StarBytez Code of Conduct Crash Course

Congratulations on becoming a part of the team with us at StarBytez! Here at StarBytez, we value our community as a family and well-oiled machine. In this course, you will become familiar with our core standards regarding Company Ethics, Privacy, Intellectual Property, Computer Protection, Personal Wellness, and Personal Technology Usage. Don't worry; this should only take a few minutes of your time - you can get back to creating Awesomeness as soon as you're finished! 

Have fun!

-Mickaela Cyrus, Elizabeth Pilon, Paris Draheim & Jennha Hanshe

StarBytez Hiring Managers

StarBytez Code of Ethics

Ethics Guidelines

The Core of StarBytez

Ethical behavior goes beyond what is written on a piece of paper.  It is a reflection of the fantastic reputation StarBytez has accrued through the years, due in part to our employees’ actions and customers' responses to our stellar service. 

Your Team Leaders are there to lead by example and to ensure our policies are well understood and communicated in a proper manner.

StarBytez employees will operate responsibly under our code of ethics as well as comply in accordance with all relevant laws and regulations.


Specifically, employees will:

  • Follow and promote ethical business practice;

  • Persistently ensure equal opportunities amongst all employees;

  • Provide a safe and healthy work environment for all that come into contact with us;

  • Implement values & diversity in the workplace;

  • Properly route all non-compliant measures to the proper authority to ensure compliancy.

These practices are what have shaped our community and have created a sound work place for all. These Ethical Codes have not covered all possible situations so all employees must read and comply with our terms as well use good judgment when conducting business within StarBytez. Any questions, please do not hesitate to ask!

What is Privacy?

What is Privacy?

Here at StarBytez, we are committed to protecting all personal information obtained through the course of doing business. We as a company expect all employees to follow basic legal rules that are taught within your training period and in which are the basis of protection of data given.

Employees must ensure:

  • Customer data is not to be shared with third-party affiliates;
  • Personal information pertaining to co-workers, suppliers, or upper management is to be protected;
  • Any sensitive information is secure at all times.

Please ensure you are aware of all local data protection policies - if you are unclear, please speak with your Team Leader or HR. Common sense and good judgment should be applied at all times; after all, that's why you're here!

Guidelines for Dealing with Confidential Information

Here at StarBytez, customer information is constantly being analyzed and checked for quality control and safety. As an employee at StarBytez, you must adhere to these basic standards to ensure the safety of our customers’ information:


Intellectual Property Guidelines

Avoiding Infringement & Theft

We at StarBytez recognize and respect intellectual property rights and are committed to fulfilling our moral and legal obligations with respect to our use of copyright-protected works.

Any projects you work on with company resources and time are the property of StarBytez. Please report to your Team Leader if you have any questions about this, or if you see anyone breaking this policy. 

You may not use any outside copyright material unless it is licensed with the company or is protected under US copyright law. If you have questions, please do not hesitate to discuss them with your Team Leaders or HR.

Guidelines for Protecting your Computer

Computer Protection is Vital 

As a new employee of StarBytez, you will be given a brand new personal computer and laptop to work with.

Despite having an excellent email program, spam, which is unsolicited bulk emails that may contain malicious viruses, can sometimes find its way to your inbox. It is crucial that StarBytez employees protect their computers from a virus, which could jeopardize our customer’s private information. 

Blatant Spam Emails

Illegitimate Phishing Email

To prevent unknowingly downloading a virus onto your computer, follow these few steps to keep your PC protected:

  • Always check the sender of the email to make sure they are known;

  • Never download attached files from an unknown sender;

  • Report any excessive spam or phishing attempts to the IT department immediately. 

Personal Wellness Guidelines

Your Health is Our Priority

We encourage the environment at StarBytez to be fun and friendly; we work hard and we play even harder. That being said, because we are a tech company, we need to ensure your safety while you work your long hours.

We understand that you may spend most of your working hours on the computer, and thus the internet. Internet addiction is a dangerous issue, so please be aware of the signs of overuse. Addiction is any persistent, compulsive behavior that is harmful to you. To help avoid this issue, you will be allowed one 20-minute siesta every day to take when needed. Please mark on your timesheet when you take this break. And remember, this is not included in your hour-long lunch break! 

Ergonomic chairs and desks are available upon request. 

Guidelines for Personal Technology Usage

We are a Tech-Based Company

Here at StarBytez, we do not implicitly censor online content. Censorship is the attempt to suppress or regulate public access to material considered offensive or harmful. 

An outside company has reviewed your social media for any offensive and inappropriate content. You've passed! Please be aware that you now represent StarBytez, so anything you say or do online is a representation of you and of this company. 

What you do on your own time is your own business; however, we have a zero-tolerance policy when it comes to on-premise activity. These activities include but are not limited to:

  • Drug use;
  • Cyber-bullying;
  • Pornographic or violent content, unless properly justified for work purposes.

If you are caught participating in any of the above behaviors, you will be immediately terminated from the company. 

Please limit your social media use at work; we give you the discretion to choose how you spend your time at work while trusting that you are able to complete all your work and stay productive. 


What is an example of a strong password?

  • 1234567890
  • G*rbea8$e
  • qwerty123
  • johndoe

Mark the following statements as true or false.

  • Because you work in a secure building, you can discuss confidential information in an open work area.
  • You should always lock your computer when you are away from your desk.

What constitutes Intellectual Property?

  • Customer Lists
  • Proprietary Designs
  • Patents
  • All of the Above

Mark the following statements as true or false.

  • We have a zero-tolerance policy against illegal behaviors performed upon Company grounds
  • As long as you don't get caught, you can do whatever you want
  • Violent and pornographic images are not permitted to be viewed unless properly justified

You should always download an attachment in an email, regardless of the sender.

  • False
  • True