O.C. Tanner logo
Platform

Culture Cloud

The Culture Cloud® employee recognition platform helps top companies around the world improve workplace culture through meaningful employee experiences.

Employee Recognition

Empower everyone to celebrate daily wins and form strong workplace connections with intuitive, fun-to-use tools.

Anniversaries

Make work anniversaries more meaningful and memorable with personalized Yearbooks and other years-of-service recognition awards.

Celebrations

Turn every corporate event into a chance to create something special that brings people together. Celebrate, connect, and have fun doing it.

Initiatives

Support collaboration and foster growth by motivating teams around shared goals tied to clear timelines and clear rewards.

Custom Awards

Commemorate key moments with symbolic awards that inspire achievement, communicate values, and offer lasting reminders of peak experiences.

Services

From consulting to branding and communications, our expert services are designed to help you amplify the impact of your recognition solution and elevate your culture.

Quick Links

Culture Intelligence
Integrations
Security
Solutions

Use Cases

Learn how employee recognition with Culture Cloud delivers positive workplace outcomes.

Engagement
Retention
Onboarding
Offline Workers

Industries

See how the Culture Cloud recognition platform helps organizations across industries support employees and meet HR goals.

Healthcare
Manufacturing
Transportation
Retail
Finance
Tech

Quick Links

Recognition Buyer's Guide
Client Stories
Global Culture Report
How the O.C. Tanner Partnership Model Transforms Workplace Culture
Resources

All Resources

Dig into a rich library of articles and white papers on everything from modern leadership to creative onboarding ideas.

Webinars

Our archive of webinar recordings features culture experts discussing a wide range of top-of-mind topics.

Global Culture Reports

Our latest organizational culture research looks at current culture trends, company culture statistics, and how employees feel about their workplaces.

Events

In addition to client conferences, culture tours, and trade show stops, we offer a variety of workshops, trainings, and free webinars throughout the year.

Client Stories

See how many of the world’s top organizations use O.C. Tanner’s Culture Cloud to create thriving workplace cultures.

Quick Links

Why Choose O.C. Tanner
Influence Greatness 2025
Employee Recognition Guide
Clients
Company

About Us

O.C. Tanner develops strategic employee recognition and reward solutions that help people accomplish and appreciate great work.

Institute

Through industry research, education, and impact measurement, our team of experts empowers companies to embrace the power of intentional workplace culture.

Careers

O.C. Tanner is always looking for people who are bright, bold, collaborative, and interested in growing a global company.

Press

Read recent news stories and press releases about O.C. Tanner and how we contribute to building company culture.

Our Commitment

Learn about the O.C. Tanner approach to environmental, social, and governance factors.

Quick Links

Industry Awards
Demo

O.C. Tanner Security Standards

These Security Standards supplement the agreement in place between Customer and Supplier governing Customer’s use of the Services (“Agreement”). Unless otherwise defined in these Security Standards, capitalized terms used in these Security Standards have the meanings given to them in the Agreement. Supplier has established and maintains the following technical and organizational standards and safeguards to protect Personal Data:

1. Security Program. Supplier maintains a security management program that includes:

  • 1.1. A controls framework based on formal audit standards such as the AICPA SOC 2 Type II report;
  • 1.2. Written information security policies that meet or exceed industry standards;
  • 1.3. Periodic risk assessments of all systems Processing Personal Data;
  • 1.4. Executive review, support, and accountability for all security related policies and practices; and
  • 1.5. Processes to identify and quantify security risk, develop mitigation plans, and track implementation.

2. Employee Screening and Training. Supplier maintains policies and procedures applicable to Supplier employees who have access to Personal Data or provide Services to Customer, including: (i) pre-hire background checks conducted by a third-party provider (subject to applicable law and industry standards); and (ii) regular information security training.‍

3. Encryption. Personal Data is encrypted in transit using TLS 1.2 or greater to protect against unauthorized disclosure or modification. Personal Data is encrypted at rest using industry standard, AES 256 encryption.

4. Vulnerability Scanning. Supplier has established processes in line with industry standards to conduct routine vulnerability scanning to test Supplier’s network, infrastructure, applications, and services. Supplier will apply security patches as soon as commercially practicable.

5. Vulnerability Testing. Supplier conducts routine internal vulnerability testing, including penetration testing conducted by third parties in line with industry standards. Supplier will use commercially reasonable efforts to address identified security vulnerabilities.

6. Network Configuration. Networks used to Process Personal Data use the following configuration standards:

  • 6.1. The internal network that supports Personal Data Processing is configured using RFC 1918 IP addresses.
  • 6.2. A stateful firewall controls access between the Internet and workstations used to Process Personal Data.
  • 6.3. Controls are implemented to protect inbound Internet access from malicious code intrusion (e.g., scanning at email gateways, blocking links, stripping executables).
  • 6.4. Outbound Internet access has controls to prevent leakage and misdirection of Personal Data (e.g., proxy server, content filtering, or other network control).
  • 6.5. The wireless network is secured using the WPA2 standard.
  • 6.6. Supplier implements an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

7. Transmission. Personal Data is transmitted between the parties using cryptographic means (e.g., SFTP, HTTPS) or file sharing services agreed upon by the parties.

8. Storage

  • 8.1. Supplier will ensure that its data hosting providers store or Process Personal Data in facilities that: (i) are secured in an access-controlled location and protected from unauthorized access; and (ii) employ physical security appropriate to classification of Personal Data being stored or Processed; and
  • 8.2. Supplier will ensure that Personal Data is kept logically segregated from other customer’s data.
Download PDF
O.C. Tanner logo

Platform

Culture Cloud

Resources

Global Culture ReportEmployee RecognitionEmployee ExperienceCompany CultureLeadershipRecognition Buyer's Guide

Company

About UsInstituteEventsCareersPressOur CommitmentContact Us
India Legal

Featured Content

3 Ways Employee Recognition Builds Resilience and Supports Mental Health
8 Traps to Watch Out for When Choosing an Employee Recognition Provider
Selecting the Right Employee Recognition Partner

Stay in the Know

Subscribe to our communications

Thank you for subscribing.

We acknowledge the Traditional Owners of Country across Australia and pay our respects to their Elders past, present and future. We extend that respect to all Aboriginal and Torres Strait Islander peoples.

Cookie Preferences
Privacy NoticeTerms of UseAI PolicyLoginCustomer SupportO.C. Tanner Jewelers
Modern Slavery Transparency Statement
© 2025 O.C. Tanner