Teradata Corporation Code of Conduct
vendors have the appropriate licenses and ability to use such material before it is incorporated in presentations or other media.
We may use open source computer code, which is often freely available, in connection with Teradata intellectual property. However, the licensing terms for some open source computer code could mean that related (or even unrelated) Teradata intellectual property might be placed in the public domain. This is particularly a concern if the open source computer code is embedded in our products in certain ways or is not used in accordance with certain requirements that are necessary to avoid that consequence.
Teradata has adopted and applies Intellectual Property and open source content policies, practices, and procedures. Associates involved in activities related to such must be familiar with and comply with them. If you have any questions about Intellectual Property or open source content, contact your manager or the Teradata Law Department.
Teradata Certified Professional Programs
Our Company provides us with the resources we need to obtain professional certifications. Those taking certification exams must read and understand the TCPP Security Policy BEFORE obtaining exam study material and/or taking any exams. Certification exam content (both the questions and answer options) is part of Teradata’s intellectual property and is not to be shared or discussed with anyone in any manner. People or entities that copy, distribute, post, receive, download, buy, or sell our proprietary materials are violating laws, Teradata rights, and Teradata policies. Associates must refrain from engaging in any such activity. If you come across any such materials, you should report it to TCPP Security (e-mail at TCPP.Security@teradata.com).
Data Protection
Teradata has built a well-deserved reputation as an organization that has earned the trust and respect of our customers. We must uphold that trust and respect by protecting the confidentiality, integrity, and availability of data, including personal information. Each of us must follow all relevant procedures for processing and handling confidential data, such as:
Allowing access only by authorized persons (e.g., Teradata associates and business partners with a legal and legitimate need to know it) for legitimate Teradata business purposes and associated time periods.
Closely guarding passwords and the technology accessed with those passwords.
Resisting the instinct to be immediately helpful when unverified or unauthorized people seek access to data, funds, or approvals, such as through pre-texting or phishing attempts.
Maintaining careful backups in accordance with and otherwise complying with our data management Policies and Information Protection standards.
Never sending such data to your personal email/devices.
If you become aware of a data security incident, violation or breach, no matter how minor, you have an obligation to Teradata and our customers to report it immediately so we can address and limit any damage, make any filings or disclosures required by applicable laws, regulations, or contracts, and take steps to comply with other data and privacy protection laws and regulations as quickly and completely as possible. Ignoring a data security breach is not an option.
All of us should read, understand, and comply with the provisions of our Global Privacy Policy located at Teradata.com/privacy.