Innovate Boldly

We courageously strive for breakthrough innovations driven by our relentless curiosity, bold thinking, speed of decision- making, and agile execution.

Intellectual Property and Company Assets

We safeguard our company’s intellectual property and other company assets, and we use company resources responsibly.

What is a company asset?

A company asset is a resource or thing of value owned by Ingredion. A company asset can take several forms, such as:
  • Information assets: Any data relating to our products, business, or how we conduct our operations, regardless of how it is created, distributed, used, or stored.
  • Financial assets: Money and anything that can be converted into money, such as stocks, bonds, and bank deposits.
  • Physical assets: Anything tangible the company owns that is used to conduct our business (e.g., facilities, machinery, tools, computers, mobile phones, raw materials, vehicles, office equipment, and supplies).
  • Intangible assets: Our reputation, ideas, inventions, intellectual property, designs, copyrights, trademarks, patents, and trade secrets.
  • Work product: Your work product belongs to Ingredion if it is created or developed—in whole or in part—on company time, or as part of your duties, or using company resources or information.

Living Our Values

Our company assets are extremely valuable. They drive innovation, protect our company’s reputation, and support us in delivering superior products, services, and solutions. We safeguard and use our company’s assets responsibly by:

  • properly securing physical assets and following all security procedures applicable to our jobs;
  • properly securing computers, laptops, and other electronic devices;
  • following Ingredion Brand Guidelines and seeking appropriate approval prior to releasing Ingredion- branded communications;
  • properly securing company confidential information and never disclosing confidential information to anyone outside the company unless we have explicit approval (e.g., the information is covered by a non-disclosure agreement); and
  • securing and not deleting any files, documents, or other information that may be needed for pending or anticipated litigation, investigation, or audit.

Email, Internet, and Information Systems

We use company email, internet access, and other information systems responsibly and protect the security of our information systems.

Living Our Values

The company’s email, internet access, and information systems are vital tools that are necessary for innovating boldly. Employees must exercise good judgment in using the company’s systems:

  • grant access only to authorized individuals and only for as long as needed;
  • take appropriate steps to use strong passwords and to protect passwords;
  • do not use company resources, email, and internet access to offend, harass or threaten others or to access, send, or store illegal or offensive material;
  • make only reasonable, incidental personal use of company equipment and systems;
  • never download unauthorized or unlicensed software onto Ingredion computers or mobile devices;
  • take reasonable precautions to safeguard company devices, such as laptops, by not leaving them unattended while traveling or in exposed locations where they can be stolen;
  • do not use company information systems to reproduce, display, distribute, or store materials that violate anyone else’s trademark, copyright, licensing, or other intellectual property rights; and
  • report a suspected data breach, or any situation in which you believe data has or may have been compromised, including the loss or theft of a laptop or mobile device, to the IT Service Desk immediately.

Our Values in Action

Q:

I used my company-issued computer to download free software that I can use in my work.

A:

Never install applications or software onto devices—company owned or otherwise— that could undermine the security of Ingredion’s information technology assets. Installing applications directly can introduce viruses or other rogue programs into the company network that can cause damage. In addition, do not click links in emails from unknown sources, as you may be permitting entry of potentially harmful code to the company’s network unwittingly.

Next: We Think And Act As Owners