Handbook Reg Handbook Reg
Handbook Reg Handbook Reg
Please note the Handbook comprises of all the Annexures that are required to be read & signed by the Employee
at the time joining Hexaware Technologies Limited ("Company")
You hereby declare that the information provided by You in the attached Annexures is true and subject to
verification and understand that any incorrect, false information given by You will render you unconditionally liable
for immediate termination of your employment.
Page 1 of 63
1 ANNEXURE 1
AGREEMENT FOR ASSIGNMENT OF INVENTIONS, COVENANT AGAINST DISCLOSURE AND
AGREEMENT NOT TO COMPETE
Property rights: During and after my employment/engagement with Company, I will not disclose or use any
knowledge or information of an unpublished, confidential, proprietary, or trade secrete nature generated or
otherwise acquired by me from Company or its customers. I agree that all concepts, designs, inventions, or
improvements which I may conceive, make, invent, or suggest during my employment/engagement by Company.
relating generally to any matter of thing, including computer programs, systems, designs, manuals, documentation,
products, processes, or methods which may be connected in any way with Company. work or with work or tests
carried on by Company., shall become the absolute property of Company.
Obligations: During and after my employment/engagement with Company, I agree to keep all such knowledge and
information confidential in perpetuity.
*Disclosure: I agree to disclose promptly to my immediate supervisor all such concepts, designs, inventions,
improvements, and any developments, I have made during my tenure with Company.
*Compliance Not Contingent Upon Additional Consideration: I have not been promised, and I shall not claim,
any additional or special payment or compensation for such assignments and for compliance with the other
covenants and agreements herein contained.
*Prior Inventions: If, prior to the date of execution of this Agreement, I have made or conceived any unpatented
inventions, improvements, concepts, designs, or developments, whether patentable or unpatentable, which I desire
to have excluded from this Agreement, I have attached to this Agreement a complete list and brief description
thereof
*Covenant Against Disclosure: In addition to all other obligations with respect to the observance of the local
government security regulations, I understand that it may be desirable or necessary for the Company. or any of its
suppliers, licensors, or customers to disclose to me information relating to the technology, systems methods of
operations, products, and business data of Company. or its suppliers, licensors, or customers and, I therefore
agree as follows:
Page 2 of 63
(a) To accept and retain such data and information in complete confidence and, at all times during or after the
termination of my employment/engagement, not to disclose or reveal such data or information to others and refrain
from using such data for purposes other than those purposes authorised in writing by the Company.
(b)Not to directly or indirectly publish, communicate, divulge, or describe to any unauthorized person nor use, claim,
patent, or copyright any such data or information during the term of my employment/engagement or at any time
subsequent thereto without the prior written consent of the Company.
(c) To keep the contractual relationship of the Company. with its Company. suppliers, licensors, or customers
confidential. I further agree not to disclose any supplier, licensor, or customer relationships to any third party.
I also agree that for a period of two years after my termination of employment/engagement with Company, I will not
contact, communicate, or have any business dealings with, either directly or indirectly, any customer of Company.
"Customer" includes those who are customers of Company. on the date of termination of this contract as well as
those who were customers of Company. at any time two years prior to the termination of this contract. For
avoidance of doubts, I understand that my obligation of "not to compete" as mentioned in this agreement will apply
to all customers of Company or clients of customers on whose projects I am deputed or assigned whilst being in the
employment/engagement of Company.
I further agree that during my term of employment with Company, I shall devote my skills and best efforts to the
service of Company. and not perform any other activities for any competitor of Company.
Reasonable Scope: I understand that unauthorized disclosure or use of Hexaware's or its customer's, unpublished
confidential, proprietary, or trade secret information is likely to Cause irreparable harm to Hexaware or its
customers. I agree that Hexaware or its customers shall be entitled to, individually or jointly, an injunction
restraining such unauthorized use of disclosure without (i) proof or irreparable harm or (ii) posting an injunction
bond.
* In the event that any provision of this paragraph is deemed to be overly broad and unenforceable, the parties
hereto stipulate and agree that any court of competent jurisdiction shall have the right to so limit, amend, or
construe said provision so that the same shall be enforceable and hereby request the court to so act.
*Severability: Each paragraph and provision of this Agreement is severable from the contract and if one provision
Page 3 of 63
or part thereof is declared invalid, the remaining provisions shall nevertheless remain in full force and effect.
*Entire Agreement: This Agreement shall inure to the benefit of and be binding upon my heirs, executors,
administrators, and assigns and the successors and assigns of Company.
The Failure of Hexaware to exercise its rights under or insist upon strict performance of the provision of the
Agreement shall not operate as a waiver thereof or preclude Hexaware from exercising its rights.
Page 4 of 63
ANNEXURE 2
CONFIDENTIALITY AGREEMENT
I, Sharad Verma currently residing at NA with permanent residence at, Flat No. 1790, Avlon Tower,Mahagun
Moderne,Sector 78, , Noida/NCR,Uttar Pradesh,Noida,Uttar Pradesh,IN - 201301, this 09 day of OCT (month),
2023 (year), having been employed/engaged/Contracted by Hexaware, (hereinafter referred to as Company)
having its registered office at 152 Millennium Business Park, TTC Industrial Area, Sector –3, A Block, Mahape,
Navi Mumbai 400701, from 08-Oct-2023 (date of joining /retaining), agree to the following terms:
During and after my employment/engagement /contract with Company, I will not disclose or use any knowledge or
information of an unpublished, confidential, proprietary, or trade secret nature generated or otherwise acquired by
me from Company or its customers. During and after my engagement with Company, I will keep all such
knowledge and information confidential.
At the conclusion of my employment / engagement with Company, or on demand at any time during my
employment / engagement, I will immediately return to Company any drawings, writings, prints, documents,
computer media, samples, prototypes, parts, or anything else containing, embodying, or disclosing any of
Company's or its customer's unpublished, confidential, proprietary, or trade secret information that are in my
possession or subject to my control. I understand that all such materials, whether generated by me or by others,
shall at all times remain property of Company or its customers.
I understand that unauthorized disclosure or use of Company's or its customer's unpublished confidential,
proprietary, or trade secret information is likely to cause irreparable harm to Company or its customers. I agree
that Company or its customers shall be entitled to, individually or jointly, an injunction restraining such
unauthorized use of disclosure without (i) proof or irreparable harm or (ii) posting an injunction bond.
The failure of Company to exercise its rights under or insist upon strict performance of the provision of the
Agreement shall not operate as a waiver thereof or preclude Company from exercising its rights.
I confirm that I am not under any contract or dual employment obligation and hence I am not governed by any
contractual obligation at the time of joining the Company. I am not covered under any service bond by my previous
Employer. In case of any default of bond, the responsibility for the same will be borne wholly by me.
Page 5 of 63
2 ANNEXURE 3
PRIVACY NOTICE FOR EMPLOYEES
This is a privacy notice for employees that complies with the applicable data protection regulations. Hexaware
Technologies Limited and its subsidiaries part of Hexaware relies on this notice to notify employees about the
personal data that Hexaware Technologies Limited and its subsidiaries holds relating to them, how they can expect
their personal data to be used and for what purpose.
Hexaware Technologies Limited and its subsidiaries is committed to protecting the privacy and security
of your personal information.
This privacy notice describes how we collect and use personal information about you during and after
your working relationship with us, in accordance with the applicable Data Protection Regulations and
Hexaware Technologies Limited and its subsidiaries is the "data controller". This means that we are responsible for
deciding how we hold and use personal information about you. We are required under data protection legislation to
notify you of the information contained in this privacy notice.
This notice applies to current and former employees. This notice does not form part of any contract of employment
or other contract to provide services. We may update this notice at any time.
It is important that you read this notice, together with any other privacy notice we may provide on specific occasions
when we are collecting or processing personal information about you, so that you are aware of how and why we are
using such information.
We will comply with the data protection laws. This says that the personal information we hold about
you must be:
2. Collected only for valid purpose that we have clearly explained to you and not used in any way that
is incompatible with that purpose
Page 6 of 63
3. Relevant to the purpose we have told you about and limited only to that purpose
5. Kept only as long as necessary for the purpose we have told you about
6. Kept securely
Personal data, or personal information, means any information about an individual from which that
person can be identified. It does not include data where the identity has been removed (anonymous
data).
There are "special categories" of more sensitive personal data which require a higher level of
protection.
