0% found this document useful (0 votes)
65 views2 pages

Information Protection Agreement Form

This agreement outlines rules for protecting confidential information at Marriott, including personal data of guests and employees. Employees must protect all confidential information, use it only for work purposes, and report any loss or unauthorized access. Key types of confidential information and resources for privacy and security policies are defined.

Uploaded by

Lakshya Bhalla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views2 pages

Information Protection Agreement Form

This agreement outlines rules for protecting confidential information at Marriott, including personal data of guests and employees. Employees must protect all confidential information, use it only for work purposes, and report any loss or unauthorized access. Key types of confidential information and resources for privacy and security policies are defined.

Uploaded by

Lakshya Bhalla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Information Protection Agreement

This Information Protection Agreement (“Agreement”) applies to all associates/employees of the Marriott Group, which includes
Marriott International, Inc. and its subsidiaries/affiliates (collectively, the “Company”) and all Company Hotel Brands.
You are responsible for complying with Agreement. Please read the Agreement in full, complete the acknowledgement box
at the bottom, and return the original signed Agreement to your Human Resources representative.
Note: this Agreement does not prohibit associates/employees from discussing the terms and conditions of their employment
in accordance with applicable law, including the U.S. National Labor Relations Act. Nor does it prohibit any other legally-
protected communications or activities.
What Information is Covered by This Agreement? Sensitive Personal Data
Two types of information are covered by this Agreement: • A type of Personal Data that includes: (i) social security
• Confidential or Proprietary Information about or number, taxpayer identification number, passport
belonging to the Company; and number, driver’s license number, or other government-
• Personal Data about our guests, associates, owners, issued identification number; (ii) credit or debit card
franchisees, or other identifiable persons details or financial account number, with or without any
code or password that would permit access to the
Both types of information will be referred to as “Confidential
account, or credit history; or (iii) information on race,
Information” for purposes of this Agreement.
religion, ethnicity, sex life or practices, or sexual
Importance of Protecting Confidential Information orientation, medical or health information, genetic or
All associates are responsible for protecting Confidential biometric information, biometric templates, political or
Information from loss, destruction, theft, or misuse at all philosophical beliefs, political party or trade union
times. Such information must be used only as intended for membership, background check information, judicial data
legitimate business purposes and must not be shared with such as criminal records, or information on other judicial
anyone who does not have a business need or is otherwise or administrative proceedings.
authorized by the Company to receive this information. How to Protect Confidential Information
Definitions and Examples of Confidential Information Much of the information you work with contains or involves
Company Confidential or Proprietary Information Confidential Information. Protecting this information
requires you to take care in engaging in conversations,
• Information that is: (1) created, obtained, or used by the working with paper documents, or sending or receiving
Company that derives independent value from not being electronic communications such as email, voicemail, screen
generally known to the public; (2) might harm the shares, and instant or text messages.
Company or its guests, associates, owners, franchisees,
You must also take care when accessing or working with
or other persons if disclosed; or (3) might be of value to
the Company’s competitors and is undisclosed or Company systems or reports generated from these systems,
commercially-sensitive. including MARSHA, property management systems, payroll
or other HR systems, and computer software or applications.
• Examples: information about the Company’s customers,
sales and marketing plans, pricing strategy, personnel Confidential Information must be protected regardless of
matters, financial data, means of doing business where it resides, including in physical documents, laptops,
(including all technical system information), management desktop computers, mobile and other wireless devices, and
agreements, franchise agreements, licensing agreements, external storage devices such as CDs and flash drives.
loyalty program plans and strategies, standard operating Key Privacy and Information Security Resources
procedures, policies, product or service developments,
internal memoranda, associate user names and You are required to review applicable Marriott policies and
passwords, and trade secrets. standards on Marriott Global Source (MGS), including:
Personal Data • Global Information Security Policy (MIP-29)
• Global Privacy and Personal Data Governance Program
• Information that relates to an identified natural person
(MIP-91)
or to an identifiable person.
• Enterprise Records Management (MIP-15)
• An identifiable person is a natural person who can be
• Information Disclosure to Owners & Franchisees (MIP-72)
identified, directly or indirectly, by reference to an
• Data Classification Standard (IT-PRV-001)
identifier such as a name, a unique identification number,
• Information Protection & Privacy Standard (IT-SEC-002)
an email or IP address, location data, or other
information associated with the individual, such as guest How to Report an Incident
account information, associate personnel information, or If you believe any Confidential Information has been lost,
other data specifically recognized as Personal Data by stolen, or subject to any unauthorized access, disclosure, or
applicable laws, regulations, or legal authorities.
misuse, please contact your Manager, Human Resources
• Personal Data is also often referred to as “Personally representative, or Secure@Marriott.Com immediately.
Identifiable Information (PII)” or “Personal Information”
in some jurisdictions. In such instances, the broader You can also call the Business Integrity Line to report the
definition of Personal Data will apply. incident (anonymously, if you choose) at +1-888-888-9188
or +1 (770) 582-5248.

