Huawei 2015 Annual Report Download - page 45

Download and view the complete annual report

Please find page 45 of the 2015 Huawei annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145

43
Cyber Security
The new generation of network and information
technologies (e.g., Big Data, cloud computing, IoT, and
the mobile Internet) are driving the convergence of
cyberspace and the physical world. Cyber security is a
growing global challenge, and is exerting a profound
and far-reaching impact on the ICT industry. Huawei's
commitment to cyber and service security will never
be outweighed by its own commercial interests.
Establishing and implementing an end-to-end global
cyber security assurance system is one of our core
development strategies.
We attach equal importance to user privacy protection
and cyber security. We have made every effort to
facilitate user privacy protection in accordance with
local, regional, and international laws and regulations,
accepting that these are in a state of change. We
have established a Global Cyber Security and User
Privacy Protection Committee as the company's highest
organization for managing cyber security and user
privacy protection. We have also appointed a Global
Cyber Security & Privacy Officer, who reports directly to
the CEO. All Huawei's relevant business units have set
up cyber security and user privacy protection offices.
Privacy protection activities have been implemented at
Huawei as part of day-to-day compliance and business
operations. Protecting end users' privacy and freedom
of communication has been included in Huawei's
Employee Business Conduct Guidelines (BCGs), and all
Huawei employees around the world are required to
learn, sign, and comply with the BCGs.
We continue to communicate and partner with
governments, customers, and industry partners on
security through various channels with an open,
transparent, and collaborative approach, and have
improved Huawei's influence and reputation in security.
Our efforts have been widely recognized:
In April 2015, Huawei received the Transparency
Award for cyber security from the governments of
four cities in Lower Saxony, Germany. This is the
first cyber security award received by Huawei from
governments in Europe.
Telefónica presented the PSDA stamp to several Huawei
products.
In May 2015, Huawei was presented with the
10-Year Excellence in Information Security Testing
Award by ICSA Labs, demonstrating that Huawei's
product security capabilities have been recognized
in the industry.
In November 2015, Telefónica awarded the Protocol
of Security Development Assurance (PSDA) stamp
to Huawei for several of our products at the second
Huawei MBB Cyber Security Mindshare Forum held
in Hong Kong. The PSDA is a successful cooperation
initiative between Telefónica and Huawei, aimed at
jointly building a global cyber security assurance
system, openly and transparently.
We have played an active role in the development of
security standards in the CT domain, such as 3GPP SA3,
ETSI NFV, and Common Criteria (CC) cPPs. We have also
made breakthroughs in critical security technologies,
such as trusted computing, encryption algorithms,
and authentication algorithms, and translated these
technologies into security capabilities for our products.
In addition, we are willing to share our understanding
of and experience in cyber security with other industry
players, and have cooperated with and learned from
them while making contributions to the industry:
Between 2012 and 2014, we published three cyber
security white papers to explain our understanding of
cyber security issues and demonstrate that our cyber
security position and perspective are characterized
by openness, transparency, and visibility. These