Huawei 2014 Annual Report Download - page 51

Download and view the complete annual report

Please find page 51 of the 2014 Huawei annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 148

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

49Management Discussion and Analysis
We have improved the compliance levels and
delivery quality of our cyber security activities in
the service delivery (SD) process, and re-evaluated
and enhanced our managed services and GNOCs.
We have also validated all tools in use and improved
customer data management to ensure security in all
delivery activities.
We closely coupled our vulnerability management
process with our core R&D process to ensure prompt
and effective responses to security vulnerabilities.
We have connected our PSIRT to the CERTs of
multiple major customers, and established regular
communication and emergency response channels
to boost mutual trust regarding security.
Our internal audit teams have provided additional
security assurances by auditing all business areas
to ensure that corporate cyber security policies,
processes, and standards are implemented and
suited to Huawei's cyber security practices.
The world in which we live is seeing unprecedented
ICT coverage that will one day fully connect the whole
planet. In addition to demanding secure and reliable
networks, customers also need secure storage for
all types of data on all network equipment. User
privacy protection is an increasing concern of the public,
governments, and customers. The Global Cyber Security
Committee, chaired by Huawei's Deputy Chairman Ken
Hu, has increased its focus on user data privacy and
protection. This will help ensure Huawei's approach
stands up to the most rigorous scrutiny in this complex
world. We must make a solemn commitment to the
public, governments, and customers to protect user
privacy, just as we have done on cyber security. We
will honor this commitment as a responsible corporate
citizen, and continue to use every means possible to
protect user privacy in compliance with applicable laws
and regulations.
Technology is fundamentally changing our lives for
the better, making the world a much smaller place. In
the future Better Connected World, we will position
cyber security and user privacy assurance as a core
corporate strategy, making cyber security part of
our corporate DNA. We will continue to advocate,
develop, and implement unified, international cyber
security standards to strengthen cyber security and
user privacy protection for everyone. At Huawei, we
believe international collaboration will be instrumental
to ensuring cyber security in the future. Together, we
can improve the quality of security considerations in
products and services, and from this we can collectively
do more to enrich life through ICT.
Critical Accounting Estimates
The consolidated financial statements, on which this
Management Discussion and Analysis was based, have
been prepared in compliance with International Financial
Reporting Standards (IFRSs). For details, see note 1(a) to
the consolidated financial statements summary.
The application of IFRSs requires the company to make
judgments, estimates and assumptions that will directly
affect the company's reporting of its financial position
and operating results. The accounting estimates and
assumptions discussed in this section are those that the
management considers to be the most critical to the
company's consolidated financial statements.