Governance

Information security and data privacy

The journey so far
Human rights in our supply chain
Training
Health and safety
Speaking up
Looking ahead

Data privacy: people and processes

We address our data privacy obligations through a programme involving people, process, and technology. The group’s Compliance Officer ensures we maintain compliance with applicable data privacy laws. We also have a dedicated team of information security professionals who ensure appropriate measures are in place to safeguard data in the group’s possession.

Information security oversight

We address our data privacy obligations through a programme involving people, process, and technology. The group’s Compliance Officer ensures we maintain compliance with applicable data privacy laws. We also have a dedicated team of information security professionals who ensure appropriate measures are in place to safeguard data in the group’s possession.

Physical security

We control, monitor and restrict access to physical areas where we process end-user data. Additionally, all data centres we use adhere to ISO 27001 standards.

Physical security

We deploy next-generation firewall technology, as well as an intrusion detection and prevention system to generate and respond to alerts that could indicate compromise of our network.

We apply security-by-design principles through the software development lifecycle, track vulnerabilities, and run internal and external network scans continuously. We also retain a qualified third-party to conduct penetration testing on an annual basis.

Subcontractors

We conduct appropriate due diligence prior to engaging IT contractors (i.e., third-party agencies and external developers) to assess their security capabilities. As part of the process, confirmation of adherence to our key information security policies and standards is required. We also engage external agencies to conduct background checks on external personnel.

Risk management

We conduct annual information security risk assessments in compliance with the ISO 27001 framework. Our risk management programme consists of third-party assessments and monitoring, alignment with industry standards, identifying data security risks as well as identifying, tracking and remediating risks.

Business continuity and disaster recovery

Westcon implements and maintains an IT business continuity management program that addresses the needs of the business including business impact analysis and disaster recovery planning. Plans are reviewed annually to ensure they continue to meet the needs of the business.

Ransomware

Our comprehensive ransomware attack strategy is designed to identify, contain, analyse, remedy, and recover. We use CyberVault for fully encrypted, near real-time backups of mission-critical data.

© 2023 Westcon-Comstor

Back to Governance