Sorry, you need to enable JavaScript to visit this website.

Last Updated on: May 2025

Maintaining Confidentiality at Work

Confidential information should only be accessed when approved and necessary to perform your job. Personal data is our golden treasure and we must keep it confidential. 


    Confidential information dealing with company specific data.

    Examples include:

    • Business plans or strategies 

    • Merger and acquisition plans 

    • Financial results 

    Customer data. Our customers’ trust is our most valuable asset. We must protect our customers’ data as if it is our own—because it is. Customer data that is housed within our system and the information they share with us should only be accessed and shared on a need-to-know, need-to-access basis. 

    Public information is data which can freely be found through public resources such as publications released through our Communication or Legal groups, or found on sources external to the company, such as industry publications and websites.

    We protect our customers.

    We must maintain a secure environment that protects against cyber-attacks and malware that could harm our company and our security.  

    Our systems contain highly sensitive information belonging to our company, our customers and our partners. Our Teammates, customers, and partners trust us to keep this information safe and secure. 

    Information security is only as strong as its weakest link: each Teammate plays a crucial role in protecting Longs Peak and its customers’, partners, vendors, etc. Information. 

    Each of us must prevent unauthorized access to sensitive information. Likewise, we must use company assets—computers, mobile devices, etc.—for proper business purposes and with discretion when in public settings. 

    We strive to keep our competitive edge.

    We do what we say we are going to do, with the data we collect, store and have access to, according to and in line with the consent(s) we have been given. It's more than a commitment - it is an  essential product offering

    We protect our company's interests.

    • Preserve: Preserve the confidentiality of the information you have access to—only you were told for a reason. 

    • Prevent: Prevent those who have not been directly given access to the confidential information from seeing and knowing that information. 

    • Protect: Be aware of and safeguard the confidential information you have access to by not telling other people about that information and not allowing them to access that information. 

    • Report: Report any unauthorized use or access to confidential information. 

    We know our audience.

    All Teammates are expected to follow global privacy laws and honor customers’ choices to keep their data secure and confidential.

    Most internal security risks are accidental and unintentional. Using personal, unauthorized, or unsecured devices to store confidential information, sending confidential information to the wrong person, or even installing a third-party app that you wouldn't think twice about using on your own laptop can lead to a data breach.

    Acceptable Use Policy

    Have an Ethics & Compliance Question?

    Our Ethics Office and the Compliance team here at Longs Peak are here for you.  Please reach out if you are unsure or have any questions about our Code of Conduct content.

     Policies FAQs

    251

    Maintaining Confidentiality at Work

    All Rights Reserved