We will collect, store, and use the following categories of personal information about you:
• Personal contact details such as name, title, addresses, telephone numbers, and personal email addresses
• Personal details of your dependants for the purposes of emergency contact information and management of
insurance policies (e.g. health and medical insurance which will also require us to retain personal and
special categories of data of your dependants for this purpose)
• Date of birth
• Gender
• Passport and /or National Identity card information
• Gender for equal opportunities monitoring purposes and compliance with legal requirements if any Marital
status and dependants
• Next of kin and emergency contact information
• National Insurance number
• Bank account details, payroll records and tax status information
• Salary, annual leave, pension and benefits information
• Employment start date
• Location of employment or workplace
• Copy of driving licence
• Recruitment information (including copies of right to work documentation, references and other information
included in the CV or cover letter or as part of the application process)
• Employment records (including job titles, work history, working hours, training records and professional
memberships)
Page 7 of 63
• Compensation history
• Performance information
• Disciplinary and grievance information
• CCTV footage and other information obtained through electronic means such as swipe card records
• Information about your use of our information and communications systems
• Photographs
• We may also collect, store and use the following "special categories" of more sensitive personal information:
• Information about your race or ethnicity, religious beliefs, sexual orientation and political opinions
• Trade union membership
• Information about your health, including any medical condition, health and sickness records and that of your
dependants as explained in the section above
• Genetic information and biometric data
• Information about criminal convictions and offences
We collect personal information about employees through the application and recruitment process, either directly
from candidates or sometimes from an employment agency and/or background check provider and/or partner
recruitment agencies and public platforms including, without limitation, LinkedIn, Job Portals, references from
current and former employees, organisational websites & Portals. We may sometimes collect additional information
from third parties including former employers, credit reference agencies or other background check agencies.
We will collect additional personal information during job-related activities throughout the period of you working for
us.
We will only use your personal information when the law allows us to. Most commonly, we will use your
personal information in the following circumstances:
1. Where we need to perform the contract we have entered into with you
3. Where it is necessary for our legitimate interests (or those of a third party), and your interests and
fundamental rights do not override those interests
We may also use your personal information in the following situations, which are likely to be rare:
Page 8 of 63
2. Where it is needed in the public interest or for official purpose
We need all the categories of information in the list above primarily to allow us to administer our contract with you
[*] and to enable us to comply with legal obligations [**]. In some cases we may use your personal information to
pursue legitimate interests of our own or those of third parties [***], provided your interests and fundamental rights
do not override those interests. The situations in which we will process your personal information are listed below.
We have indicated by asterisks the purpose or purposes for which we are processing or will process your personal
information, as well as indicating which categories of data are involved.
Page 9 of 63
policies. * and/or ** and/or ***
• To ensure network and information security, including preventing unauthorised access to our computer and
electronic communications systems and preventing malicious software distribution. * and/or ** and/or ***
• To conduct data analytics studies to review and better understand employee retention and attrition rates. *
and/or ** and/or ***
• Equal opportunities monitoring. * and/or ** and/or ***
• Pre-employment vetting of the right to work in the countries of our business intrests to comply with the
relevant regulations and immigration laws to prevent illegal working and to carry out right to work checks on
all prospective employees. ** and/or ***
• Dealing with local tax authorities and other relevant authorities* and/or ** and/or ***
• Pre-employment vetting for example in the financial services industry. ** and/or ***
• Details of previous employer for reference purposes. * and/or ** and/or ***
• Personal details to arrange directors' and officers' insurance for a director. * and/or ** and/or ***
• Any other usual and expected processing of personal data to maintain our employment relationship. *
and/or ** and/or ***
• To protect Hexaware Technologies Limited and its subsidiaries proprietary and commercially sensitive
information and to comply with its confidentiality obligations to its clients. * and/or ***
• processing for direct marketing purposes or preventing fraud; * and/or ** and/or ***
• transmission of personal data within a group of undertakings for internal administrative purposes, including
client and employee data (note international transfer requirements will still apply) * and/or ***
• processing for the purposes of ensuring network and information security, including preventing unauthorised
access to electronic communications networks and stopping damage to computer and electronic
communication systems; ***
• reporting possible criminal acts or threats to public security to a competent authority. ** and/or ***
• sharing of personal information when required for the business needs with our business partners
associates, customers and suppliers
• Some of the above grounds for processing will overlap and there may be several grounds which justify our
use of your personal information.
If you fail to provide certain information when requested, we may not be able to perform the contract we have
entered into with you (such as paying you or providing a benefit), or we may be prevented from complying with our
legal obligations (such as to ensure the health and safety of our workers).
Change of purpose
We will only use your personal information for the purposes for which we collected it, unless we reasonably
consider that we need to use it for another reason and that reason is compatible with the original purpose. If we
need to use your personal information for an unrelated purpose, we will notify you and we will explain the legal
basis which allows us to do so.
Page 10 of 63
Please note that we may process your personal information without your knowledge or consent, in compliance with
the above rules, where this is required or permitted by law.
"Special categories" of particularly sensitive personal information require higher levels of protection.
We need to have further justification for collecting, storing and using this type of personal information.
We may process special categories of personal information in the following circumstances:
2. Where we need to carry out our legal obligations and in line with our data protection policy and/or
other relevant policies].
3. Where it is needed in the public interest, such as for equal opportunities monitoring [or in relation to
our occupational pension scheme], and in line with our data protection policy and /or other relevant
policies.
4. Where it is needed to assess your working capacity on health grounds, subject to appropriate
confidentiality safeguards.
Less commonly, we may process this type of information where it is needed in relation to legal claims
or where it is needed to protect your interests (or someone else's interests) and you are not capable of
giving your consent, or where you have already made the information public. We may also process
such information about members or former members in the course of legitimate business activities with
the appropriate safeguards.
We will use your particularly sensitive personal information in the following ways:
• We will use information relating to leaves of absence, which may include sickness absence or family related
leaves, to comply with employment and other laws
• We will use information about your physical or mental health, or disability status, to ensure your health and
safety in the workplace and to assess your fitness to work, to provide appropriate workplace adjustments, to
monitor and manage sickness absence and to administer benefits
• We will use information about your race or national or ethnic origin, religious, philosophical or moral beliefs,
or your sexual life or sexual orientation, to ensure meaningful equal opportunity monitoring and reporting
• We will use trade union membership information to pay trade union premiums (if relevant), register the
status of a protected employee and to comply with employment law obligations
• We will share your data with the Government, Law enforcement and or Regulators as per statutory
requirements
• Do we need your consent?
Page 11 of 63
We do not need your consent if we use special categories of your personal information in accordance with our
written policy to carry out our legal obligations or exercise specific rights in the field of employment law. In limited
circumstances, we may approach you for your written consent to allow us to process certain particularly sensitive
data. If we do so, we will provide you with full details of the information that we would like and the reason we need
it, so that you can carefully consider whether you wish to consent. You should be aware that it is not a condition of
your contract with us that you agree to any request for consent from us.
We may only use information relating to criminal convictions where the law allows us to do so. This will
usually be where such processing is necessary to carry out our obligations and provided we do so in
line with the provisions of data privacy regulations as relevant to the country as applicable. .
Less commonly, and in accordance with applicable data privacy regulations of the countries as
relavant,we may use information relating to criminal convictions where it is necessary in relation to
legal claims, where it is necessary to protect your interests (or someone else's interests) and you are
not capable of giving your consent, or where you have already made the information public.
We may also process such information about members or former members in the course of legitimate
business activities with the appropriate safeguards.
We envisage that we will or may have to hold information about criminal convictions.
We will only collect information about criminal convictions if it is appropriate given the nature of the role and where
we are legally able to do so. Where appropriate, we will collect information about criminal convictions as part of the
recruitment process or we may be notified of such information directly by you in the course of you working for us.
AUTOMATED DECISION-MAKING
Automated decision-making takes place when an electronic system uses personal information to make
a decision without human intervention. We are allowed to use automated decision-making in the
following circumstances:
1. Where we have notified you of the decision and given you 21 days to request a reconsideration
2. Where it is necessary to perform the contract with you and appropriate measures are in place to
safeguard your rights
3. In limited circumstances, with your explicit written consent and where appropriate measures are in
place to safeguard your rights
Page 12 of 63
If we make an automated decision on the basis of any particularly sensitive personal information, we
must have either your explicit written consent or it must be justified in the public interest, and we must
also put in place appropriate measures to safeguard your rights
You will not be subject to decisions that will have a significant impact on you based solely on automated decision-
making, unless we have a lawful basis for doing so and we have notified you.
We do not envisage that any decisions will be taken about you using automated means, however we will notify you
in writing if this position changes.
