IPR and Trade Secret Protection
Sustained innovation has been the foundation of our survival and development over the past 30 years. Huawei believes that respecting and protecting IP is the foundation of innovation. As an innovative company, we respect, apply, and contribute to IP rules. Huawei protects the IP and trade secrets of its own, and is committed to respecting others'. We forbid our employees from inappropriately accessing, disclosing, using, or disposing of third-party trade secrets.
Huawei has set the role of trade secret protection compliance RCO to enable the company's trade secret compliance system building, develop relevant policies, systems, and processes, and assist and guide business departments in trade secret compliance. As the trade secret protection compliance RCO, the Corporate Information Security and Trade Secret Protection Department is responsible for ensuring trade secret protection across the organizational climate, processes, and accountability mechanism, and implementing trade secret compliance requirements through business domains and regional compliance organizations.
Huawei takes the following key measures to protect third-party trade secrets:
- Issuing the Regulations on Respecting and Protecting Third-party Trade Secrets to clearly define its requirements for respecting and protecting third-party trade secrets in business activities, and to ensure that employees carry out business activities in compliance with applicable laws and agreements.
- Incorporating trade secret protection requirements into business processes, including R&D, sales, procurement, and HR. Regularly reviewing key business processes and making ongoing management improvements by learning lessons from everyday operations.
- Organizing publicity activities, training, and exams concerning trade secret protection so that all employees are fully aware of their obligations and responsibilities.
- Overseeing the protection of third-party trade secrets through checks, audits, etc. and ensuring that relevant policies, systems, and processes are effectively implemented.
Establishing an accountability mechanism and issuing the Accountability Protocol for Infringements of Third-Party Trade Secrets, Criteria for Information Security Violation Levels and Disciplinary Action, and other relevant documents. Taking disciplinary action against misconduct.