Our Company

We Use Company Assets Wisely and Respond to Cybersecurity Incidents Responsibly

In this section, we'll cover:

Physical Assets IT Assets Cybersecurity

Two Jabil employees inspecting circuit board on factory floor

Our Commitment

Jabil’s success over the long term requires that we protect and use our assets wisely. We must be vigilant in protecting them from loss, damage, theft, waste and improper use.

Why It’s Important

Jabil provides us with various resources (“Company assets”) to aid in the performance of our job responsibilities for the Company. Each of us is entrusted with the care of Company assets. How we protect them varies depending on the type of asset and our particular role. We always make sure to safeguard one of our most essential assets: Jabil’s reputation.

Engineer looking into microscope

How We Do the Right Thing

  • Use Assets Responsibly

    Jabil assets should be used in a responsible, professional manner and for work-related purposes only.

  • Get Approval

    Jabil assets, including scrap and obsolete materials, must not be given or sold to anyone without appropriate approval.

  • Use Authorized Software

    Jabil assets should only be stored or shared using Company authorized software, cloud or Software as a Service (SaaS) applications, devices and procedures.

  • Social Media

    All social media platforms (e.g. WeChat, TikTok, Facebook, Instagram, etc…) are not approved by Information Security for business use beyond their use with public information. Jabil data should only reside on Jabil approved devices and locations.

  • Limited Personal Use

    Limited personal use of Company phones and email is allowed as long as it does not have a negative impact on your performance, productivity or the work environment, or violate any Jabil policies or laws.

  • Personal Email

    Personal email or personal shared drives should not be used to transfer, share, or collaborate on Jabil assets.

Jabil Property

Information or data created, received or maintained on Jabil assets, such as computer files, emails, chats or text messages, voicemail messages and Internet usage, are considered Jabil property. The Company reserves the right to monitor, access, review, copy, modify, delete or disclose such contents as deemed necessary and appropriate for a legitimate business purpose. Accordingly, your expectation of privacy when using Jabil assets is limited.

What It Looks Like

Jabil assets include, but are not limited to:

Jabil issued and/or supported IT assets, such as:

  • Computers
  • Phones
  • Peripheral equipment (e.g., printers)
  • Software applications (e.g., email)
  • Other associated devices, systems, networks and their contents

Jabil physical property, such as:

  • Facilities
  • Equipment
  • Tools
  • Vehicles
  • Inventory
  • Scrap or obsolete materials and supplies

Other corporate asset types, such as:

  • Financial resources
  • Intellectual property
  • Confidential, restricted and regulated information
  • Paper and electronic files and documents
  • Branding and logos

Cybersecurity

We are all dependent on networks, databases and the information they contain. We must do our part to protect our data and information systems from accidental and intentional breaches:

  • Follow our policies and practices designed to protect our networks, computers, programs and data from attack, damage or unauthorized access.
  • Protect usernames and passwords.
  • Be alert to phishing scams or other attempts to uncover sensitive personal or corporate information.
  • Don’t open suspicious links in emails, even if you think you know the source.
  • Be wary of emails or chats with unusual requests, even if they come from someone you recognize.

If you see something, say something! Report suspicious activity immediately to the Global Ethics and Compliance Team, your direct manager or any member of the Corporate Information Security organization.

In the next section, we'll cover:

Social Media — Being Respectful — Sensitive Topics

Keep Reading

We Communicate About Our Company and Use Social Media Responsibly