DATA SHARING
We may have to share your data with third parties, including third-party service providers and other
entities in the group.
We require third parties to respect the security of your data and to treat it in accordance with the law.
We may transfer your personal information outside the country in accordance with the provisions of the
in-country laws and regulations. <<country Name>>.
If we do, you can expect a similar degree of protection in respect of your personal information.
We will share your personal information with third parties where required by law, where it is necessary to administer
the working relationship with you or where we have another legitimate interest in doing so.
"Third parties" includes third-party service providers (including contractors and designated agents) and other
entities within our group. The following activities are carried out by third-party service providers: payroll, pension
administration, benefits provision and administration, IT services, legal and accounting professionals, management
consultants, data efficiency and monitoring consultants.
How secure is my information with third-party service providers and other entities in our group?
All our third-party service providers and other entities in the group are required to take appropriate security
Page 13 of 63
measures to protect your personal information in line with our policies. We do not allow our third-party service
providers to use your personal data for their own purposes. We only permit them to process your personal data for
specified purposes and in accordance with our instructions.
When might you share my personal information with other entities in the group?
We will share your personal information with other entities in our group as part of our regular reporting activities on
company performance, in the context of a business reorganisation or group restructuring exercise, for system
maintenance support and hosting of data, for accounting, taxation, human resources, recruitment, marketing and
legal support.
We may share your personal information with other third parties, for example in the context of the possible sale or
restructuring of the business or business requirements/developments. We may also need to share your personal
information with a regulator or to otherwise comply with the law.
We will transfer the personal information we collect about you to the following countries : - India, USA, Mexico,
Australia,Europe, Singapore and other countries where Hexaware Technologies Limited and its subsidiaries is
operational in order to perform our contract with you. If There is not an adequacy decision by the countries of
interest.. This means that the countries to which we transfer your data are not deemed to provide an adequate level
of protection for your personal information.
However, to ensure that your personal information does receive an adequate level of protection we have put in
place the following appropriate measures to ensure that your personal information is treated by those third parties
in a way that is consistent with and which respects the laws and regulations of the countries in accordance with the
provisions of the in-country laws and regulations ,: Data Protection Agreements which incorporate the appropriate
Contractual Clauses. If you require further information about these protective measures, you can request it from
Hexaware Technologies Limited and its subsidiaries data protection team by email at [email protected]
DATA SECURITY
We have put in place measures to protect the security of your information. Details of these measures
Page 14 of 63
are available upon request.
Third parties will only process your personal information on our instructions and where they have
agreed to treat the information confidentially and to keep it secure.
We have put in place appropriate security measures to prevent your personal information from being accidentally
lost, used or accessed in an unauthorised way, altered or disclosed. In addition, we limit access to your personal
information to those employees, agents, contractors and other third parties who have a business need to know.
They will only process your personal information on our instructions and they are subject to a duty of
confidentiality.
We have put in place procedures to deal with any suspected data security breach and will notify you and any
applicable regulator of a suspected breach where we are legally required to do so.
DATA RETENTION
We will only retain your personal information for as long as necessary to fulfil the purposes we collected it for,
including for the purposes of satisfying any legal, accounting, or reporting requirements. To determine the
appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data,
the potential risk of harm from unauthorised use or disclosure of your personal data, the purposes for which we
process your personal data and whether we can achieve those purposes through other means, and the applicable
legal requirements.
In some circumstances we may anonymise your personal information so that it can no longer be associated with
you, in which case we may use such information without further notice to you. Once you are no longer an
employee, of the company we will retain and securely destroy your personal information in accordance with
applicable laws and regulations or our data retention policy.
It is important that the personal information we hold about you is accurate and current. Please keep us informed if
your personal information changes during your working relationship with us.
Page 15 of 63
Your rights in connection with personal information
• Request access to your personal information (commonly known as a "data subject access request"). This
enables you to receive a copy of the personal information we hold about you and to check that we are
lawfully processing it.
• Request correction of the personal information that we hold about you. This enables you to have any
incomplete or inaccurate information we hold about you corrected.
• Request erasure of your personal information. This enables you to ask us to delete or remove personal
information where there is no good reason for us continuing to process it. You also have the right to ask us
to delete or remove your personal information where you have exercised your right to object to processing
(see below).
• Object to processing of your personal information where we are relying on a legitimate interest (or those of
a third party) and there is something about your particular situation which makes you want to object to
processing on this ground. You also have the right to object where we are processing your personal
information for direct marketing purposes.
• Request the restriction of processing of your personal information. This enables you to ask us to
suspend the processing of personal information about you, for example if you want us to establish its
accuracy or the reason for processing it.
• Request the transfer of your personal information to another party.
• If you want to review, verify, correct or request erasure of your personal information, object to the
processing of your personal data, or request that we transfer a copy of your personal information to another
party, please contact our data protection team in writing or by email at [email protected]
You will not have to pay a fee to access your personal information (or to exercise any of the other rights). However,
we may charge a reasonable fee if your request for access is clearly unfounded or excessive. Alternatively, we may
refuse to comply with the request in such circumstances.
We may need to request specific information from you to help us confirm your identity and ensure your right to
access the information (or to exercise any of your other rights). This is another appropriate security measure to
ensure that personal information is not disclosed to any person who has no right to receive it.
In the limited circumstances where you may have provided your consent to the collection, processing and transfer
Page 16 of 63
of your personal information for a specific purpose, you have the right to withdraw your consent for that specific
processing at any time. To withdraw your consent, please contact our data protection team by email at
[email protected]. Once we have received notification that you have withdrawn your consent, we will no
longer process your information for the purpose or purposes you originally agreed to, unless we have another
legitimate basis for doing so in law.
We have appointed a data protection officer (DPO) as part of our data protection team to overhee compliance with
this privacy notice. If you have any questions about this privacy notice or how we handle your personal information,
please contact the our data protection team by email at [email protected]. You have the right to make a
complaint at any time to the appropriate data protection regulatory for data protection issues.
We reserve the right to update this privacy notice at any time, and we will provide you with a new privacy notice
when we make any substantial updates. We may also notify you in other ways from time to time about the
processing of your personal information.
Page 17 of 63
3 ANNEXURE 4
DATA PRIVACY NOTICE
The Company's Data Privacy Notice, summarises how we protect your data, our usage of that data and other
relevant information. For example, we set out in the attached Data Privacy Notice how we as an
organisation collect, use, store, transfer and secure personal data.
When processing data, we have determined that consent is not a necessary basis for the processing of
personal data for our day-to-day management of the employment relationship between the company and its
employees. Hexaware Technologies will rely on the following grounds to process the personal data: -
1. Where we need to perform the contract we have entered into with you.
For example, Hexaware needs to have the freedom to perform the Company's obligations under the
employment contract as will be common for any employer for processing personal data. In any case, the
Company's employment relationship with its employees (or other types of contracts, e.g. consultancy
contracts with our contractors) are governed by the terms and conditions of those contracts. Many of the
other general rules of our organisation are covered in part in handbooks and policies to which employees are
subject by virtue of the contractual obligation in their contracts. e.g. in respect of health and safety at work
and I.T. Policies.
Non-exhaustive examples where this ground, is in our determination appropriate, include providing,
controlling and processing:
Under this ground, Hexaware's processing is necessary for compliance with legal obligations in the countries
to which we, as an employer, might be subject to. In the employment context, this could be relevant to pre-
employment vetting, performance of the employment contract (overlapping with the above ground), and
compliance with legal obligations owed by Hexaware to a third party. Examples might include:
Page 18 of 63
• Pre-employment vetting of the right to work in the countries of our business intrests to comply with the
relevant regulations and immigration laws to prevent illegal working and to carry out right to work
checks on all prospective employees.Dealing with local tax authorities and other relevant authorities
3. Where it is necessary for our legitimate interests (or those of a third party).
Examples are set out in the attached Data Privacy Notice but include: -
• The usual and expected processing of personal data to maintain the employment relationship
• To protect Hexaware's proprietary and commercially sensitive information and to comply with its
confidentiality obligations to its clients
• Transmission of personal data within a group of undertakings for internal administrative purposes,
including client and employee data (note: international transfer requirements will still apply)
• Processing for the purposes of ensuring network and information security, including preventing
unauthorised access to electronic communications networks and stopping damage to computer and
electronic communication systems
• sharing of personal information when required for the business needs with our business partners
associates, customers and suppliers
Page 19 of 63
4 ANNEXURE 5
ACCEPTABLE USAGE AND USER SECURITY RESPONSIBILITIES
Contents
1. About this Policy........................................................................................................................................21
2. Information Processing Asset Security:....................................................................................................21
3. Logical Access..........................................................................................................................................22
4. Password Management............................................................................................................................23
5. Physical Access........................................................................................................................................24
6. Software Licensing....................................................................................................................................25
7. Malware Protection...................................................................................................................................25
8. Email Use..................................................................................................................................................25
9. Internet Use...............................................................................................................................................28
10. Social Media Usage:..............................................................................................................................29
11. Use of Privileged Access.......................................................................................................................29
12. Intellectual Property Rights & Ownership..............................................................................................29
13. Confidentiality........................................................................................................................................29
14. Customer assets....................................................................................................................................30
15. Onsite deputation..................................................................................................................................30
16. Awareness.............................................................................................................................................30
17. Disciplinary action..................................................................................................................................30
18. MONITORING.......................................................................................................................................31
19. PROHIBITED USE OF OUR SYSTEMS...............................................................................................31
20. Employee/Contractor/Retainer Declaration...........................................................................................32
Page 20 of 63
The Acceptable usage policies along with the user security responsibilities are detailed below.
