Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Introduction and Purpose: Overview of the code's purpose and its importance to the organization
2. Scope and Application: Defines who the code applies to, including employees, contractors, and other stakeholders
3. Core Values and Principles: Statement of the company's fundamental values and guiding principles
4. Legal Compliance: Commitment to comply with all relevant laws and regulations
5. Workplace Health and Safety: Safety requirements, protocols, and responsibilities
6. Professional Conduct: Expected standards of behavior, professionalism, and workplace conduct
7. Vehicle and Equipment Operation: Standards for operating and maintaining vehicles and equipment
8. Customer Service Standards: Guidelines for customer interactions and service delivery
9. Environmental Responsibility: Environmental protection measures and sustainable practices
10. Confidentiality and Data Protection: Requirements for handling sensitive information and data privacy
11. Anti-Discrimination and Equal Opportunity: Commitment to fair treatment and prevention of discrimination
12. Reporting Violations: Procedures for reporting breaches and whistleblower protection
13. Disciplinary Procedures: Consequences of code violations and disciplinary processes
14. Review and Amendment: Process for reviewing and updating the code
1. International Operations: Additional requirements for cross-border operations and international compliance
2. Dangerous Goods Handling: Specific procedures for handling and transporting dangerous goods
3. Cold Chain Operations: Standards for temperature-controlled logistics operations
4. Security Protocols: Enhanced security measures for high-value or sensitive cargo
5. Subcontractor Management: Guidelines for managing and monitoring subcontractor compliance
6. Remote Operations: Special procedures for operations in remote or regional areas
7. Indigenous Engagement: Protocols for operating in indigenous areas and engaging with indigenous communities
8. Crisis Management: Procedures for handling emergencies and crisis situations
1. Schedule A - Incident Reporting Forms: Standard forms for reporting safety incidents and violations
2. Schedule B - Safety Checklists: Daily, weekly, and monthly safety inspection checklists
3. Schedule C - Emergency Contact List: List of emergency contacts and escalation procedures
4. Schedule D - Vehicle Maintenance Schedule: Required maintenance schedules for different vehicle types
5. Schedule E - Training Requirements: Mandatory training requirements for different roles
6. Appendix 1 - Definitions: Detailed definitions of terms used in the code
7. Appendix 2 - Reference Documents: List of related policies, procedures, and regulatory requirements
8. Appendix 3 - Code of Conduct Declaration: Employee acknowledgment and acceptance form
Find the exact document you need
Code Of Conduct For Independent Contractors
An Australian-compliant Code of Conduct setting professional standards and expectations for Independent Contractors.
Code Of Conduct For Logistics Company
An Australian-compliant Code of Conduct outlining ethical standards and operational requirements for logistics companies, aligned with federal and state regulations.
Client Code Of Conduct
An Australian-compliant framework establishing client conduct standards, responsibilities, and behavioral expectations when engaging with an organization's services and staff.
Code Of Conduct For Contractors
An Australian-compliant document establishing ethical standards and behavioral expectations for contractors, aligned with federal and state legislation.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
