that only accurate information about the Company is disclosed, we have designated our Corporate Communications team to handle exchanges with the media. Additionally, our Chief Executive Officer, Chief Operating Officer, Chief Financial Officer and Investor Relations Department are the official Company spokespeople for financial matters. All inquiries or calls from the press and financial analysts should be referred to the Corporate Communications team. We must not post or discuss information concerning the Company’s services or business on the Internet unless we are authorized to do so. Neither must we create a perception that we are speaking or posting on behalf of the Company. Remember that your online posts will be available for a long time, so think carefully prior to posting any information that could affect our Company.

Speaking to the Media

Any inappropriate or inaccurate response, even a simple ‘NO’ or disclaimer of information, may result in adverse publicity and could otherwise gravely affect the Company’s legal position.

For more information, you may read Infosys Code on Fair Disclosures and Investor Relations which establishes who in the Company may communicate information.


Physical Access Control

Infosys has developed procedures covering physical access control to ensure privacy of communications, maintenance of the security of the Company communication equipment, and safeguard Company assets from theft, misuse and destruction. We are responsible for complying with the security policies in your location. You must not defeat or cause to defeat the purpose for which the access control was implemented. For more details please read the Company’s Information Security Policy.

QUESTION RESPONSE
I recently started working at Infosys. I previously worked for a competitor and just realized I may be involved in developing technology for Infosys that is very similar to what I developed for my prior employer. Should I inform my manager? Yes, immediately inform your supervisor that there may be a conflict with your obligations to a prior employer, but take care not to disclose any confidential information belonging to the prior employer in doing so. You should follow any obligation to your prior employer not to disclose or use their confidential technical information. Infosys expects you to honor your confidentiality obligations to your prior employer. When in doubt about the scope of obligations to a prior employer contact our IP Cell.

Use of Company Assets

The use of Infosys assets for individual profit or any unlawful, unauthorized personal or unethical purpose is prohibited. Our information technology, intellectual property (e.g., copyrights, patents, and trademarks), facilities, equipment, machines, software, and cash may be used for business purposes only, including responsible and accurate expense reimbursement, and in accordance with applicable policies.

Other assets (e.g., computers, printers, and copiers) may be used for minor and incidental personal purposes provided such use is kept to a minimum, and does not create any significant incremental costs, interfere with work duties, or violate any laws or Infosys policies. The use of any Infosys resources for personal political activities is prohibited.

Computer hardware, software, data, and facilities are valuable resources that need protection from potential destruction, theft, or misuse. These resources may also include confidential client or Infosys information that requires safeguarding. It is your responsibility to prevent unauthorized access through the use of ID badges, passwords, or other security codes, and physical security measures (such as using computer cable locks, not leaving computers unattended in cars, and other normal precautions).

Copyrighted materials (e.g., books, music, software, and magazines) should not be reproduced, distributed, or altered without permission of the copyright owner or an authorized agent. Software used in connection with the business of Infosys should be properly licensed and used only in accordance with that license. Using unlicensed software could constitute copyright infringement and may be grounds for disciplinary action. For more information, please read the Company’s policies on use of Company assets.

QUESTION RESPONSE
I recently started working at Infosys. I previously worked for a competitor and just realized I may be involved in developing technology for Infosys that is very similar to what I developed for my prior employer. Should I inform my manager? Yes, immediately inform your supervisor that there may be a conflict with your obligations to a prior employer, but take care not to disclose any confidential information belonging to the prior employer in doing so. You should follow any obligation to your prior employer not to disclose or use their confidential technical information. Infosys expects you to honor your confidentiality obligations to your prior employer. When in doubt about the scope of obligations to a prior employer contact our IP Cell.

Expense Claims

Each supervisor, manager, and individual employee has an obligation to each other and to the Company to comply with Infosys business expenses and reimbursement policies and practices. All business-related expense claims must be authorized by your manager before being incurred. Personal expenses will not be reimbursed by the Company.