• This policy covers all employees, Consultants, contractors, Retainers and anyone who has access to our IT and
communication systems.
• Misuse of IT and communications systems can damage the business and our reputation. Breach of this policy
may be dealt with under our Disciplinary Procedure and, in serious cases, may be treated as gross misconduct
leading to summary dismissal.
• This policy does not form part of any employee's contract of employment and we may amend it at any time
• Given the competitive nature of our business, Hexaware's and Customer's provided information assets must be
protected always during and after your employment with Hexaware.
• Users are expected to access only information, information systems and facilities that are needed for
performing the responsibilities assigned to them.
• Any information exchanged using Hexaware information assets is not private and may be reviewed, monitored
and copied by authorized representatives at any time, with or without notice to employees/contractors/retainers
and other users
• All Hexaware employees/contractors/retainers, consultants, trainees ("User") must take the necessary steps to
ensure that Hexaware's and Customer's specific assets are properly protected from threats that exist
• Asset maintenance:
Page 21 of 63
a. User shall be responsible for the assets, once purchased and handed over
b. Desktop PCs and cabling for telephones or computer equipment should not be moved or tampered
with without first consulting [the IT Department OR [POSITION OR DEPARTMENT]].
c. If you have been issued with a laptop, tablet computer, BlackBerry, smartphone or other mobile
device, you must ensure that it is kept secure at all times, especially when travelling. Passwords
must be used to secure access to data kept on such equipment to ensure that confidential data is
protected in the event of loss or theft. You should also be aware that when using equipment away
from the workplace, documents may be read by third parties, for example, passengers on public
transport.
d. The user should not abuse the product and cause any physical damage.
e. In case of any doubts user shall contact the IT Helpdesk instead of experimenting on your own.
f. The IT team shall be responsible for allotting asset numbers and physical numbering for all assets
g. In case of loss of equipment or theft, the matter must be reported to the IT helpdesk and Corporate
Security Team as early as possible (Within 4 Hours from the time of Loss)
• When leaving a workstation, the user is expected to properly log out of all application's and networks or lock the
laptop or desktop.
• You should not attempt to gain access to restricted areas of the network, or to any password-protected
information, except as authorized in the proper performance of your duties.
• You must be particularly vigilant if you use our IT equipment outside the workplace and take such precautions
as we may require from time to time against importing viruses or compromising system security. The system
contains information which is confidential and/or subject to data protection legislation. Such information must be
treated with extreme care and in accordance with our [Privacy Standard OR Data Protection Policy].
• You should use passwords on all IT equipment, particularly items that you take out of the office. You must not
use another person's username and password or make available or allow anyone else to log on using your
username and password.
• All workstations must have the password protected screen saver activated for unauthorized access to privileged
information
Page 22 of 63
• User level and System level passwords must remain confidential and not shared, posted or otherwise divulged
in any manner
• You must not attach any device or equipment to our systems without prior approval from your function
/supervisor. This includes any USB flash drive, MP3 player, tablet, smartphone or other similar device, whether
connected via the USB port, infra-red connection or in any other way.
b. Have digits and special characters as well as letters e.g., 0-9, !@#$%^&*()_+|~-=\`{}[]:";'<>?,./)
a. Revealing your password over the phone to ANYONE, Through Email Message and to your Manager
Page 23 of 63
• If someone demands your password, refer them to this document or Inform IT helpdesk and Infosec
Governance
• Passwords shall not be written down and stored anywhere in the office. Do not store passwords in a file on ANY
computer system
• If your account or password is suspected to have been compromised, report the incident to IT Helpdesk and
change all your passwords
• Employees, retainers, contractors shall cooperate with security checks carried out by corporate security
department
• Employees, retainers, contractors or any other third party shall never access areas which are restricted to them
• Access cards and/or keys that are no longer required must be returned to the HR /Admin Department.
• Cards must not be reallocated to another individual bypassing the return process.
• Lost or stolen access cards and/or keys must be reported to Corporate Security Department. Appropriate action
must be taken for revocation, response and escalation.
• All critical facilities that allow access to visitors, third parties, and employees/contractor/retainer without access
to the respective facility will track access with a register which shall record sign in/out and other details
• Do not take visitors into the office premises without proper authorization
• Issue of laptop or any other devices to staff/vendors is appropriately recorded and signatures taken
Page 24 of 63
• Employees/Contractors/Retainers must not tailgate, and any suspected violations must be promptly reported
• Employees/Contractors/Retainers are expected to report any unauthorized access, entry or suspicious activity
to Infosec Governance, Corporate Security Department and Security Guard on duty.
• All members of the staff, third party users as well as all customers of Hexaware, have the responsibility to report
suspected violations. Investigation of suspected violations of security regulations will follow established
procedures
• All employees/contractors/retainers are advised not to download, install, or use any unlicensed software
including free and opensource software
• Employee/Contractor/Retainer shall not use a completely written or partial code available on any opensource
forums without appropriate reviews to license conditions and other legal requirements. This shall be done after
an approval from STG, IG Team and Legal Team
• All software requests are to be raised in Genie+, and the IT team shall review the request along with Infosec
Governance team and shall install the same with proper approvals
• Anti-Virus software is configured in such a way that the updates are automatically pushed to the systems.
Employee/Contractor/Retainer shall ensure that their Anti-Virus is updated and in the event of any error or
issues with updating, they shall report the same to the helpdesk
Page 25 of 63
• Individuals accessing the e-mail services of Hexaware must not use or access an e-mail account assigned to
another individual to either send or receive messages
• The user must use only company approved applications as the e-mail customer. Use of any other customer is
not permitted
• The following factors are to be considered before accessing and downloading an attachment
a. To prevent computer viruses, users must not open attachments that are from an unknown or
untrusted source
b. In case of any doubt users must be advised to contact IT Helpdesk before taking any action on their
own
• Users must not send files with extensions such as .exe, .bat , plug ins…
• All messages sent by users by the company e-mail account are company records. At any time and without prior
notice, the management reserves the right to examine e-mail, personal file Directories, and other information
stored on Hexaware's Systems. E-mail messages may be monitored for any of the following reasons:
d. Hexaware reserves right to disclose e-mail messages sent or received to law enforcement officials
without prior notice to the users who may have sent or received such messages. Users must restrict
their communications to business matters in recognition of this electronic monitoring
• Users must not send confidential/sensitive information via e-mail, unless the information is password protected
using a company approved technique. In general examples of confidential/sensitive information include:
a. Customer Information
b. Passwords
d. Any other confidential information such as PI, PHI, SPII, PCI data etc.
Page 26 of 63
• Users must not automatically forward their e-mails to any address outside the group/company networks, unless
approved
• Alternatively, users are not allowed to use their personal e-mail accounts for sending official mail. All official e-
mail communication must take place via the official e-mail account only.
a. It does not interfere with normal business activities or hamper user productivity,
d. It is not associated with any outside business activity for personal gain,
• Blanket forwarding of e-mail messages is prohibited as this may use excessive network resource
• Users must not create their own, or forward externally provided e-mail messages which may considered to be
harassment, or which may create a hostile work environment.
