Ethics Policy

1. Overview

eCuras is committed to protecting employees, partners, vendors, and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.  When eCuras addresses issues proactively and uses correct judgment, it will help set us apart from competitors.

eCuras will not tolerate any wrongdoing or impropriety at any time.  eCuras will take the appropriate measures to act quickly in correcting the issue if the ethical code is broken. 

2. Purpose

This policy aims to establish a culture of openness, trust, and emphasize the employee’s and consumer’s expectations to be treated to fair business practices.  This policy will serve to guide business behavior to ensure ethical conduct. Effective ethics is a team effort involving the participation and support of every eCuras employee.  All employees should familiarize themselves with the ethics guidelines that follow this introduction.

3. Scope

This policy applies to employees, contractors, consultants, temporaries, and other workers at eCuras, including all personnel affiliated with third parties.

4. Policy

4.1  Executive Commitment to Ethics

4.1.1        Senior leaders and executives within eCuras must set a prime example.  In any business practice, honesty and integrity must be the top priority for executives.

4.1.2        Executives must have an open door policy and welcome suggestions and concerns from employees.  This will allow employees to feel comfortable discussing any issues and will alert executives to concerns within the workforce.

4.1.3        Executives must disclose any conflict of interest regarding their position within eCuras.

4.2  Employee Commitment to Ethics

4.2.1        eCuras employees will treat everyone fairly, have mutual respect, promote a team environment, and avoid the intent and appearance of unethical or compromising practices.

4.2.2        Every employee needs to apply effort and intelligence in maintaining ethics value.

4.2.3        Employees must disclose any conflict of interest regarding their position within eCuras.

4.2.4        Employees will help eCuras to increase customer and vendor satisfaction by providing quality products and timely response to inquiries.

4.2.5        Employees should consider the following questions to themselves when any behavior is questionable:

4.3  Company Awareness

4.3.1        Promotion of ethical conduct within interpersonal communications of employees will be rewarded.

4.3.2        eCuras will promote a trustworthy and honest atmosphere to reinforce its vision of ethics.

4.4  Maintaining Ethical Practices

4.4.1        eCuras will reinforce the importance of the integrity message, and the tone will start at the top.  Every employee, manager, and director needs to maintain an ethical stance and support ethical behavior consistently.

4.4.2        Employees at eCuras should encourage open dialogue, get honest feedback, and treat everyone fairly, with honesty and objectivity. 

4.4.3        eCuras has established a best practice disclosure committee to ensure the ethical code is delivered to all employees and that concerns regarding the code can be addressed.

4.4.4        Employees are required to recertify their compliance to Ethics Policy on an annual basis.

4.5  Unethical Behavior

4.5.1        eCuras will avoid the intent and appearance of unethical or compromising practice in relationships, actions, and communications. 

4.5.2        eCuras will not tolerate harassment or discrimination.

4.5.3        Unauthorized use of company trade secrets & marketing, operational, personnel, financial, source code, & technical information integral to our company’s success and will not be tolerated.

4.5.4        eCuras will not permit impropriety at any time, and we will act ethically and responsibly in accordance with laws.

4.5.5        eCuras employees will not use corporate assets or business relationships for personal use or gain.

5. Policy Compliance

5.1  Compliance Measurement

The <Employee Resource Team> will verify compliance with this policy through various methods, including but not limited to business tool reports, internal and external audits, and feedback.

5.2  Exceptions

None.

5.3  Non-Compliance

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 

Revised: March 14th, 2018

Table of Content

  1. Acceptable Encryption Policy
  2. Acceptable Use Policy
  3. Clean Desc Policy
  4. Data Breach Response Policy
  5. Disaster Recovery Plan Policy
  6. Digital Signature Acceptance Policy
  7. Email Policy
  8. Ethics Policy
  9. Pandemic Response Planning Policy
  10. Password Construction Guidelines
  11. Password Protection Policy
  12. Security Response Plan Policy
  13. End User Encryption Key Protection Policy
  14. Acquisition Assessment Policy
  15. Bluetooth Baseline Requirements Policy
  16. Remote Access Policy
  17. Remote Access Tools Policy
  18. Router and Switch Security Policy
  19. Wireless Communication Policy
  20. Wireless Communication Standard
  21. Database Credentials Policy
  22. Technology Equipment Disposal Policy
  23. Information Logging Standard
  24. Lab Security Policy
  25. Server Security Policy 
  26. Software Installation Policy
  27. Workstation Security (For HIPAA) Policy
  28. Web Application Security Policy
  29.  Analog/ISDN Line Security Policy
  30. Anti-Virus Guidelines
  31. Server Audit Policy
  32. Automatically Forwarded Email Policy
  33. Communications Equipment Policy
  34. Dial In Access Policy
  35. Extranet Policy
  36. Internet DMZ Equipment Policy
  37. Internet Usage Policy
  38. Mobile Device Encryption Policy
  39. Personal Communication Devices and Voicemail Policy
  40. Removable Media Policy
  41. Risk Assessment Policy
  42. Server Malware Protection Policy
  43. Social Engineering Awareness Policy
  44. DMZ Lab Security Policy
  45. Email Retention Policy
  46. Employee Internet Use Monitoring and Filtering Policy
  47. Lab Anti Virus Policy
  48. Mobile Employee Endpoint Responsibility Policy
  49. Remote Access Mobile Computing Storage
  50. Virtual Private Network Policy