We Protect Our Information Assets
Our Commitment
We safeguard GM’s information assets, including confidential and proprietary data, from loss and misuse. Responsible use and strong cybersecurity protect our company and customers.
How We Win With Integrity
Learn more by clicking the arrows below.
Information Technology
Use technology responsibly.
Use technology in accordance with our policies. Never access, store, or transmit anything that’s intimidating, obscene, or discriminatory.
Keep devices and accounts safe.
Follow GM guidelines for accessing devices and accounts, never share your credentials with others, and do not enter credentials into unknown prompts. Lock your workstation when stepping away. Install updates when prompted and do not modify or disable security protection tools.
Cybersecurity
Cybersecurity should be considered in all phases of development.
Think about security by design in your process. Consult our internal experts for advice.
Focus on our customers and their data.
Keep vehicle control systems and personal information safe and secure.
Only install approved software.
Install updates in a timely manner. These measures help us reduce vulnerabilities.
Confidential Information
Only access the information you need to do your job.
Only share information with those who need to know. Avoid discussing GM Secret or Confidential Information in public places where others can hear.
Never use GM Secret or Confidential Information outside of GM.
Never upload or paste GM Secret or Confidential Information in any unapproved tool (including AI platforms), and never send such information to your personal email or other accounts.
Be careful when sharing GM Secret or Confidential Information externally.
Whether verbally, in writing, electronically, or through any other means. Share only with authorized third parties who have a legitimate business reason to know and where the appropriate contracts have been put in place. Make sure security terms are included in their contracts, and only share using approved platforms.
Label GM information with the appropriate data classification.
A document must be classified according to its most sensitive content. The presence of any GM Secret Information requires that the entire dataset or document be classified as GM Secret and protected accordingly.
Records Management
Identify, maintain, safeguard, and dispose of records properly.
Comply with GM’s records retention schedule and securely dispose of records that are no longer needed.
Comply with any document preservation or litigation holds.
Never dispose of any information subject to a litigation hold.
Never selectively discard records that have not met their retention requirements...
…or direct anyone else to do so.
Speak Up
Immediately report...
…suspected theft or abuse of confidential, proprietary, or trade–secret information.
Intellectual Property and Proprietary Information
Identify, protect, and defend our intellectual property.
Promptly identify and report any suspected unauthorized disclosures or possible infringements by any third party.
Respect the intellectual property of others.
Never knowingly infringe the valid IP rights of third parties. Expect the same from our business partners and competitors.
Proceed With Caution!
Remember that anything we create, store, download, send, or receive using our systems is company property. It can be reviewed at any time, as allowed by applicable law. Reasonable personal use of our technology is permitted, but use good judgment.
Which Way?
I have been working long hours on a new project. Is it OK for me to transfer some files to a personal cloud account? That way I can work on them from my home computer.
No. They may be confidential and could be compromised if not properly handled. IT is available to support employees with necessary equipment to accommodate remote working needs.