• Hence, users must not use profanity, obscenities, or derogatory remarks in e-mail messages discussing
employees/contractors/retainers, customers, or competitors. Such remarks, even when made in jest, may
create legal problems such as trade libel and defamation of character. Among other things, a hostile work
environment may also be created when derogatory comments about a certain sex, race, religion, political
beliefs or disability are circulated
• Except as authorized in the proper performance of your duties, you should not under any circumstances use
our systems to participate in any internet chat room, post messages on any internet message board or set up or
log text or information on a blog or wiki, even in your own time
• Users shall communicate with the originator of the offensive e-mails, asking him/her to stop sending such
messages, and report such offensive e-mails directly to their respective HR BP's and the Infosec Governance
Team
• Users shall not use or register their official email ID for any non-business activities like subscribing to a mailing
list, creating a social media account, without appropriate approvals
Page 27 of 63
5.9 Internet Use
• Internet access is provided to all the employees/contractors/retainers and it shall be used for business purposes
with due care
• The use or attempt to initiate such activities using companies computing facilities or equipment which could
lead to abusive, unethical or "inappropriate" use of the Internet is considered grounds for disciplinary, legal
and/or punitive actions, including termination
• . Examples of prohibited employee/contractor/retainer Internet use include, but are not limited to, the following:
a. Introduce material considered indecent, offensive, or is related to the production, use, storage, or
transmission of sexually explicit or offensive items on the company's network or systems, using
Internet.
c. Enter into contractual agreements via the Internet, e.g. enter into binding contracts on behalf of
Hexaware over the Internet, unless you are authorized to do so by the management
d. Solicit for any purpose which is not expressly approved by the Hexaware management
e. Use Hexaware logos or materials in any web page or Internet posting unless Hexaware Corporate
Marketing team and HR team has approved it, in advance.
h. Use software files, images, or other information downloaded from the Internet that has not been
released for free public use for official/personal purposes using Hexaware computing system
i. Upload or download commercial software in violation of its copyright. Approval must be sort from
STG by users before they download any software from the internet.
m. Establish Internet or other external network connections that could allow non-Hexaware users to
Page 28 of 63
gain access into Hexaware's systems and information assets
• Those needing privileged access shall raise a request with appropriate business justification
• The privileged access shall not be provided indefinitely. The access shall be provided only for a period of 3
months after which it has to be renewed
• Privileged Access shall be carried out with due care and the user shall be liable and responsible for any issues
arising because of the privileged access
• Hexaware reserves the right to withdraw any of the facilities provided if it considers that your use of it is in any
way unacceptable.
5.13 Confidentiality
• Handle Hexaware's and Customer's Confidential Information in strict confidence
Page 29 of 63
https://stationh.hexaware.com/NewStationH/Content/Index#/index/webapps
• You will be accountable for any misuse of Customer provided information assets
• Information received from the Customer is to be used only for the Business purpose and protect confidential
information from unauthorized use and disclosure.
• You will be accountable for any misuse of Customer provided information assets (Login IDs / Passwords,
Secure IDs, Physical access cards, Confidential information) during your assignment at onsite
5.16 Awareness
• Refer to the Information Security Policy and other relevant documents available in the Intranet IG Portal in
"StationH".
• Ensure that you attend the awareness training on Information Security that is held periodically and complete the
corresponding online assessment within the stipulated time.
• For Mexico Location: Ensure that you attend the awareness training on Information Security that is held during
NHT
Page 30 of 63
5.18 Monitoring
• Our systems enable us to monitor telephone, email, voicemail, internet and other communications. For
business reasons, and in order to carry out legal obligations in our role as an employer, use of our systems
including the telephone and computer systems, and any personal use of them, may be continually monitored by
automated software or otherwise. Monitoring is only carried out to the extent permitted or as required by law
and as necessary and justifiable for business purposes.
• A CCTV system monitors the exterior of the office premises 24 hours a day. This data is recorded
• We reserve the right to retrieve the contents of email messages or to check internet usage (including pages
visited and searches made) as reasonably necessary in the interests of the business, including for the following
purposes (this list is not exhaustive):
a. To monitor whether use of the email system or the internet is legitimate and in accordance with this
policy.
a. Pornographic material (that is, writing, pictures, films and video clips of a sexually explicit or arousing
nature).
Page 31 of 63
(including material which breaches our Equal Opportunities Policy or our Anti-harassment and
Bullying Policy).
e. Confidential information about us, our business, or any of our staff, customers (except as authorized
in the proper performance of your duties).
f. Unauthorized software.
g. Any other statement which is likely to create any criminal or civil liability (for you or us).
• Any such action will be treated very seriously and is likely to result in summary dismissal.
• Where evidence of misuse is found, we may undertake a more detailed investigation in accordance with our
Disciplinary Procedure, involving the examination and disclosure of monitoring records to those nominated to
undertake the investigation and any witnesses or managers involved in the Disciplinary Procedure. If
necessary, such information may be handed to the police in connection with a criminal investigation.
Date: 09-Oct-2023
Page 32 of 63
5 ANNEXURE 6
Updated the
following
sections-Anti
money laundering
practices, Social
media obligations,
Annexure 1.
Page 33 of 63
Table of Contents
1. Introduction............................................................................................................................................35
2. Scope....................................................................................................................................................35
3. Purpose.................................................................................................................................................35
4. Compliance to requirements & fair competition.....................................................................................36
4.1. Compliance with laws, regulations, policies and procedures...................................................................36
4.2. Fair dealing............................................................................................................................................36
5. Legal & ethical conduct.........................................................................................................................37
5.1. Integrity..................................................................................................................................................37
5.2. Conflicts of duty or interest.....................................................................................................................37
5.3. Anti-bribery & Anti-corruption compliance...............................................................................................38
5.4. Anti-money laundering practices............................................................................................................41
6. Insider trading........................................................................................................................................41
7. Books & records....................................................................................................................................42
8. Building a great Hexaware....................................................................................................................42
8.1. Diversity Equity Inclusion- DEI................................................................................................................43
8.2. Modern slavery......................................................................................................................................43
8.3. Child labour............................................................................................................................................43
8.4. Anti-bullying & prevention of sexual harassment (POSH).......................................................................44
8.5. Abuse of managerial authority................................................................................................................44
8.6. Healthy & safe environment...................................................................................................................44
8.7. Abuse free workplace.............................................................................................................................45
8.8. Freedom to express & social dialogue....................................................................................................45
9. Environment, Social & Governance (ESG) management......................................................................45
10. Confidentiality........................................................................................................................................45
11. Intellectual property rights & ownership.................................................................................................48
12. Non-solicitation of employees................................................................................................................49
13. Information Security, Data privacy & Data protection............................................................................49
14. Reporting of unlawful and unethical behaviour, whistle blower policy...................................................51
15. Organization discipline & decorum........................................................................................................52
16. Training & certification...........................................................................................................................55
17. Review of the code................................................................................................................................56
18. Administration of the policy....................................................................................................................56
19. Annexure 1- Statement of compliance..................................................................................................57
20. Frequently asked questions (FAQ)........................................................................................................59
Page 34 of 63
6.1 Introduction
The code of conduct for employees defines standards for conduct in all business, legal,
and ethical matters carried out in daily business, and is meant as a tool and a guide for
dealings with employees, clients, vendors, and partners; interaction with competitors; as
well as in financial areas. It is part of Hexaware's business policy to carry out all company
activities in accordance with the letter and spirit of applicable legal requirements and
therefore keep high standards of business ethics.
Our commitment to ethical and lawful business conduct is a fundamental value of our
employees and is critical to the company's success. We will strive to uphold ethical and
legal standards vigorously even as we pursue our financial objectives. We will not
compromise honesty and integrity anywhere at any time even while continuously striving
to build value for customers through the innovative use of technology and talent. This
code of conduct reiterates our commitment to the above principles.
6.2 Scope
This code of conduct applies to
i) all Hexaware employees (permanent, contract and retainer roles) and is
in addition to their legal and contractual obligations with Hexaware
(which expression shall mean and include all its affiliates, subsidiaries,
parent companies, successors & assignees)
ii) board of directors of the company
iii) subcontracted staff working on our premises
• Any reference to "employee" in this code of conduct means and includes all
Hexaware employees directly employed by Hexaware or through a third-
party contractor.
6.3 Purpose
This code of conduct is intended to:
• Set high standards of honesty, integrity, ethical and law-abiding behavior expected of
Page 35 of 63
Hexaware's employees.
Page 36 of 63
6.5 Legal & ethical conduct
6.5.1 Integrity
Hexaware conducts its business with integrity. It has zero tolerance towards
unethical activities like bribery & corruption. Every employee is expected to act
professionally & with integrity in their work.
