Share via email
Some fields are missing
send eMail

Supplier security

We have defined information security requirements for suppliers who work with Bürkert’s information assets.

 

The objective is to prevent, detect, combat, track and minimise security risks that could affect the confidentiality, integrity and availability (CIA) of Bürkert’s sensitive information. This is also necessary to ensure security of supply for customers’ supply chains and availability.

  • We protect all Bürkert information that is accessible to suppliers through our policy on the classification and handling of information with regard to confidentiality. The policy helps us assess the criticality of information shared with a supplier.
  • The security level of the suppliers must comply with our customers’ requirements and applicable laws. This is part of the agreements and contracts with our suppliers.
  • Our suppliers are obliged to comply with the NDAs agreed with Bürkert.

 

Supplier security & supply chain security

Our supply chain security strategy integrates risk-based assessments and continuous monitoring of all business partners

Lupe Icon Blau

Risk analysis

Systematic evaluation of suppliers according to defined risk criteria

Contractual requirements

Security clauses and compliance obligations in all supplier contracts

Bar chart with four columns increasing in size and an arrow pointing upwards

Continuous monitoring

Regular reviewing and assessment of the security situation

ComplianceCompliance

Compliance, integrity and ethical business practices are part of the Bürkert culture and determine our entrepreneurial actions. Learn more in our Code of Conduct.

 

Further documents: