At Marvell, a model of sound governance starts with our leadership and reverberates throughout our company. We are active, intentional and rigorous in upholding the highest ethical standards in everything we do.  

We are built on a foundation of strong governance and commitment to operate with rigorous ethical standards in our business and among our suppliers, customers and other stakeholders. We believe that it is important to foster a culture of integrity, transparency and respect wherever we operate, including our responsibility for data protection and privacy.


Ethics & Compliance


To thrive, a business must have a foundation of transparency and a strong moral code. We are proud that we have built such a company. As a guide, our Code of Business Conduct and Ethics contains requirements and expectations on a wide range of business practices, workplace policies and conduct by our employees. 

The Code applies to all Marvell employees, officers, vendors and Board of Directors. Annually, employees certify that they have read, understood and agreed to abide by the Code. Every other year, employees complete training on the Code. New employees are also trained on the Code as part of the new employee orientation experience. 

Privacy & Security


We prioritize the security and data privacy to protect our customers, our employees and our company. Marvell uses digital systems to operate our business, and we have strong data security and privacy practices to safeguard these systems. Our cybersecurity program is built to international standards, process data in accordance with applicable privacy regulations, and we comply with contractual obligations with business partners, including those regarding confidentiality and non-disclosure. Additionally, through our products, Marvell also plays a key role in enhancing security in data infrastructure by empowering our global customers to protect their own systems, thereby creating a safer digital world.   

We also have processes in place to protect Marvell’s digital systems that hold proprietary information. These security controls include firewalls with threat protection, endpoint detection and response capabilities, data loss prevention for identifying IP, threat and vulnerability management with continuous scanning, secure email with real-time threat monitoring and filtering, cloud access controls, and a 24/7 security operations center.