Employee shall,
i. Work in the best interest of the company
ii. Act honestly, fairly, ethically, with integrity and loyalty
iii. Act in good faith, with responsibility, due care, competence, diligence
and independence
iv. Conduct themselves in a professional, courteous and respectful
manner
v. Treat their colleagues with respect & dignity and shall not harass any
of them in any manner
• Employees must avoid placing themselves in a position that may lead to:
o An actual or a potential conflict of interest or duty; or
o A reasonable perception of an actual or potential conflict of interest or duty.
• Employees must:
o Fully and frankly inform Hexaware's senior management and
Human Resources department of any personal or external business
interest that may lead to:
An actual or potential conflict of interest or duty; or
A reasonable perception of an actual or a potential conflict of
interest of duty; and o Obtain and follow independent legal advice to
avoid or resolve any actual, potential or
perceived conflict of interest or duty.
Page 37 of 63
• Employees must affirm compliance with this code of conduct in the format
given below in Annexure I.
• Gifts, Hospitality and Entertainment given to or received from any Third Party
who have a business relationship with the company are generally acceptable,
if the GHE is modest in value, appropriate to the business relationship, and
does not create an appearance of impropriety. No cash or cash equivalent
payments should be given or received.
• In case of Public Officials, giving gifts is prohibited except for gifts during
festive seasons such as Diwali, Christmas. Hospitality provided to Public
Officials should be reasonable and should not influence or appear to influence
any business decision. Further, any form of entertainment to Public Officials is
Page 38 of 63
not permissible.
• For detailed guidance, refer Hexaware's Gifts, Hospitality and Entertainment Policy
available on the Company's intranet.
• Hexaware is politically neutral, i.e., not directly or indirectly affiliated with any
political party and does not provide services linked to any political messages.
Hexaware does not associate itself with any political party or independent
candidate, and does not campaign for, support and offer donation to political
parties to influence any decision or gain business advantage. Accordingly,
Hexaware does not make political contributions, donations and sponsorships
of any kind to political parties and individual candidates.
• For detailed guidance, refer Hexaware's Donations and Sponsorships Policy available
on the Company's intranet.
Page 39 of 63
declaration from every Third Party to this effect.
• Every Third Party appointed for representing Hexaware or carrying out any
activity for Hexaware must be hired/appointed in accordance with the
guidelines, protocols and procedures around Third-Party identification, due
diligence, on-boarding and approvals as set forth in Hexaware's Third Party
Management Policy which is available on the Company's intranet.
Interactions with Public Officials pose a higher risk on account of their role in
the government and capability to influence business decisions of Hexaware.
Hence, Hexaware expects its Employees and Third Parties representing the
Company to maintain the highest professional and ethical standards while
interacting with the Government and resultant relationship with Public
Officials. Any interactions with Public Officials must be carried out in clear,
open and transparent manner and only for legitimate business purposes.
o Government as Customer
Laws often limit the duties and types of services that former government,
military, or other public sector employees may perform as employees or
consultants of Hexaware, especially regarding matters they were involved in
while with the government. Employment negotiations with government
employees may be subject to legal restrictions and disclosure requirements,
particularly if the government employee is involved in a matter involving
Hexaware's interests. Contact Compliance Officer before entering such
negotiations. You may never hire any individual in exchange for securing or
retaining business or securing an improper advantage. We also prohibit hiring
preference being given to anyone in return for special treatment.
Page 40 of 63
6.5.4 Anti-money laundering practices
• Hexaware is strongly committed to prevent the use of its operations for money
laundering, financing of terrorism, or any other criminal activities, and will take
appropriate actions to comply with all the applicable anti-money laundering and anti-
terrorism laws throughout the world.
• Employees while performing their duties for the Company, may have access
to or become aware of material non-public information or unpublished price
sensitive information (collectively referred as "Information") either about the
Company or any of its customers or any other business partners which are
publicly traded entities.
Page 41 of 63
otherwise. Doing so is not only a violation of the code that may result in
immediate termination for cause but is also a serious violation of applicable
securities laws and will expose any individuals involved to potential civil and
criminal prosecution.
For detailed guidance, refer Hexaware's Insider Trading Policy available on the
Company's intranet.
• Hexaware will make certain that all disclosures made in financial reports,
public documents or any regulatory filings are full, fair, accurate, timely and
understandable. This obligation applies to all Employees, including all
financial executives, with any responsibility for the preparation for such reports
or filings, including drafting, reviewing and signing or certifying the information
contained therein. No business goal of any kind is ever an excuse for
misrepresenting facts or falsifying records. Employees must inform the
management, Human Resource department and Compliance Officer if they
learn that information in any filing or public communication was untrue or
misleading at the time it was made or if subsequent information would affect a
similar future filing or public communication.
Page 42 of 63
6.8.1 Diversity Equity Inclusion- DEI
• We are signatory to the United Nations Global Compact (UNGC) & are
committed to protecting & preserving human rights as per UN Guiding
Principles & the International Labour Organization's Declaration on
Fundamental Principles & Rights at Work.
For more details, please refer to the Slavery & Human Trafficking statement available
on Hexaware website.
Page 43 of 63
6.8.4 Anti-bullying & prevention of sexual harassment (POSH)
Page 44 of 63
For more details, please refer Occupational Health & Safety policy
Path-> StationHà WebAppà Project processesà PRIMEà Enterprise
processesà Occupational health & safety policy
• We are committed to making Hexaware a great place to work with the help
of our passionate and engaged workforce. In this process, we have
equipped the workforce with their right to express & are fostering a culture
of open dialogue. We promote open dialogue by encouraging employees to
express their view, opinions & thoughts openly without any fear in all forums
with various stakeholders.
6.10 Confidentiality
• In the course of employment with Hexaware, employees will have access to
information that is considered confidential and/or proprietary. Generally,
confidential and proprietary information is any Company information that is
not public. As a policy of the Company every employee must sign a Non-
Disclosure Agreement before joining the services of the company and abide
Page 45 of 63
by the same. Employees are expected to use appropriate discretion to
discuss terms and conditions of their employment in accordance with
applicable law.
Page 46 of 63
• When (employee's) employment with Hexaware ends, all documents,
records, and other information and property belonging to Hexaware must be
returned. Even after the employee leaves the employment of the Company,
they have a continuing obligation to safeguard and not use or otherwise
disclose Hexaware' and its clients' confidential and proprietary information to
any one.
• The work for which employees are employed is and will be of a private
nature, and in connection with the performance of their services on behalf of
Hexaware, its subsidiaries and affiliates (together with their predecessors
and successors, the "Company"), the Company, may make available
information of a private nature which is including, but not limited to
Company's clients' and prospective clients' business, strategies,
methodologies, operations, technologies (including computer software),
financial affairs, organizational and personal matters, policies, procedures,
trade secrets, programs, operations, clients, prospective clients, employees
and other non-public matters, including those concerning third parties
("Private Information"). Employees agree that they shall receive in strict
confidence all such private information belonging to the company or to its
clients or prospective clients. Employees further agree to use their best
efforts to maintain and to assist the Company in maintaining the
confidentiality of all such private information, and to prevent it from getting
into unauthorized hands.
• Employees shall also ensure that their respective salary shall always be kept
confidential and should not be disclosed to any colleague/s or anybody else.
I. They shall neither copy nor distribute any material, or other information
constituting private information which comes into their possession as
result of their employment by the company, other than for the company
use.
II. They shall, not only during the period of employment by the Company but
even at any time thereafter, directly or indirectly, disclose to others and / or
use for their own benefit or for the benefit of others, private information
acquired by them during the period of their employment, except to the
extent as may be reasonably necessary in the ordinary course of
performing their duties as an employee of the company.
III. They shall not disclose to the Company or attempt to induce the Company
to use any private information or material to which the Company is not
entitled.
IV. Upon termination of their employment with the Company, they shall return
to the Company or to the client or prospective client/s all materials and
information that constitutes private information and any copies thereof and
Page 47 of 63
certify to the company that they no longer have any rights to such materials
or information, and they will represent that the original and all copies of
such materials and information have been returned to the company or to
the client/s or prospective client/s.
I. Employees shall not use any knowledge, trade secrets or other information
that is treated confidentially by the company or its clients including, but
without limitation to, information on the company's knowledge bases
except in the proper course of their duties or as otherwise permitted by the
company. Confidential information does not extend to information already
in the public domain unless such information has arrived there by
unauthorized means.
II. Without limiting the previous clause employees undertake that they shall not attempt
to:
Page 48 of 63
unacceptable.
• For details, please refer to the Intellectual Property Rights (IPR) Policy
available on StationH.
(Path: StationH – WebApps- My HR – My Onboarding – Intellectual
Property Rights Policy)
o Employee, solicit the employment of, or encourage or aid any other party to
employ or solicit the employment of any Hexaware employee or independent
contractor to terminate employment with Hexaware.
