Code of Conduct

Confidential Information

Ideas matter

Innovation is the backbone of Convercent. By protecting the value of our ideas and work product, we preserve our future. We respect and protect the copyrights, patents, trademarks and intellectual property of our team, as well as our customers, partners and others.

See how this shows up

If the data you want to use from an outside source is not publicly accessible, don’t use it unless you have paid for it.

We treat our customer data with utmost care

We recognize that at times, we may have knowledge of our customers’ non-public information. We guard this sensitive data and do not use it for our financial benefit and strictly forbid the sharing of this information. See our insider trading policy.

See how this shows up

When working with a customer or prospect, ensure there is a non-disclosure agreement in place before sharing or receiving confidential information.

Data must be safeguarded

Our success is founded on the trust we’ve built among our teammates and with our customers. Our customers entrust us with safeguarding their confidential information, and we respect and protect this data with care and diligence. We honor the privacy of our teammates and safeguard their personal information and never share it with others. See our information security and incident management policies.

See how this shows up

Working with sensitive data? If you don’t have to print it, save the tree and lock your computer when you step away. If you have to print, safeguard the document and shred when you no longer need it.


A: No. Sharing this nonpublic information is illegal.

A: Congratulations! Submit a conflict of interest disclosure so that we can work through the details.

A: Talk to your manager to determine what information can be shared publicly.

A: If you believe your login credentials have been compromised first reset your password which can be done using this link:  Second, contact IT immediately so the possible compromise can be investigated.

A: No. All software, source code and documentation generated or provided by teammates, consultants, or contractors for the benefit of Convercent are the property of Convercent.  The property of Convercent must remain on a Convercent asset which includes not storing Convercent code or data on a home PC or personal storage account.

A: Loading personal or non-approved software on a Convercent laptop has the possibility of license infringement, imposing licensing obligations or introducing malware.  If new software is required, an IT request needs to be submitted so it can be reviewed and approved.

A: Yes, if you are disclosing non-public information about Convercent, contact the Legal team for a non-disclosure agreement.

A: Confidential information that has not been publicly shared that could cause the stock price or company valuation to go up or down. Some examples include: information related to employees, inventions, contracts, strategic and business plans, major management changes, new product launches, mergers and acquisitions, technical specifications, pricing, customer information, proposals, financial data, and product costs.


Confidential – Most private or sensitive information that must be controlled always.  Disclosure may cause severe problems for Convercent, its customer or business partners.  Access to this information must be approved by the Executive information owner.  Examples include client data, mergers and acquisitions, and legal information protected by attorney-client privilege.

Restricted – Private information restricted to those with a legitimate business need.  Disclosure may cause significant problems for Convercent, its customers or business partners.  Access to this information must be approved by an information owner that is typically a director level or higher.  Examples are customer account information, billing and invoices.

Internal Use Only – The information is intended for use within Convercent, and in some cases business partners.  Disclosure of this information to outsiders may cause problems for Convercent, its customers, or business partners.  This type of information is widely distributed within Convercent or it could be distributed within the organization without advance permission.  Examples are internal telephone book, most electronic messages, and incident or root cause analysis reports.

Public – This information has been approved for public or prospect release.  Disclosure of this information will not cause problems for Convercent, its customers, or business partners.  Examples are approved marketing brochures and material posted to the Convercent web page.

A: It depends. If the documents contain your former employer’s confidential or proprietary information, you cannot use or share this information.  Convercent expects all teammates to honor any disclosure or use restrictions on the confidential information they have obtained from former employers or third parties. If you’re unsure, talk to Legal or Ethics & Compliance.

A: It is acceptable to collect competitive intelligence through publicly available information or ethical inquiries. For example you may gather and use information from sources such as: publicly available filings with government agencies, public speeches of company executives, annual reports, news and trade journal article and publications. You may also ask third parties about our competitors, or accept competitive intelligence offered by a third party, as long as there is no reason to believe that the third party is under a contractual or legal obligation not to reveal such information.

A: Any illegal or illicit activity to obtain competitive information, including theft, trespassing, eavesdropping, wiretapping, computer hacking, invasion of privacy, bribery, misrepresentation or searching through trash.

A: Consult Legal or Ethics & Compliance before asking the employee anything about a former employer’s business. Never ask a former employee of a competitor about any information that the person is under a legal obligation not to reveal. This would include any of our competitor’s trade secrets, and probably other confidential information as well.

Is it confidential? Tips for how to tell.