O.C. Tanner logo
Platform

Culture Cloud

Our Culture Cloud® employee recognition platform helps top companies around the world improve workplace culture through meaningful employee experiences.

Explore Now
Smiling older woman presenting a younger man who is laughing with hand on his chest, in front of a flipchart with charts.

Say Thanks

Elevate your people through authentic appreciation from patients, passengers, and the public they serve.
Learn More

Employee Recognition

Empower everyone to celebrate daily wins.

Anniversaries

Make career milestones meaningful and memorable.

Custom Awards

Commemorate key moments with symbolic awards.

Celebrations

Celebrate across your entire organization.

Initiatives

Motivate teams around shared goals and rewards.

Services

Amplify the impact of your recognition solution.

Quick Links

Culture IntelligenceIntegrationsSecurity
Solutions

Solutions

See how our Culture Cloud recognition platform helps global organizations support employees, meet HR goals, and deliver positive workplace outcomes.

Line art of two people collaborating at a desk with a computer and desk lamp, surrounded by floating geometric shapes.

The State of Employee Recognition Report 2025

Dive into the latest research on how your employees feel about recognition in the age of AI.
Read Now

Use Cases

Recognition makes an impact you can measure.

Engagement
Retention
Onboarding
Offline Workers
Company Culture
Team Initiatives

Industries

Tips and inspiration for every industry.

Healthcare
Manufacturing
Transportation
Retail
Finance
Tech

Quick Links

Recognition Buyer's GuideClient Stories
Resources

Resource Library

Data, insights, and best practices to help you elevate your company culture.

All Resources
Illustration of three people conversing near large potted plants with bright orange and pink background.

2026 Global Culture Report

A rigorous look at the evolving shape of work. Read our 2026 Global Culture Report.
Dive In

Webinars

Upcoming and on-demand discussions with culture experts.

Global Culture Reports

Unpacking the latest trends in workplaces around the world.

Client Stories

How the world’s top organizations use Culture Cloud.

Events

Conferences, tours, trade show stops, and more.

Quick Links

State of Recognition Report 2025Why Choose O.C. Tanner
Clients
Company

About Us

At O.C. Tanner, we develop strategic employee recognition and rewards solutions that help people accomplish and appreciate great work.

Learn More
Blurred and pixelated chart or infographic with scattered text labels on a gradient background transitioning from purple to orange.

O.C. Tanner Awards

Analysts agree: We lead the recognition industry.
Learn More

Careers

We’re always looking for bright, bold, collaborative people.

Our Commitment

Our approach to environmental, social, and governance factors.

Press

Recent news and releases from O.C. Tanner.

Institute

Meet our team of researchers and data scientists.

Quick Links

Industry Awards
Demo

O.C. Tanner Security Standards

These Security Standards supplement the agreement in place between Customer and Supplier governing Customer’s use of the Services (“Agreement”). Unless otherwise defined in these Security Standards, capitalized terms used in these Security Standards have the meanings given to them in the Agreement. Supplier has established and maintains the following technical and organizational standards and safeguards to protect Personal Data:

1. Security Program. Supplier maintains a security management program that includes:

  • 1.1. A controls framework based on formal audit standards such as the AICPA SOC 2 Type II report;
  • 1.2. Written information security policies that meet or exceed industry standards;
  • 1.3. Periodic risk assessments of all systems Processing Personal Data;
  • 1.4. Executive review, support, and accountability for all security related policies and practices; and
  • 1.5. Processes to identify and quantify security risk, develop mitigation plans, and track implementation.

2. Employee Screening and Training. Supplier maintains policies and procedures applicable to Supplier employees who have access to Personal Data or provide Services to Customer, including: (i) pre-hire background checks conducted by a third-party provider (subject to applicable law and industry standards); and (ii) regular information security training.‍

3. Encryption. Personal Data is encrypted in transit using TLS 1.2 or greater to protect against unauthorized disclosure or modification. Personal Data is encrypted at rest using industry standard, AES 256 encryption.

4. Vulnerability Scanning. Supplier has established processes in line with industry standards to conduct routine vulnerability scanning to test Supplier’s network, infrastructure, applications, and services. Supplier will apply security patches as soon as commercially practicable.

5. Vulnerability Testing. Supplier conducts routine internal vulnerability testing, including penetration testing conducted by third parties in line with industry standards. Supplier will use commercially reasonable efforts to address identified security vulnerabilities.

6. Network Configuration. Networks used to Process Personal Data use the following configuration standards:

  • 6.1. The internal network that supports Personal Data Processing is configured using RFC 1918 IP addresses.
  • 6.2. A stateful firewall controls access between the Internet and workstations used to Process Personal Data.
  • 6.3. Controls are implemented to protect inbound Internet access from malicious code intrusion (e.g., scanning at email gateways, blocking links, stripping executables).
  • 6.4. Outbound Internet access has controls to prevent leakage and misdirection of Personal Data (e.g., proxy server, content filtering, or other network control).
  • 6.5. The wireless network is secured using the WPA2 standard.
  • 6.6. Supplier implements an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

7. Transmission. Personal Data is transmitted between the parties using cryptographic means (e.g., SFTP, HTTPS) or file sharing services agreed upon by the parties.

8. Storage

  • 8.1. Supplier will ensure that its data hosting providers store or Process Personal Data in facilities that: (i) are secured in an access-controlled location and protected from unauthorized access; and (ii) employ physical security appropriate to classification of Personal Data being stored or Processed; and
  • 8.2. Supplier will ensure that Personal Data is kept logically segregated from other customer’s data.
Download PDF
O.C. Tanner logo

Platform

Culture Cloud

Resources

Global Culture ReportEmployee RecognitionEmployee ExperienceCompany CultureLeadershipRecognition Buyer's Guide

Company

About UsInstituteEventsCareersPressOur CommitmentContact Us
India Legal

Featured Content

What Does Each Generation Want from an Employee Recognition Program?
Recognition and Rewards: Why You Need Both for a Complete Employee Engagement Strategy
O.C. Tanner’s Culture Cloud: What’s New in Q3 2025

Stay in the Know

Subscribe to our communications

Thank you for subscribing.

We acknowledge the Traditional Owners of Country across Australia and pay our respects to their Elders past, present and future. We extend that respect to all Aboriginal and Torres Strait Islander peoples.

Cookie Preferences
Privacy NoticeTerms of UseAI PolicyLoginCustomer SupportO.C. Tanner Jewelers
Modern Slavery Transparency Statement
© 2025 O.C. Tanner