We recognize that information is an essential resource, because of that we count on guidelines that allow us to protect virtual identity, data, infrastructure, devices, and applications property of DESC.

To avoid non-allowed access, use, modification, extraction or destruction of data, a monitoring process is carried out to minimize any cyber-security risk, along with a timely reaction to protect the integrity, confidentiality and availability of the organization’s records.

It is forbidden to send, keep or distribute files or messages of harassment, bullying, discrimination of any kind, offensive, pornography related, slanderous, fake, intimidating or against our values, also “chain” messages.
We recognize that social media is an important tool to support business processes, therefore the employees that use social media because of work purposes must consider the present Code of Conduct, internal policies, applicable legislation, reputation, also consider the best practices in this matter. We do not post or transfer through social media confidential information of DESC neither participate in spreading incorrect information.
Use of computer software for illegal activities or inappropriate behavior that disobey Code of Conduct at DESC is strictly forbidden. They must be used every time in accordance with legal provisions, ethics, and responsibility also based on regulations regarding privacy and author’s intellectual rights, including Licenses or maintenance purchase, among others.
User accounts and passwords are personal; therefore, each worker is accountable for his/her user account provided for working purposes so they must not be shared. All actions and accesses with allocated accounts and passwords are under the user responsibility.

As an employee and / or collaborator of DESC we are obliged to comply with IT policies and procedures and report all deviations that are detected.