All Staff Procedures

Code of Ethics 

The Code of Professional Ethics is a guide to be applied by every employee of Fiber Group.

Read More

Dress Code 

Choosing the right outfit to show up to work is important to the Fiber Group company. 

Read More

Anti-Bribery

This anti-bribery policy exists to set out the responsibilities of Fiber Group and those who work for us in regards to observing and upholding our zero-tolerance position on bribery and corruption.

Read More

The Whistleblower

To meet this standard, it is important to learn of potential misconduct and to put a stop to it. Fiber Group Whistleblower System offers the opportunity to report potential misconduct of employees.

Read More

Electronic Messaging

This policy document describes how you may use the provided Fiber Group electronic messaging facilities, including what you must and must not do.

Read More

Employee Locker

Use this snippet to build various types of components that feature a left- or right-aligned image alongside textual content. Duplicate the element to create a list that fits your needs.

Read More

Password Policy

Passwords are still considered as the primary method to ensure there is no unauthorized access to Fiber Group networks and systems.

Read More

Training Room

The scope of this procedure is to prescribe the rules that Fiber Group follows in the case of managing the Training room.

Read More

Clean Desk

Use this snippet to build various types of components that feature a left- or right-aligned image alongside textual content. Duplicate the element to create a list that fits your needs.

Read More

Use of 2FA Hardware (YubiKey)

The purpose of this policy is to give clear understanding of what The YubiKey is and inform on the usage within the company.

Read More

Working Hours Regulation

Use this snippet to build various types of components that feature a left- or right-aligned image alongside textual content. Duplicate the element to create a list that fits your needs.

Read More

Grievance 

Use this snippet to build various types of components that feature a left- or right-aligned image alongside textual content. Duplicate the element to create a list that fits your needs.

Read More

Security Incident Response

This document is intended to be used when an incident of some kind has occurred that affects the security of Fiber Group. It is intended to ensure a quick, effective and orderly response to security incidents.

Read More

Internet Acceptable Use

This policy document tells you how you may use the Fiber Group Internet facility. It outlines your personal responsibilities and informs what you must and must not do.

Read More

Data Retention and Protection

In its everyday business operations Fiber Group collects and stores data of many types and in a variety of different formats. The relative importance and sensitivity of this data also varies.

Read More

Software Policy

Fiber Group uses many types of computer software to perform its business operations and relies upon the correct functioning and security of that software at all times.

Read More