Page 49 of 63
• Given the competitive nature of our business, Hexaware's information assets must
be protected. All Hexaware employees, consultants, trainees must take the
necessary steps to ensure that the company's assets are properly protected from
threats that exist. For further details on Information Security employees are
expected to refer to the Information Security Policy document available in Intranet.
• Employees are expected to ensure that they nominate themselves for the
awareness training on Information Security that is held periodically.
• E-mail
Hexaware provides the E-mail systems to employees to facilitate the performance of
company work and their contents are the property of the Hexaware. Management
reserves the right to retrieve the contents for legitimate reasons, such as to find lost
messages, to comply with investigations of wrongful acts or to recover from system
failure.
• Internet browsing
The browsing facility shall be provided for carrying out the company's business and
usage is subject to monitoring. Any inappropriate usage shall result in warnings,
removal of browsing facility and other disciplinary action.
• Visitors
Employees shall not take visitors into the office premises without security
authorization
• Clean desk policy
o Employees shall lock away all confidential and /or restricted information
outside office hours
o They must not leave sensitive information in the open while they are away
from their desk
o Employees should logout and switch off their PC at the end of the day
o Printers should be cleared of sensitive data
o Employees shall use shredder for destroying confidential data
Page 50 of 63
• Licensed software
o Employees shall ensure that only authorized and licensed software is
loaded on the computer system assigned to them
o Employees shall not make unauthorized copies of copyrighted software
• Anti-virus
o Ensure that the latest licensed anti-virus software is installed and always enabled on
your PC.
• Incident reporting
o If employees become aware of any breach of security of any kind, or any
incident of possible misuse or violation of this policy, they must report to
Information Security Team.
• New installations
o No hardware changes are allowed to the workstation /PC. Installation of
modems network connections, if not provided are prohibited.
• Social media obligations
o All employees are expected to familiarize themselves with social media
policy available on intranet portal & follow it without fail.
• Public speaking & press enquiries
o All media relations activities throughout Hexaware are conducted and
managed in adherence with the principles of honesty, integrity and
transparency. Competitive international benchmarking on the best
communication practices is always encouraged at Hexaware. Information
dissemination to the media and resolution of media queries must be
comprehensible, factual and completed within reasonable time deadlines.
o All media relations activities including communication during crisis
situations at Hexaware are routed through the Corporate Communications
Department. The Corporate Communications Department is responsible
for planning, directing and monitoring the activities of corporate press
releases and communication.
o For details, please refer to the social media policy available on StationH.
(Path: StationH – WebApps - My HR – My Onboarding – Social Media
Policy)
• Data Privacy & Data protection
o Hexaware's Data privacy policy details personal & sensitive personal data
collection & processing, cookie policy, our policy on children, Data
Transfer and disclosure of Personal Data etc.
o Hexaware takes reasonable steps to protect information. The company
has put in place appropriate physical, electronic and managerial
procedures to safeguard and secure the Information from loss, misuse,
unauthorized access or disclosure, alteration or destruction.
o For more details, please refer data privacy policy available on Hexaware
website (Privacy Policy | Hexaware)
Page 51 of 63
1. report promptly and in good faith, any actual or suspected violation
by an employee of the standards, requirements or expectations set
out in this code of conduct; and
2. Encourage other employees to do the same.
• Hexaware has constituted Whistleblower Policy as a mechanism to encourage a
climate of open communication within the Company to report concerns at the earliest
opportunity including any unethical practice or behavior, actual or suspected Fraud or
violation of the Company's code of conduct or ethics policy and thus avert a larger
issue in the future.
• The purpose of the Whistle Blower Policy is to enable a person who observes
an unethical practice or behavior (whether or not a violation of law), actual or
suspected Fraud or violation of the company's code of conduct or ethics policy to
approach the Whistleblower Committee of the Company without necessarily
informing their supervisors.
• For more details, please refer "Whistleblower policy" available on
StationH.
(Path: StationH – WebApps- My HR – My Onboarding – Whistle Blower
Policy)
• While the company fully subscribes to the view that what employees
wear is their own concern but, in consideration of the image of the
company, employees are expected to demonstrate professionalism and
excellence in all aspects of their behavior including the attire while at
work and while on official duty. Considering the prevailing trends on
business attire Hexaware recommends some norms which are outlined
in the Dress code policy & guidelines. (Path: StationH – WebApps- My
HR – My Onboarding – Dress code policy guidelines).
Office Discipline
• Employees are expected to help maintain a quiet environment and a clean desk.
• Smoking within the office premises is strictly prohibited and playing of
computers games is not allowed.
• Office equipment must be handled carefully. PCs should be switched off
before leaving the premises.
Working Hours
The company has flexi timing policy and observes a 5-day week. Saturdays and Sundays
are weekly off. However, employees are expected to come on weekends if there is a
business requirement.
Page 52 of 63
Working Hours: 8: 15 am to 5:30 pm
Core / Compulsory Hours: 10:00 a.m. to 5:30 p.m.
Employees are expected to display their ID card while they are in office premises. Also, they
are expected to observe security regulations as intimated time to time.
As they come in, they must:
• Register their attendance with the help of the Access Card and swipe it
every time they enter or leave the office premises.
• They are expected to display their card while they are in the office
premises. In case they are on official outdoor duty or forgot to bring the
access card then they must follow the process as per Hexaware's policy
in this regard.
• Employees are expected not to swipe access cards for others. This will be
considered as serious misconduct and will invite disciplinary action.
• In cases where the place of work is not the designated office, the
employee is expected to use any such systems which are designed and
implemented for the purpose of marking attendance.
• For details, please refer to the Attendance Policy & Guidelines available
on StationH. (Path: StationH – WebApps- My HR – My Time – Attendance
Policy & Guidelines)
Phone Calls
• Phones must be utilized for official purposes and personal calls must be kept to the
minimum.
Page 53 of 63
discussion. This ban strictly includes, but is not limited to, child
pornography, illegal drugs, software piracy, and physical harassment.
• Employees shall not use Hexaware web or messaging services for the
purpose of linking to external sites that violate this code of conduct.
• Employees should not upload files or post messages that contain photos,
music, software or other material protected by intellectual property laws,
rights of privacy or publicity, or any other applicable law unless they own
or control the rights there to or have received all necessary consents.
Hexaware is not liable for any use of material posted by users.
• Employees should not post or promote any materials that could damage
or dislocate another user's computer or would allow others to wrongly
access software or web sites.
• In addition to upholding this code of conduct, employees are responsible
for adhering to all local and national laws that pertains to their working
location / conditions whether in India or during visit / deputation / transfer
abroad for short term or long term.
Personal Property
Acts of Misconduct
The following acts and omissions shall be treated as misconduct. This list includes but is not limited to:
o Willful in-subordination or disobedience, whether alone or in combination
with others, to any lawful and reasonable order of a superior
o Theft, fraud or dishonesty in connection with the Hexaware's business or property
o Willful damage to or loss of Hexaware's goods or property
o Taking or giving bribes or any illegal gratification
o Habitual absence without leave or absence without leave for more than 10 days
o Habitual late attendance
o Habitual breach of any law applicable to the Hexaware
o Riotous or disorderly behaviors during working hours at the
establishment or any act subversive of discipline
o Habitual negligence or neglect of work
o Frequent repetition of any act or omission
o Striking work or inciting others to strike work in contravention of the
provision of any law, or rule having the force of law
o Misrepresentation or giving false statements about
Page 54 of 63
personal/professional background or suppression of relevant facts
during the selection process or at the time of joining or concealing any
information that would have played a role in selection / rejection of the
candidature for employment
o Involvement in criminal offences
o Violation of the terms of employment and undertaking given at the time
of joining/thereafter or violation of the service agreement
o Abetting or inciting others to disobedience or misconduct
o Conflict of interests with Company's business interests
o Any harassment at workplace
In case of employees violating any of the above acts or found indulging in any of the above
misconduct; company reserves the right to take an appropriate disciplinary action
commensurate with the act of commission and omission after doing the
enquiries/investigation.
No notice of termination shall be necessary if an employee is dismissed from service for
proven misconduct, breach of code of business conduct, violation of service
agreements, violation of confidentiality agreement or disobedience of written
instructions.
