{"id":218956,"date":"2025-11-12T04:04:08","date_gmt":"2025-11-12T09:04:08","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/compliance-und-verhaltenskodex\/"},"modified":"2025-11-21T08:15:09","modified_gmt":"2025-11-21T13:15:09","slug":"legal-compliance-and-code-of-conduct","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/","title":{"rendered":"Compliance und Verhaltenskodex"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/trust\/\">Zur\u00fcck zum Trust Center<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Compliance und Verhaltenskodex<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad privacy&#8220;][vc_column][vc_column_text css=&#8220;&#8220;]Der Chief Legal Officer von CyberArk \u00fcberwacht das globale Compliance-Programm des Unternehmens, das sowohl von unserer internen Rechtsabteilung als auch von externen Rechtsberatern kontinuierlich unterst\u00fctzt wird. Als weltweit b\u00f6rsennotiertes Unternehmen (NASDAQ: CYBR) deckt unser Compliance-Programm mehrere Risikobereiche ab, darunter die Einhaltung des Sarbanes Oxley (SOX)-Gesetzes. Zu den wichtigsten Compliance-Richtlinien geh\u00f6ren der <a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Code-of-Conduct-2025.pdf\" rel=\"noopener\">Unternehmensethik- und Verhaltenskodex<\/a>, die Richtlinie zur fairen Offenlegung, die Whistleblower-Richtlinie und unsere Antikorruptionsrichtlinie. Weitere Einzelheiten zu diesen Richtlinien finden Sie auf unserer Seite zur Unternehmensf\u00fchrungCorporate Governance. Weitere Informationen zu unserem Engagement f\u00fcr eine gute Unternehmensf\u00fchrung finden Sie auf unserer Seite zu Investor Relations.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zum Trust Center[\/vc_column_text][vc_column_text] Compliance und Verhaltenskodex [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad privacy&#8220;][vc_column][vc_column_text css=&#8220;&#8220;]Der Chief Legal Officer von CyberArk \u00fcberwacht das globale Compliance-Programm des Unternehmens, das sowohl von unserer&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":131028,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-218956","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Compliance und Verhaltenskodex | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance und Verhaltenskodex\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zum Trust Center[\/vc_column_text][vc_column_text] Compliance und Verhaltenskodex [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad privacy&#8220;][vc_column][vc_column_text css=&#8220;&#8220;]Der Chief Legal Officer von CyberArk \u00fcberwacht das globale Compliance-Programm des Unternehmens, das sowohl von unserer...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T13:15:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/\",\"name\":\"Compliance und Verhaltenskodex | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"datePublished\":\"2025-11-12T09:04:08+00:00\",\"dateModified\":\"2025-11-21T13:15:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Center\",\"item\":\"https:\/\/www.cyberark.com\/de\/trust\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance und Verhaltenskodex\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Compliance und Verhaltenskodex | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/","og_locale":"de_DE","og_type":"article","og_title":"Compliance und Verhaltenskodex","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zum Trust Center[\/vc_column_text][vc_column_text] Compliance und Verhaltenskodex [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad privacy&#8220;][vc_column][vc_column_text css=&#8220;&#8220;]Der Chief Legal Officer von CyberArk \u00fcberwacht das globale Compliance-Programm des Unternehmens, das sowohl von unserer...","og_url":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-21T13:15:09+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/","url":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/","name":"Compliance und Verhaltenskodex | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"datePublished":"2025-11-12T09:04:08+00:00","dateModified":"2025-11-21T13:15:09+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/trust\/legal-compliance-and-code-of-conduct\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"Trust Center","item":"https:\/\/www.cyberark.com\/de\/trust\/"},{"@type":"ListItem","position":3,"name":"Compliance und Verhaltenskodex"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/218956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=218956"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/218956\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/131028"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=218956"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=218956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}