Our Company

We Safeguard Jabil Information

In this section, we'll cover:

Confidential Information — Intellectual Property — Our Competitive Advantage

Jabil employee inspecting circuit board

Our Commitment

We do our utmost to protect Jabil Information. This includes the confidential, restricted, and regulated information of our Company, customers and business partners. This commitment ensures continued success in developing new products and services.

Why It’s Important

The unauthorized release of Jabil information can cause us to lose our competitive advantage, embarrass Jabil and damage our relationships with our customers and business partners. For these reasons, Jabil information must be treated carefully.

Jabil employee working at desk and smiling

How We Do the Right Thing

  • Business Purposes

    Use and disclose confidential, restricted and regulated information only for legitimate business purposes and on a need-to-know basis.

  • Properly Label

    Properly label Jabil information using the Global Digital Information Classification Policy and End User Digital Information Handling Standard to indicate how it should be handled, distributed and destroyed.

     

  • Don't Share

    Don’t share individually assigned account passwords or allow other people, including friends and family, to use our information technology resources.

  • Software Use

    Don’t duplicate, install or use software in violation of Jabil policies, copyrights, trademarks or applicable license terms. This includes software installed on your computer or on network areas.

  • Approved Software

    Only use approved, Jabil licensed software to store or transfer files, share documents or collaborate.

  • Personal Email

    Don’t use personal email or personal shared drives to transfer, store, or share Jabil data files, or for Jabil business and collaboration.

  • Don't Disclose

    Don’t disclose information to third parties, including business partners and suppliers, without the appropriate authorization and required confidentiality agreements. If in doubt, check with your supervisor or the Legal Department.

  • Never Discuss

    Never discuss confidential, restricted or regulated information in public places where others may overhear.

What It Looks Like

Here are some examples of different kinds of protected information:

Examples of confidential information include:

  • Budgets
  • General security program management and operational documentation
  • Supplier contracts
  • Company organization charts
  • Policies
  • Inventory storage locations
  • Training material
  • Risk analysis results
  • Internal and customer audit reports
  • IT information

 

Examples of restricted information include:

  • Executive strategic plans
  • Financial results prior to release
  • Corporate tax information
  • Pricing data
  • Executive memos with sensitive non-public content
  • Customer information
  • Competitive advantage intellectual property
  • Legal data

Examples of regulated information include:

  • Personally Identifiable Information (PII)
  • Private Health Information (PHI)
  • Payment Card Industry (PCI)
  • International Traffic in Arms Regulations (ITAR)
  • Sarbanes-Oxley Act (SOX)
  • Customer IP (Intellectual Property) determined by customer contract

Jabil information exists in many forms and includes information:

  • Stored on computers
  • Transmitted over networks
  • Contained in video format
  • Printed or written on paper
  • Sent by fax
  • Stored on USB drives
  • Discussed during meetings and/or telephone conversations

Jabil Information or Intellectual Property

Any unauthorized disclosure or misuse of Jabil information or intellectual property, either during or after your employment with Jabil, could be harmful to Jabil or to our customers. Our Company, customers and suppliers entrust us with confidential, restricted and regulated information. We must handle it with care, according to any applicable contractual obligations, including the terms of the Confidentiality Agreements we sign as an employee.

Take reasonable precautions to minimize the chance of an unintentional disclosure of sensitive information. For example:

  • Use strong passwords and do not write them down.
  • Secure your computer and workstation.
  • Use Jabil-approved applications for storage and collaboration.
  • Never leave your laptop or mobile phone unattended, particularly when traveling.

If you have questions or concerns about the appropriate use of Jabil information or intellectual property, please contact Global Ethics and Compliance or the Global Cybersecurity & IT Compliance Team.

 

In the next section, we'll cover:

Inside Information — Tipping — Trading

Keep Reading

We Do Not Disclose or Trade On Material, Non-Public Information