COD Policy - 2022
COD Policy - 2022
Finance and
Legal Council
1.0 March, 2016 IPO Zone VP HR Partner Base Version – New Format
Finance and
Legal Council
Finance and
Legal Council
Job code addition eligible for
2.1 May 6th, 2019 Schneider Digital Zone VP HR Partner COD – Mobile phones
Finance and
Legal Council Job code addition eligible for
COD – Mobile phones Addition
2.2 Nov 1st ,2019 Schneider Digital Zone VP HR Partner of Android Phones
2.4 April 1st, 2021 Schneider Digital Zone VP HR Partner Re-definition of designations
This policy elaborates the entitlements and the guidelines to be followed for Company Owned IT
devices.
Purpose
The company recognizes that employee may have need of IT devices to perform his/her duties. The company
shall endeavor to provide an employee with appropriate tools to enhance their productivity.
Applicability
This policy is applicable to all permanent employees and temporary contract employees based of
Schneider Electric in India including global reportees excluding Luminous entities.
Industrial PC’s and project specific requirements are not governed by this policy.
Policy Statements
Employee must abide by the “Principles of Responsibilities” while accessing or sharing Schneider
Electric Information.
The policy is restricted only for usage of COD for business use. By requesting COD service, an
employee is obliged to comply with the "Company Owned Device Acceptable Use Policy".
The overriding goal of this policy is to protect the integrity of the confidential business data that resides
within Schneider Electric’s technology infrastructure. This policy intends to prevent this data from being
deliberately or inadvertently stored insecurely on a device or carried over an insecure network where it
could potentially be accessed by unsanctioned resources. Such breach can result in loss of information,
damage to critical applications, loss of revenue, and damage to the company’s public image. Therefore,
all users employing a device connected to Schneider Electric’s corporate network, and/or capable of
backing up, storing, or otherwise accessing corporate data of any type, must adhere to company-defined
processes for doing so.
The policy addresses a range of threats to, or related to the use of, enterprise data:
Threat Description
Device Loss Devices used to store, transfer or transport work files could be lost or
stolen.
Data Theft Sensitive corporate data is deliberately stolen and sold by an employee
or unsanctioned third party.
Malware Viruses, Trojans, worms, spyware and other threats could be
introduced via a mobile device.
Compliance Loss or theft of financial and/or personal and confidential data could
expose the enterprise to the risk of non-compliance with various identity
theft and privacy laws
Addition of new hardware, software, and/or related components to provide additional device will be
managed at the sole discretion of IT Department (Schneider Digital). This policy is complementary to
any previously implemented policies dealing specifically with data access, data storage, data
movement, and connectivity of devices to any element of the Schneider Electric´s enterprise network.
Configuration
Schneider Digital is responsible for managing all dealings with Vendors and Service Provider(s) and for
recommending configuration as necessary. Schneider Digital will ensure that proper coverage
scheme(s) and communication plans are in place and adhered to. It is the responsibility of Schneider
Digital to decide on the sourcing and configuration of the devices depending upon the requirements of
the user. Current approved configurations of Company Owned Devices are detailed in Table 1.
Configuration keep changing due to technology evolution and standardization. Revised specification
device will be offered only when the current device is due for refresh. There is no initiative to mass replace
all devices already allotted to employees.
Any eligible employee, who desires to opt for this policy benefit, must raise a request with (Schneider
Digital) Helpdesk (Support@Schneider). Such request shall be processed only post approval of the
respective Manager of employee. Eligibility is defined in Table 2.
After the refresh period is completed, user needs to raise a request through (Support@Schneider) and
follow the same procedure as obtaining a new machine. If a new device is requested before the
prescribed period, it will be considered after due assessment and clearance by Schneider Digital as
well as after due approvals from the respective manager and BU Head.
All costs will be as determined by Schneider Digital and will be binding on the employee. The amount
will be recovered from the employee’s salary.
Replacement of COD will be processed only post confirmation of deduction from payroll or finance.
*Any exceptions from above will need approval as per Annexure -1.
Accessories
*Any exceptions from above will need approval from IMT and HRBP.
Guidelines
□ Schneider Digital will maintain up-to-date record of device users across Schneider Electric India
□ Each employee would be provided with either a laptop or a desktop. No employee will be
provided with a laptop and a desktop both at the same time
□ Employees are not allowed to purchase any IT assets and submit the claim for
reimbursement. All IT assets will be procured through Schneider Digital based on requests
received via (Support@Schneider).
