Physical Assets — IT Assets — Cybersecurity
We Use Company Assets Wisely and Respond to Cybersecurity Incidents Responsibly
In this section, we'll cover:

Our Commitment
Jabil’s success over the long term requires that we protect and use our assets wisely. We must be vigilant in protecting them from loss, damage, theft, waste and improper use.
Why It’s Important
Jabil provides us with various resources (“Company assets”) to aid in the performance of our job responsibilities for the Company. Each of us is entrusted with the care of Company assets. How we protect them varies depending on the type of asset and our particular role. We always make sure to safeguard one of our most essential assets: Jabil’s reputation.

How We Do the Right Thing
-
Use Assets Responsibly
Jabil assets should be used in a responsible, professional manner and for work-related purposes only.
-
Get Approval
Jabil assets, including scrap and obsolete materials, must not be given or sold to anyone without appropriate approval.
-
Use Authorized Software
Jabil assets should only be stored or shared using Company authorized software, cloud or Software as a Service (SaaS) applications, devices and procedures.
-
Social Media
All social media platforms (e.g. WeChat, TikTok, Facebook, Instagram, etc…) are not approved by Information Security for business use beyond their use with public information. Jabil data should only reside on Jabil approved devices and locations.
-
Limited Personal Use
Limited personal use of Company phones and email is allowed as long as it does not have a negative impact on your performance, productivity or the work environment, or violate any Jabil policies or laws.
-
Personal Email
Personal email or personal shared drives should not be used to transfer, share, or collaborate on Jabil assets.
Jabil Property
Information or data created, received or maintained on Jabil assets, such as computer files, emails, chats or text messages, voicemail messages and Internet usage, are considered Jabil property. The Company reserves the right to monitor, access, review, copy, modify, delete or disclose such contents as deemed necessary and appropriate for a legitimate business purpose. Accordingly, your expectation of privacy when using Jabil assets is limited.
What It Looks Like
Jabil issued and/or supported IT assets, such as:
- Computers
- Phones
- Peripheral equipment (e.g., printers)
- Software applications (e.g., email)
- Other associated devices, systems, networks and their contents
Jabil physical property, such as:
- Facilities
- Equipment
- Tools
- Vehicles
- Inventory
- Scrap or obsolete materials and supplies
Other corporate asset types, such as:
- Financial resources
- Intellectual property
- Confidential, restricted and regulated information
- Paper and electronic files and documents
- Branding and logos
Cybersecurity
We are all dependent on networks, databases and the information they contain. We must do our part to protect our data and information systems from accidental and intentional breaches:
- Follow our policies and practices designed to protect our networks, computers, programs and data from attack, damage or unauthorized access.
- Protect usernames and passwords.
- Be alert to phishing scams or other attempts to uncover sensitive personal or corporate information.
- Don’t open suspicious links in emails, even if you think you know the source.
- Be wary of emails or chats with unusual requests, even if they come from someone you recognize.
If you see something, say something! Report suspicious activity immediately to the Global Ethics and Compliance Team, your direct manager or any member of the Corporate Information Security organization.
Find Out More
In the next section, we'll cover:
Social Media — Being Respectful — Sensitive Topics