WE USE SYSTEMS WITH CARE

Two co-workers interacting with a laptop, tablet, and phone.

Keep Information Systems Secure

INFORMATION AND COMMUNICATIONS SECURITY IS A TOP PRIORITY for T-Mobile, and that includes ensuring that company information and communications systems are secure.

We are vigilant about protecting T-Mobile’s systems from unauthorized access, including by following robust security practices when accessing or using company systems.

How we keep T-Mobile’s information and communications systems secure:

Protect against unauthorized access

  • Protect your credentials. Change your password, PIN, or other credentials immediately if you suspect they have been compromised.
  • Never share your system credentials (passwords, PINS, tokens, or codes) with anyone, for any purpose.
  • Do not use anyone else’s system credentials.
  • Follow the appropriate authorization process for requesting access to customer and employee data, and T-Mobile resources and assets.
  • Comply with T-Mobile security controls, including requirements for authentication, software patching, and virus control directives.
  • Understand how to avoid social engineering attacks, and immediately report suspicious communications.
  • Review and understand our Acceptable Use Policy.

Use authorized assets and applications

  • Only use T-Mobile-approved applications, including when working remotely.
  • Do not install or use unauthorized software, hardware, or external storage devices, as they can be used to transmit malware or ransomware or to remove sensitive documents from your computer.
  • Before traveling internationally, check with International Travel Security about transporting T-Mobile assets and data.
  • Go to the Integrity Hub: Cyber Security for additional information and guidance.

Use AI Responsibly

T-MOBILE IS COMMITTED to harnessing the power of AI the right way.

AI has tremendous potential to improve the way T-Mobile delivers services, delights customers, reduces risk, supports employees, and expands the availability of our services.

At the same time, AI may have unintended consequences, including inaccurate or biased responses. Acting responsibly while using AI enables us to leverage the power of AI for good while helping to mitigate its risks.

How we use AI responsibly:

  • Integrate our AI Principles—Responsibility, Fairness, and Transparency—into our everyday interactions with AI.
  • Review and understand our Responsible AI Policy, which outlines T-Mobile’s expectations and restrictions regarding AI acquisition, development, deployment, and operation.
  • Only use T-Mobile-approved AI tools.
  • Review AI outputs for accuracy, fairness, and bias before using or relying on them.
  • Always keep ethics, privacy, security, and safety in mind when using AI.
  • Don’t use free or other public versions of AI tools for work purposes.
  • Don’t input customer, employee, or applicant information into an AI tool unless you have confirmed that the tool has been expressly approved for that type of use.
  • Consult Legal if your AI tool makes decisions concerning employees or consumers, as additional review and safeguards may be required.
  • Go to the AI Hub for additional information and guidance.

Be Smart with Social Media

SOCIAL MEDIA ENGAGEMENT is an integral part of doing business.

With billions of impressions and millions of followers, social media is a great place to make our voices heard. But as you know, with great power comes great responsibility.

How we use social media the right way:

  • Use your own private email address to create your personal social media account.
  • When posting to your personal account about T-Mobile, make it clear that you are expressing your personal opinions, that you’re not speaking on behalf of the company, and that you’re employed by T-Mobile, either in the body of the post or by using #TeamMagenta.
  • Don’t create social handles that include the T-Mobile name or branding; our nickname, products, or services; your store number; or any word or trademark that implies a connection to T-Mobile.
  • Don’t share restricted, confidential, or proprietary information about business initiatives, products, or services on social media.
  • Only post videos recorded in the workplace on social media if you’re on the clock; your manager approves; everyone filmed has agreed it’s okay to record and post; no restricted or confidential information is shown; the content doesn’t violate T-Mobile policies, including our policies on Equal Employment Opportunity, Standards of Conduct, and Workplace Expectations; and you’re working at a location that is appropriate for filming.
  • Only employees whose job it is to speak for T-Mobile may post on behalf of T-Mobile.
  • Don’t attempt to answer customer questions unless customer support on social media is your job.
  • Review and understand our Social Media Policy.
  • Go to the Integrity Hub: Social Media for additional information and guidance.

Use Company Assets and Resources the Right Way

WE USE T-MOBILE ASSETS and resources to do our jobs every day.

These include money, information, property, equipment, devices, electronic systems, applications, vehicles, and office supplies. Each of us is responsible for exercising common sense and using company resources properly.

How we use company resources and assets properly:

  • Spend T-Mobile’s funds wisely and guard against waste and abuse.
  • Understand that T-Mobile assets and resources are to be used for business purposes; personal use is acceptable only if it is incidental, infrequent, not otherwise prohibited, and does not interfere with business purposes or the security of the resource.
  • Do not use T-Mobile assets or resources in ways that violate the law or T-Mobile policies, including those relating to workplace discrimination and harassment, intellectual property, trade secrets, privacy, child abuse, inappropriate sexual content or conduct, outside business or employment, personal political activities, and threatening behavior.
  • Use only T-Mobile-approved applications for business communication.
  • Be aware that access to and use of T-Mobile assets and resources, including your company email account, is not private and may be monitored by the company.
  • Understand that business-related data stored on, processed by, or transmitted via T-Mobile resources is T-Mobile’s property, and that it may be accessed, monitored, used, and disclosed by T-Mobile. T-Mobile may also review certain uses or transactions on any personal resource to the extent it is used for T-Mobile business purposes.
  • Review and understand our Acceptable Use Policy.
  • Go to the Integrity Hub: Acceptable Use for additional information and guidance.