1
March 2020
I WILL PROTECT CONFIDENTIAL INFORMATION BY: Clearly Labeling Confidential Information
Asking Questions and Reporting Problems • Label all pages of Confidential Information as required by
relevant policies and standards, such as “MARRIOTT
• Ask my Manager or the IT Help Desk if I am unsure how
CONFIDENTIAL AND PROPRIETARY INFORMATION”.
to handle a request for Confidential Information.
• Report any instances of non-compliance to my Manager. Protecting Passwords
Respecting Privacy and Confidentiality • Use passwords that are long, contain combinations of
numbers, symbols, and upper- and lower-case letters, are
• Respect the privacy of, and keep confidential, Personal
difficult to guess, and do not contain real words, phrases,
Data of all guests, associates, hotel or residence owners,
or personal information.
club members, authorized licensees, franchisees, and any
• Do not repeat passwords or use similar passwords for my
other parties who provided such data to the Company.
Company accounts and personal accounts.
• Apply an extra level of protection and higher duty of care
• Keep passwords secret and never share them.
to any Sensitive Personal Data.
• Change passwords immediately if I believe someone may
• Use Confidential Information only to perform my job.
have gained access to my account, and report the issue
• Be aware of my surroundings and use good judgment
immediately to Secure@Marriott.Com.
such as by not discussing or displaying Confidential
Information in any public places. Using Computer Resources Wisely
• Treat others’ Confidential Information with the same • Use Company voicemail, email, Internet, and other
level of care I would use for my Confidential Information. technology wisely and primarily for business purposes.
• Never share Confidential Information with news media, • Understand the privacy risks of electronic
government officials, shareholders, other interested communications such as email or instant messages.
persons, or the public without proper authorization from These are not secure methods for transmitting
Communications & Public Affairs, the Law Department, Confidential Information. If necessary to share such
or as required by law. information, consider using other secure platforms.
Securing Confidential Information • Do not do business on unsecured wireless networks.
• Do not download suspicious applications from unknown
• Only share Confidential Information with other associates
vendors or click on links within suspicious emails.
or other individuals specifically authorized by the
• Do not reply to unsolicited emails, texts, or pop-up
Company if needed to perform their jobs.
messages that ask for any Confidential Information.
• Use passwords, encryption, or other protections when
sending or receiving Confidential Information such as Protecting Computers and Systems
Personal Data or Sensitive Personal Data. • Never disable anti-virus software or security patches that
• Use extreme caution when sending any Confidential the Company has installed or updated. If I am
Information by email, fax, or other electronic means by responsible for maintaining any computer equipment at
always double-checking recipients and calling ahead to my business location, I will ensure that all equipment is
ensure that recipients are expecting the information. protected with current anti-virus software and patches.
• Allow access to Confidential Information by third parties • Do not disable or attempt to circumvent any encryption.
(e.g., owners, contractors) only under confidentiality • Always protect computers and portable devices, such as
agreements approved by the Law Department. by locking my screen when away, never leaving a
• Keep Confidential Information in physical form (e.g., computer unattended while traveling, and never
paper documents, flash drives, or mobile devices) in a checking a laptop with luggage or leaving it my car.
secure place such as a locked office or drawer.
Complying with Privacy and Software Licensing Laws
Properly Disposing of Confidential Information
• Comply with any instructions I receive relating to privacy
• Comply with the Company’s record and data retention or information protection laws.
requirements, including by properly disposing of • Comply with software laws by ensuring proper licensing
Confidential Information in a secure manner. and not copying software unless allowed by the vendor.

I have read, understand, and agree to follow this Information Protection Agreement. I understand that my failure to follow this
Agreement may result in serious consequences, up to and including termination of employment. I also understand that my
obligation to protect and maintain the confidentiality of Confidential Information applies both during my employment and after
my separation from employment with the Company.
Associate/Employee signature__________________________________________________________________________
Date___________________________ Print Name__________________________________________________________
Business Location/Department_________________________________________________________________________

2
March 2020

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy