At Koch, we see a future where artificial intelligence (AI) will accelerate value creation, individual empowerment, and human knowledge. We will channel AI’s capabilities in ways that are consistent with our beliefs and values, ensuring this technology serves economic progress for our employees, customers, suppliers, communities, and other core constituencies in a mutually beneficial way. To learn much more, visit koch.link/GenAI.
IP that you or others create on behalf of the company, or that relates to our business, belongs to the company. If we do not identify and protect our IP, we risk losing our rights to it and the competitive advantages it offers.
The company also respects the valid and enforceable IP rights of others throughout the world. Specific interaction with others’ IP such as patents and trade secrets can become complex and requires partnership with legal and business resources to ensure proper protection is provided.
The company also respects the valid and enforceable IP rights of others throughout the world. Specific interaction with others’ IP such as patents and trade secrets can become complex and requires partnership with legal and business resources to ensure proper protection is provided.
Assets & Ideas
Properly Using Assets & Ideas
Intellectual Property
The value of ideas, creations, innovations, and information — intellectual property (IP) — often exceeds the value of more tangible items, such as physical property. The company’s considerable IP assets are central to developing new products, attracting new business opportunities, and maintaining our existing businesses in a highly competitive environment. IP can include, but is not limited to, patents, industrial designs, trademarks, trade names, trade dress, copyrights, domain names, trade secrets, and other confidential information whether registered or unregistered. For more information, contact your supervisor or the options for guidance that have been noted.
We protect the resources and information entrusted to us by the company and our partners by:
- Safeguarding our IP, taking care to not lose, misplace, or leave the IP unattended or where others may easily access it.
- Reporting any potential or actual breaches of security, theft, or misappropriation to the appropriate resources.
- Not using the IP for personal benefit or for the profit or benefit of persons outside the company.
- Recognizing the obligation to protect IP after employment ends, returning all property, documents, materials, files, and related documents to the company.
IP that you or others create on behalf of the company, or that relates to our business, belongs to the company. If we do not identify and protect our IP, we risk losing our rights to it and the competitive advantages it offers.
The company also respects the valid and enforceable IP rights of others throughout the world. Specific interaction with others’ IP such as patents and trade secrets can become complex and requires partnership with legal and business resources to ensure proper protection is provided.
The company also respects the valid and enforceable IP rights of others throughout the world. Specific interaction with others’ IP such as patents and trade secrets can become complex and requires partnership with legal and business resources to ensure proper protection is provided.
SPEAK UP!
Report a Concern
WANT A COPY?
Current and Prior

Communication Tools
Appropriate & Secure Electronic Usage
The company provides several electronic communication tools that employees can use every day. These tools enhance our competitive advantage in the marketplace. Constant technological changes (i.e., artificial intelligence) will increase the number and type of company-approved communication tools available to employees.
The tools used for company business are subject to monitoring by the company to the extent allowed by law. The company has the right to access these tools and use the content for any lawful purpose. In some cases, local law requires more specific notifications and policies on this topic, which will be appropriately provided.
Regardless of which communication tools you use, you are expected to use them in an acceptable manner and for proper purposes. The following are examples to help you navigate your actions.
The tools used for company business are subject to monitoring by the company to the extent allowed by law. The company has the right to access these tools and use the content for any lawful purpose. In some cases, local law requires more specific notifications and policies on this topic, which will be appropriately provided.
Regardless of which communication tools you use, you are expected to use them in an acceptable manner and for proper purposes. The following are examples to help you navigate your actions.
Appropriate and Acceptable Uses of Company Assets
- Internal (with other company employees) and external (with customers, suppliers, and business partners) business communications.
- Access to information for appropriate business, technical, and research purposes.
- Limited personal use that does not distract from your regular job duties is not excessive and does not result in inappropriate or unapproved costs.
Inappropriate and Unacceptable Uses of Company Assets
- Revealing company’s IP without the appropriate authorization or agreements in place, inadvertently or intentionally.
- Handling materials that could be considered unethical, inappropriate, offensive, disrespectful, harassing, or abusive to others.
- Conducting outside business or misrepresenting oneself as another individual or company.
- Illegal or illicit streaming or downloading music and videos.
Use of Non-Company-Provided Electronic Communication and Messaging Tools
Messaging apps that can automatically delete content/messages immediately or after a short period of time are considered ephemeral. Usage can present risk when used for company business but can also be critical to maintaining communications with key external constituents. Using these tools should be discussed with your supervisor, Compliance, and Legal to assess what, or if, controls and precautions should be employed.
Improper use of non-company-provided tools can have numerous impacts, including putting company IP at a high risk of disclosure. Users must remain diligent that these communications are appropriately managed; appropriate disposition should occur or retention in the case of a legal hold or regulatory request for production.
It is critical that employees use good judgment when utilizing non-company-provided tools and fully understand the risks and the benefits of that use.
Improper use of non-company-provided tools can have numerous impacts, including putting company IP at a high risk of disclosure. Users must remain diligent that these communications are appropriately managed; appropriate disposition should occur or retention in the case of a legal hold or regulatory request for production.
It is critical that employees use good judgment when utilizing non-company-provided tools and fully understand the risks and the benefits of that use.
Cyber Security Expectations
Our employees are our first line of defense when protecting the company from potential cyber threats and attacks. We expect our employees to:
- Use strong, unique passwords and passphrases to secure their accounts and devices.
- Enable and apply multifactor authentication (MFA) to add an extra layer of security.
- Be vigilant and avoid interacting with suspicious links and attachments that may be phishing attempts or contain malware.
- Do not attempt to alter, circumvent, or break company information security protections or processes.
- Ensure the use of any third-party information systems that will exchange, store, process, or manage company data undergoes the information technology risk assessment applicable at our company.
- Report any security incidents or suspicious activities immediately using the appropriate reporting channels listed or koch.link/cyber911.
Your proactive measures and awareness are vital in maintaining the security of our organization. By using our assets and ideas in a responsible and principled way, we can achieve our Vision of creating more value for others and fulfilling our potential as individuals and as a company.