□ Schneider Digital will ensure that Computer is protected by Security Data Management
Protection Scheme as per uniform policy for which they may recall the computer for updating
and return as per schedule
□ Although company provided devices are intended to be used for company business, it is
recognized that it is impractical to impose such limitation. Therefore, personal use is not
prohibited, but the Company expects employee to exercise prudent judgment in keeping
personal usage to a minimum and compliant with POR policies of Schneider.
□ The company has every right to investigate and scrutinize the Company Owned Devices for
POR violation.
□ Users are responsible for maintaining appropriate back-ups, especially of the work-related
documentation & data created that cannot be retrieved by reinstalling operating system or
program. The backups should be taken only in the storage approved by Schneider Digital and
not on public cloud.
Promotion or Change in User Segmentation does not automatically qualify for change in COD. This will
be processed based on the manager's approval and a new device or a used device will be issued
depending on the inventory.
Before an employee leave Schneider Electric India, all IT assets should be handed over to local IT
department (only) on or before the last working day. Full and final clearance is subjected to confirmation
from IT on the receipt of Assets.
Termination of Employment
On Leaving the service of Schneider Electric India, HR / Personnel Department must ensure that the
employee hands over company’s devices, with all accessories (if any) to the IT department / Branch Manager
/ Plant-in charge and receipt thereof should be obtained by the outgoing employee. Recipient of the device
should clearly endorse it in employees full and final clearance form and hand over the device(s) to IT
department.
Exceptions
Any exception to defined eligibility, depending on the role profile and business requirement, shall require
approval of respective BU or Function Head approval as per Annexure -1.
Software Installations
As an employee of Schneider Electric, it is your responsibility to only use software obtained from
approved corporate sources.
All software installed on company issued devices need to be correctly licensed and used for business
purposes. All SE non-complied copies of software including cracked versions must be removed from
your devices. These include software stored on your USB devices that you connect to your Schneider
computer.
All Schneider systems are scanned regularly to check for such software’s. If any such software is found on
your system, actions will be taken to remove it. If further checks of your computer identify repeat occurrence
of such SE non-complied software, leaders will be informed and may result in actions as outlined in the HR
policies.
If your system is identified to have any SE non-complied or cracked software, Schneider Digital team will
approach you and anticipate following actions:
Engineering
Lenovo P15 (16GB, 512 SDD, Nvidia T2000)
Laptop
Mobile iPhone 11 (128 GB), iPhone 12 (128 GB), Samsung A32 128GB,
Phones iPhone Samsung Note 10 128GB
Android Based on eligibility.
Data Card 4G LTE Wi Pod Jio , Airtel
COMEX/SVP/VP/IMT/ As per
- Lenovo X5 Yoga iPhone12-128GB
Country President requirement
Samsung Galaxy
Note 10-128GB
- Mobile phones
As per for GSC are
Field Service Operations
- Lenovo X5 Yoga Samsung A32 - prevailing issued for VPs
128GB Norms & Above
Tech Pre-Sales, Lenovo As per
Software Developers, P340 Lenovo T14s Director, Senior prevailing - Allocation of
R&D Users Lenovo P15 General Manager / norms Laptop or
Principal Architect / Desktop is at
Lenovo M80q Eligible job codes (as As per manager’s
Other Office Lenovo T14s prevailing discretion
Tiny & M80s per annexure 2):
users norms
SFF iPhone 11- 128GB,
Samsung A32
128GB.
Note : Job codes
Marked with * are As per
Contingent Available Available working eligible only for prevailing
Workforce/Temp working PC PC
Samsung A32 norms
Not Eligible for
Exception Approval
Note:
□ It will be mandatory for COD users to allow control of iPhone management by Schneider Digital using
the prevalent application; current approved application is InTune Company Portal.
□ In case of mobile phones if the prescribed model is not available in the market then the next lower
model will be allocated.
□ Employees desiring to use their own phones (BYOD) to access SE network and applications
can raise a (Support@Schneider) ticket to connect their device to SE network
*Departments not mentioned above will need to obtain approval from respective SVP and Vice president of Schneider
Digital.