[REDACTED]
Our organization delivers advisory, security, mission support and technology solutions to its clients enabling them to succeed in challenging environments around the verse. Our elite training and security solutions are primarily focused on counter-terrorism, force protection, bounty enforcement, and security operations. We provide training through mobile teams across occupied space.
Any employee WHO violates any of The Code, is subject to strict disciplinary action, which may include action up to and including paycuts, suspension of queue, termination of employment or execution.
Additionally, any employee who engages in reckless or malicious reporting, knowingly makes or refers a false allegation with knowledge that the incident reported has no factual basis, deliberately provides false information, or refuses to cooperate when subject to an investigation SHALL not be tolerated.
NORECORD
No employee may discuss any happenings in or processes of the Company to anyone not vested within. Employees must also ALWAYS prioritize discretion and the security of the company (including its employees and clients).
Operations
Any employee that has volunteered and then been selected for an operation must PERFORM said duties laid out in brief, at the time designated.
Corruption
We discourage employees from accepting gifts from clients or affiliates. We prohibit briberies for the benefit of any external or internal party.
Conflict of interest
We expect employees to avoid any personal, financial or other interests that might hinder their capability or willingness to perform THEIR job duties.
Confidentiality
No employee may send CONFIDENTIAL information to unauthorized recipients.
Company Confidence
No employee may perform unauthorized actions, like hacking, fraud or buying/selling illegal goods while performing company related DUTIES.
Espionage
No employee may provide counter-intelligence to another faction, organization, pmc, government agency or pirate entity.
The 4th Wall
[IRL] No employee may Invade another person’s privacy and gain access to sensitive information (for use in-game or otherwise) or attack their network. (Speak with your Control for guidelines on proper IRL data gathering and infiltration)