Violations of this code shall be reported as per the Whistle blower policy. In applicable
cases it will also have consequences in employment law and may lead to external
investigations and legal proceedings shall be initiated against the employees who
violate any legal or contractual agreements/obligations with the Company.
a) The HR function must ensure to inculcate all the principles as laid down in the code and
other ethics and compliance policies of the Company by imparting trainings as follows:
i. To all new joiners covering Hexaware's code of conduct, Anti- Bribery and Anti-
corruption Policies, Anti Money Laundering Policy and other related policies, within 30
days of joining.
ii. Annual refresher training to all the Employees to educate them on the requirements and
obligations as laid down by the company's code and all the other ethics and compliance
policies and procedures as well as rules and requirements of all the applicable laws and
regulations.
b) Upon joining Hexaware each Employee will be provided with a copy of the code of conduct
and required to sign an acknowledgement. On an annual basis, each employee will be
required to recertify compliance with the code. Annual execution of a statement of compliance
with the code [including any policies and procedures referred therein] shall be a condition of
Page 55 of 63
your continued employment with the Company.
The code is accessible to all the employees on the company's intranet. The company must also inform
all the third parties about this policy or any amendments thereof, through online upload of the code on
the company's website or any other mode as may be deemed to be necessary in this regard.
Any questions, exceptions or evaluations related to this code must be forwarded to Compliance
Officer, by means, such as email, by phone or in person.
Page 56 of 63
6.19 Annexure 1- Statement of compliance
I have received and reviewed Hexaware's Code of Conduct. I agree to comply with the
standards referenced in the Code and all related policies and procedures referred to
herein. I acknowledge that the Code is a statement of principles for individual and
business conduct and does not constitute an employment contract. I further
acknowledge that it is my responsibility to understand and follow compliance standards
and to adhere to the ethical principles outlined in the Code of Conduct.
I will comply with all relevant Anti-Bribery and Corruption laws including all laws,
regulation and other requirements as applicable to the respective geographies in
connection to our work with the Company.
I will not offer, pay, promise, solicit, provide, accept, or authorize, directly or indirectly,
any illegal bribe, kickback, or other improper or illegal payment to any person including
any Public Official (Government Official1) in connection with our work with the
Company.
I will not authorize, offer, promise or make any payment or give anything of value2
directly or through a Third Party a commercial party, in order to induce a Government
Official to do or omit to do any act in violation of a duty or other obligation or to
influence or reward an action or decision of the Public Official (Government Official) or
any non-government/ commercial party or to gain an improper business advantage.
I will not deal with any Government Official who has a direct or indirect legal or
beneficial interest in the business of the Company.
I will advise the Company immediately if these certifications change and/or no longer
remain accurate during the term of the employment.
1 For purposes of this certification, "Government Official" shall mean an officer or employee of a government or government agency of any
level, whether by appointment, by election or by agreement; an officer or employee of a body corporate that provides a service to the public;
exercising a public function or acting in an official capacity on behalf of a government; a party official or candidate for political office; an
officer or an employee of a public international organization, such as the World Trade Organization and the United Nations; or an employee,
officer, or director of a state-owned or state-controlled enterprise
2 For purposes of this certification, the term "anything of value" should be interpreted broadly to include anything that might be of value to the
recipient, including (but not limited to) cash, future business, gifts, travel expenses, entertainment (e.g., sporting events, concerts, etc.),
offers of employment or internships, business meals, sponsorships, and cash or in-kind charitable contributions. This also includes things of
value provided indirectly, such as business opportunities to business partners; gifts or hospitality to a spouse; or internships or jobs for
children of the intended bribe recipient
Page 57 of 63
Hexaware Technologies Limited
Code of Conduct
Annual Statement of Compliance
I will report any potential or actual violation of which I become aware promptly in
accordance with Hexaware's Whistle Blower Policy. I understand that Hexaware
maintains a policy of non-retaliation provided that the report is made in good faith. I
understand that any violation of the Code or any ethics or compliance policy or
procedure is grounds for disciplinary action, up to and including termination from
employment.
I also agree to notify Compliance Officer immediately of any change that might
adversely affect my compliance with the Code.
Employee ID 2000106646
Department ITOPRACT
Date 08-Oct-2023
Page 58 of 63
6.20 Frequently asked questions (FAQ)
Why do we have a code?
The Code serves as a guide for how employee should conduct themselves as a member of the
Hexaware team. Preserving our corporate culture and ensuring compliance with legal,
regulatory and fiduciary duties is vital to the organization and following the Code helps us do
that.
This Code applies to Hexaware Technologies Limited, its subsidiaries and affiliates operating
across all geographical regions (referred as the "Company"). It thereby applies to all
employees of the Company regardless of their location.
Employees have two responsibilities. First, all the employees must follow not only the letter of
the Code, but its intent and spirit as well and certify the commitment/compliance on annual
basis. Second, if you suspect someone may be violating the Code or any other compliance
and governance policies laid down by the Company, employee have an obligation to report it.
To make a report, follow the section of the Code: "Reporting of Unlawful and Unethical
Behavior, Whistle Blower Policy".
The Code attempts to deal with the most common issues that an employee may encounter, but
it cannot address every question that may arise and hence the Code is by no means a
substitute for our good judgment. When an employee is not sure what to do, they ask
themselves the following questions:
• Is it illegal?
• Does it feel like the wrong thing to do?
• Would you feel uncomfortable if others knew about it?
• Will it have the potential to create a negative perception of themselves or the Company?
• Do you have a personal interest that has the potential to conflict with the Company's
interest?
If answer to any of these questions is "yes", then the proposed conduct may violate the Code
and you should ask for help.
Page 59 of 63
How should I ask for help?
If an employee has any questions about the Code, any policies or guidelines referred to herein,
or about the best course of action to take in a particular situation, employee should seek
guidance from their supervisor/immediate superior or Compliance Officer.
Page 60 of 63
Employee Fair Processing Letter
Dear Employee,
The Company's Data Privacy Notice, summarises how we protect your data, our usage of that data
and other relevant information. For example, we set out in the attached Data Privacy Notice how we
as an organisation collect, use, store, transfer and secure personal data.
When processing data, we have determined that consent is not a necessary basis for the processing
of personal data for our day-to-day management of the employment relationship between the
company and its employees. Hexaware Technologies will rely on the following grounds to process the
personal data: -
1. Where we need to perform the contract we have entered into with you.
For example, Hexaware needs to have the freedom to perform the Company's obligations under the
employment contract as will be common for any employer for processing personal data. In any case,
the Company's employment relationship with its employees (or other types of contracts, e.g.
consultancy contracts with our contractors) are governed by the terms and conditions of those
contracts. Many of the other general rules of our organisation are covered in part in handbooks and
policies to which employees are subject by virtue of the contractual obligation in their contracts. e.g. in
respect of health and safety at work and I.T. Policies.
Non-exhaustive examples where this ground, is in our determination appropriate, include providing,
controlling and processing:
Under this ground, Hexaware's processing is necessary for compliance with legal obligations in the
countries to which we, as an employer, might be subject to. In the employment context, this could be
relevant to pre-employment vetting, performance of the employment contract (overlapping with the
above ground), and compliance with legal obligations owed by Hexaware to a third party. Examples
Page 61 of 63
might include:
• Pre-employment vetting of the right to work in the countries of our business intrests to comply
with the relevant regulations and immigration laws to prevent illegal working and to carry out
right to work checks on all prospective employees.Dealing with local tax authorities and other
relevant authorities
• Pre-employment vetting for example in the financial services industry
3. Where it is necessary for our legitimate interests (or those of a third party).
Examples are set out in the attached Data Privacy Notice but include: -
• The usual and expected processing of personal data to maintain the employment relationship
• To protect Hexaware's proprietary and commercially sensitive information and to comply with
its confidentiality obligations to its clients
• Processing for direct marketing purposes or preventing fraud
• Transmission of personal data within a group of undertakings for internal administrative
purposes, including client and employee data (note: international transfer requirements will still
apply)
• Processing for the purposes of ensuring network and information security, including preventing
unauthorised access to electronic communications networks and stopping damage to
computer and electronic communication systems
• Reporting possible criminal acts or threats to public security to a competent authority
• sharing of personal information when required for the business needs with our business
partners associates, customers and suppliers
If you have any further questions on this matter, please contact the HR Team in the first instance.
Yours sincerely,
Hexaware Technologies.
Page 62 of 63
UNDERTAKING
I, Sharad Verma do hereby confirm that I have read and understood all the Annexures __1_ to
__6__and I certify and agree that I will adhere to and comply with the all the Policies the in all material
respects.
The Company shall have the right to take any action against me in case of failure to adhere to and
comply with the all the Policies, including immediate termination of my employment.
Page 63 of 63