<sub id="jp7z5"></sub>

          <address id="jp7z5"></address>

          <address id="jp7z5"></address>
            <thead id="jp7z5"></thead>

            <address id="jp7z5"></address>
              <address id="jp7z5"></address><address id="jp7z5"></address>

              EN
              INTELLECTUAL

              INTELLECTUAL

              Home / EHS / INTELLECTUAL

               

              Intellectual property policy

              Boten has always been committed to strengthening the construction of intellectual property management system and strictly protecting the intellectual property rights of customers, partners and itself. 

               

              Intellectual property strategy

              •  Boten will continue to improve its intellectual property protection capabilities, including personnel management, it management, document management and policy process management, so as to create a good intellectual property protection atmosphere

              •  Boten promises to keep all project information confidential, including all information provided by both parties in cooperation with customers or newly generated based on the project, and will not provide the above information to a third party or use it for purposes other than the agreement without the permission of customers

              •  For the invention and creation derived from the customer's technical information, boten promises that it will not apply for a patent separately without the customer's permission. Customer technical information includes technical documents, e-mail materials, meeting exchanges and other information formally or informally provided by customers

              •  Boten promises zero tolerance for intellectual property infringement

               

              IPManagement organization

               

              Boten has set up a full-time intellectual property management department

               

              Physical security

              It is divided into zones according to the confidentiality level, protected by access control management and perimeter security system, and monitored by omni-directional dead angle cameras

               

              Human resource security

              The company strictly implements the management norms for entry and exit. New employees are required to conduct intellectual property background investigation and their own intellectual property declaration when they enter into employment. They will also sign confidentiality agreement and non competition agreement when signing labor contract; Whether the non competition agreement is implemented will be evaluated at the time of resignation. The on-the-job stage needs to be implemented in strict accordance with the signed confidentiality agreement

               

              Asset security

              Clarify the protection level, responsible person, use management and scrap disposal of assets in information security to ensure the security of assets and related information

               

              Information security in project management

              In the whole process of project management, from customer inquiry to project approval and R & D, from R & D to commercial production, and then to transportation and shipment, information sharing and transmission adopt scientific management to ensure the safety of information to the greatest extent

               

              Third party security

              Through the management of suppliers, outsourcing units, contractors and agents, intellectual property background investigation, confidentiality agreement signing, intellectual property audit and other aspects, so as to reduce the risk of infringement and information disclosure

               

              ITSystem security

              Ensure the security of IT system from the development and maintenance of IT system and software, communication, mobile equipment and remote office

               

              Business Continuity Management

              By formulating continuity rules, improving and upgrading the management mechanism, ensure that all management requirements of intellectual property rights are consistent with the company's strategy and can continuously meet the needs of business development

               

              Information security processing and review

              An internal and external review mechanism for information security has been established to solve information security problems with scientific and effective methods

              快三规律