Page 21 - New Hire Book 102021
P. 21

USING AND PROTECTING COMPANY PROPERTY                Company property is intended to be used for appropriate Company
           AND INFORMATION                                      business purposes. While incidental personal use of Kontoor
                                                                Brands' information technology resources is permitted on a limited
           Acting with integrity means that we are each responsible for   basis, such use must not interfere with your job responsibilities or
           safeguarding Company property and protecting it from loss,   productivity levels. All Company proprietary information must be
           damage, theft, vandalism, or unauthorized use or disposal.   maintained in strict confidence, except when disclosure is authorized
           This applies to property located in the office, at home or on   by Kontoor Brands or required by law. Upon leaving Kontoor Brands’
           customer premises. Kontoor Brands’ property includes:  employment, associates must return all Company property.


              •  Physical property, including equipment, facilities   Also, remember the following:
                and supplies, inventory and vehicles               •  Lock your computer and other devices when

              •  Intellectual property, including trademarks,        you’re away from them
                patents, copyrights, work methods and practices,   •  Use passwords that adhere to Kontoor Brands'
                and trade secrets                                    Information Security Policy

              •  Proprietary information, including any non-public   •  Do not open e-mails and attachments unless you
                information that might be useful to a competitor     can identify the sender
                or that could be harmful to Kontoor Brands or its   •  Keep sensitive materials close at hand when you
                associates, customers or suppliers if disclosed      are traveling
                and                                                •  Be aware of your surroundings, taking care not

              •  Information technology resources, including         to discuss sensitive or confidential information in
                computer software, computer networks, storage        public places where others may overhear you, and
                devices, e-mail and voice mail.                    •  Never share your passwords with others.





           See our Global Information Security Policy for additional guidance.








                                                                                                            OUR COMPANY  17
   16   17   18   19   20   21   22   23   24   25   26