Policies and guidelines

Red Hat, Inc. Supplier Code of Conduct

1. Compliance with law

Suppliers must conduct their business activities in full compliance with the applicable laws and regulations while conducting business with and/or on behalf of Red Hat, Inc. and must, without limitation:

  1. Trade
  2. Labor
  3. Insider Trading
  4. Anti-Corruption
  5. Environment
  6. Record Keeping

2. Gifts and Gratuities

Suppliers or its representatives or employees must not offer to any Red Hat employee a kickback, favor, gratuity, entertainment or anything of value to obtain favorable treatment from Red Hat. As long as a gift is not intended favorable treatment for the supplier and does not create the appearance of a bribe, kickback, payoff, or irregular type of payment, Red Hat employees are allowed to accept gifts if a) it does not exceed a value of more than $100, b) public disclosure would not embarrass Red Hat, c) acceptance is consistent with applicable country law and local customs, and d) acceptance is consistent with Red Hat business practices and policies.

3. Conflicts of Interest

No supplier shall enter into a financial or any other relationship with a Red Hat, Inc. employee that creates a conflict of interest for Red Hat, Inc. Suppliers and/or their representation shall not deal directly with any Red Hat employee whose spouse, domestic partner, other family member or relative holds a significant financial interest in the Supplier. All such conflicts must be disclosed, corrected, or approved by Red Hat management.

4. Reporting Concerns

Report to Red Hat any conduct, including conduct of any Red Hat employee, that you believe in good faith to be a possible violation of the Supplier Code of Conduct. Suppliers are expected to monitor their own compliance with this Supplier Code of Conduct. Suppliers can contact Red Hat through the following method: Mail a letter to General Counsel at Red Hat, inc. 100 East Davie Street Raleigh, NC 27601

5. Data privacy/Security

If a Supplier receives data that contains confidential information or information protected by privacy standards, the data should be stored securely and shared only internally with those employees with a need to know. Confidential information must not be transferred, published, used, or disclosed other than as necessary in providing services to Red Hat or as directed or authorized by Red Hat.

6. Use of Red Hat Trademark

Suppliers may not use the Red Hat trademark, images, name, or other materials to which Red Hat owns the copyright.