- Model code of ethics and business conduct
- Draft hotline regulations
- Draft internal investigations regulations
- Posters and banners for employees
- Draft letters to staff and business partners
- Online training for users
- Free support
We recommend that you follow our standard business user roles and pre-defined rights, authorities, limitations, and the order and timing of certain actions.
However, in some organizations, especially in large organizations, there may be additional individual needs that would be redundant for most of our clients.
For such cases, we would be happy to make any exceptions and additional refinements, as they say, "to order", but provided that they do not nullify the effectiveness of the system as a whole.
1. Our independence from your company's management. We do not collect or provide information about informants that can be used to track or calculate the personal data of system users.
2. encrypting data transmissions.
3. Protecting your anonymity. An anonymous whistleblower feedback room using a secret code.
4. Certified independent server.
5. We do not have access to your data. The system architecture separates the database from the application.
6. Personal data protection
7. Encryption and backup of data on the server.
For more details, see Question Answer
The system is deployed in an isolated instance in certified corporate class data center.
We use cloud providers that guarantee the availability of the service (uptime) from 99%. Very often, this level of availability is technically unattainable for corporate IT infrastructures.
The performance of an isolated server is sufficient to deploy heavily loaded applications that exceed the requirements of the database and the Ethicontrol application by several times.
Write to us and we will work out a deal. Our task is to make the implementation of ethical infrastructure accessible!
Usually, we place the database on an independent server in one of the certified data centers of Europe, America or CIS countries, at your choice.
However, we are happy to satisfy your desire to host the system on servers that belong to you in your own data center. In this way, you can physically control the safety of your data.
By default, the legal side of the service is tailored to EU and CEE countries. Very often, our clients operate in several countries and one company can fall under several jurisdictions, meeting the requirements of a number of countries.
Each jurisdiction has its own requirements for information technology services, rules of hotlines, as well as the handling of personal data of users.
We can take into account all the requirements at the same time, providing your lawyers with draft legal statements, as well as descriptions of the relevant changes in the system.
Yes, the call processing service of our call-center provides the first number (paid calls to callers) free of charge.
Each subsequent number is +10 euro/month.
Toll-free lines usually may cost above 50 EUR/month additionally, depending on a country and they are not included in the standard tariff plan.
We understand the importance of economic interests and efficiency needs.
Including, the lowering the number of transactions.
Our policy is to stimulate the decrease of unproductive operating procedures.
That is why we offer discounts when paying in advance annually -15%, and biannually - 25%.
More than two years - need to negotiate - just write to us!
Educational and scientific organizations can be eligible for "Ethicontrol for education and scientists" and:
- organize a speak up hotline to receive reports of ethical standards violations or academic misbehavior.
- set up or improve your own whistleblowing mechanism dealing with anonymous reports and feedback.
More at https://ethicontrol.com/en/for-educators
Delegating incidents allows one user of the system to transfer a task (incident, message) to another user, who will act on behalf of the first user.
A typical scenario in which this function is used is the interaction of the manager and his subordinate, or when the manager delegates the incident to a specific case manager.
Along with delegation, access rights to a certain case (informant's message) in the system are also transferred. The function of differentiation of access rights allows to manage the rights of users to read or write both at the level of types of cases (cases, messages) and to establish an individual list of persons with the right of access to each individual case.
Response is part of incident management and includes immediate notification of you when a report is received from an informant, prioritization of messages, the ability to delegate the message to other users, as well as monitoring the timeliness of processing such messages.
Investigation is a logical continuation of the response function in cases where a good response requires a more thorough examination of the situation and the facts.
Case management provides for automated formation of a team, assignment of a pre-defined scenario (workflow), as well as documentation of case materials in the system.
Ability to filter incoming informants' messages by countries, different legal entities of the same business group, by geographical, business and functional divisions.
Accordingly, it is possible to differentiate the access rights of users based on their role in the case, the team and the system as a whole, as well as based on their belonging to a particular unit.