Informs employees of restrictions on Cell Phone use and explains how cell phones may be stored and used in the workplace.
What is Cell Phone Policy
Defines “Clean Desk”, explains the importance of keeping sensitive/confidential materials protected and how to maintain a Clean Desk.
What is Clean Desk Policy
Explains acceptable use of internet, email and GCM computers as well as consequences for violations.
What is Acceptable Use Policy
Sets out examples of behavior that are acceptable and unacceptable and describes some of the consequences for unacceptable behavior.
What is Code of Conduct Policy
Four pillars of GCM
Legal, Data, Technology, and Operations
Sets out examples of behavior that are acceptable and unacceptable and describes some of the consequences for unacceptable behavior.
What is Code of Conduct Policy
Discusses use of PTO and unpaid time off.
What is PTO Policy
Explains our expectations when an employee uses a non-Goldfein Device for work purposes. It outlines how to prevent data from being transmitted in an unsecure manner.
Employee Managed Device Policy
Informs employees of their rights and responsibilities related to FMLA leave.
Adhering to GCM compliance, procedures, and policies makes clear three pertinent ideas: What are they?
What is
1. Our (not mine) common welfare comes first. 2. Team comes first before the individual, process before the team, company before the process, and finally, clients before the company - without whom we cannot serve. 3. Think of others - refer to one and two!
Explains our expectations when an employee uses a non-Goldfein Device for work purposes. It outlines how to prevent data from being transmitted in an unsecure manner.
What is Employee Managed Device Policy
Informs employees of their rights and responsibilities related to FMLA leave.
What is FMLA Policy
Explains acceptable use of internet, email and GCM computers as well as consequences for violations.
What is Acceptable Use Policy
Describes the physical access controls in use, sets forth physical security standards and creates a Physical Security Program.
What is Physical Security Policy
our three core values
What is positive attitude, hardwork, and client focused
Explains how to use the portal to anonymously report suspected fraud or misconduct.
What is Fraud and Misconduct Reporting Policy
Encourages employees to raise serious concerns without fear of retaliation
What is Whistleblower Policy
Informs employees of restrictions on Cell Phone use and explains how cell phones may be stored and used in the workplace.
What is Cell Phone Policy
Defines the levels of sensitive information and provides a framework for the management of information security.
What is Information Security Policy
Sets out examples of behavior that are acceptable and unacceptable and describes some of the consequences for unacceptable behavior.
What is Code of Conduct Policy
Discusses use of PTO and unpaid time off.
What is PTO Policy
Explains acceptable use of internet, email and GCM computers as well as consequences for violations.
What is Acceptable Use Policy
Defines “Clean Desk”, explains the importance of keeping sensitive/confidential materials protected and how to maintain a Clean Desk.
What is Clean Desk Policy
Explains how to use the portal to anonymously report suspected fraud or misconduct.
What is Fraud and Misconduct Policy
Defines the levels of sensitive information and provides a framework for the management of information security.