We Protect Our Information Assets

Our Commitment

We safeguard GM’s information assets, including confidential and proprietary data, from loss and misuse. Responsible use and strong cybersecurity protect our company and customers. 

How We Win With Integrity

Learn more by clicking the arrows below.

Information Technology

Use technology responsibly.

Use technology in accordance with our policies. Never access, store, or transmit anything that’s intimidating, obscene, or discriminatory. 

Follow GM guidelines for accessing devices and accounts, never share your credentials with others, and do not enter credentials into unknown prompts. Lock your workstation when stepping away. Install updates when prompted and do not modify or disable security protection tools. 

Cybersecurity

Cybersecurity should be considered in all phases of development.

Think about security by design in your process. Consult our internal experts for advice. 

Keep vehicle control systems and personal information safe and secure. 

Install updates in a timely manner. These measures help us reduce vulnerabilities. 

Confidential Information

Only access the information you need to do your job.

Only share information with those who need to know. Avoid discussing GM Secret or Confidential Information in public places where others can hear. 

Never upload or paste GM Secret or Confidential Information in any unapproved tool (including AI platforms), and never send such information to your personal email or other accounts. 

Whether verbally, in writing, electronically, or through any other means. Share only with authorized third parties who have a legitimate business reason to know and where the appropriate contracts have been put in place. Make sure security terms are included in their contracts, and only share using approved platforms. 

A document must be classified according to its most sensitive content. The presence of any GM Secret Information requires that the entire dataset or document be classified as GM Secret and protected accordingly. 

Records Management

Identify, maintain, safeguard, and dispose of records properly.

Comply with GM’s records retention schedule and securely dispose of records that are no longer needed. 

Never dispose of any information subject to a litigation hold. 

or direct anyone else to do so. 

Speak Up

Immediately report...

…suspected theft or abuse of confidential, proprietary, or tradesecret information. 

Intellectual Property and Proprietary Information

Identify, protect, and defend our intellectual property.

Promptly identify and report any suspected unauthorized disclosures or possible infringements by any third party. 

Never knowingly infringe the valid IP rights of third parties. Expect the same from our business partners and competitors. 

Proceed With Caution!

Remember that anything we create, store, download, send, or receive using our systems is company property. It can be reviewed at any time, as allowed by applicable law. Reasonable personal use of our technology is permitted, but use good judgment. 

Which Way?

I have been working long hours on a new project. Is it OK for me to transfer some files to a personal cloud account? That way I can work on them from my home computer.

No. They may be confidential and could be compromised if not properly handled. IT is available to support employees with necessary equipment to accommodate remote working needs. 

Navigate Our Policies

Keep Reading

We Safeguard Personal Information