Technical and Organizational Security Measures

Information Security Organization

Mitel has an information security organization responsible for planning, implementing, and overseeing all information security measures. The Chief Information Security Officer (CISO) leads this organization, directing and coordinating information security efforts. A team of IT security experts supports the CISO in operational implementation and continuous improvement of security measures.

Security Policies

Mitel is committed to maintaining the highest security standards through policies that safeguard customer data and business operations. These policies align with industry best practices, regulatory requirements, and risk management frameworks, ensuring confidentiality, integrity, and availability. Mitel policies apply to all individuals with access to Mitel information systems and data. Policies are periodically reviewed and amended to protect employee and customer information.

Network and System Security

Network Security is crucial for Mitel's overall security posture, protecting the integrity, confidentiality, and availability of data and resources within Mitel's network.

Workstations Security

Mitel implements endpoint protections on end-user devices and monitors them to ensure adherence to best practice security standards. These include strong authentication, screen saver/lock for idle time, up-to-date antivirus with regular scans, real-time software protection, firewall software, supported operating systems with automated patching, critical software patching, and hard disk encryption. Controls are in place to detect and remediate workstation compliance deviations.

Data Center Cloud Infrastructure Partners

Mitel's data center cloud infrastructure partners adhere to Tier III data center requirements. These facilities feature 24/7 on-site security with access control for authorized personnel. Data centers have redundant power, cooling, and network connectivity. Cloud partners maintain a comprehensive disaster recovery (DR) plan, including backup strategies and procedures for recovering data and applications.

Data Encryption

Access

Physical Access Control and Security

Mitel's access controls ensure that only authorized individuals can access systems processing personal data and the facilities where this processing occurs.

Logical Access Control

The objective of logical access control is to ensure that only authorized individuals can access systems processing personal data, based on a legitimate and authorized need. Access to data terminals (workstations, servers, network components, devices) is managed through authorization and authentication in all systems. Mitel's access control regulations include:

Incident Response

Mitel maintains an incident response plan and follows documented policies, including data breach notification to the Data Controller without undue delay when a breach is known or reasonably suspected to affect Client Personal Data.

Risk Management

Mitel assesses risks related to Personal Data processing, Security, and Business Operations, developing action plans to mitigate identified risks.

Vulnerability Management

The Vulnerability Management process systematically identifies, reviews, addresses, and remediates vulnerabilities within Mitel-managed computing environments. This includes:

Business Continuity

Organizational Measures

Data Protection Officer

Mitel has appointed a Group Data Protection Officer, based in Germany (EU), responsible for monitoring Mitel's personal data processing activities and providing advice on compliance with data protection laws. The Group Data Protection Officer leads a global team of data protection specialists with expertise in data protection law, AI, and digital ethics across various jurisdictions.

Employee Confidentiality Obligation

Mitel employees are obligated to maintain Mitel's business and professional secrets through confidentiality clauses in their employment agreements or specific confidentiality agreements when necessary.

Training and Awareness

All Mitel employees receive mandatory global data protection and security awareness training during onboarding and annually thereafter. Training completion is tracked, and non-compliance may result in disciplinary action. Mitel Data Protection training is reviewed and updated annually to reflect new legislative and jurisprudential developments. Training covers handling, transferring, and storing Personal Data, and responding to security events. The security and awareness training program aims to educate and empower employees to recognize, report, and respond to potential security risks and incidents, fostering a culture of security consciousness.

Contractor and vendor management: Mitel takes commercially reasonable steps to select and retain third-party providers that offer guarantees to implement appropriate technical and organizational measures, ensuring processing meets privacy regulations and protects data subjects' rights.

Data Processing Agreements

Where applicable, Mitel enters into Data Protection Agreements with customers, partners, and sub-processors, clearly defining roles, rights, and obligations for personal data processing.

International Transfers of Personal Data

For transfers of personal data outside the EU, without an adequacy decision from the EU Commission, Mitel may transfer data to a third country or international organization by concluding Standard Contractual Clauses (SCCs). For transfers within the Mitel Group, an Intra-Group Personal Data Transfer Agreement is executed, incorporating the EU Commission 2021 SCCs and UK SCCs.

PDF preview unavailable. Download the PDF instead.

Mitel TOM's (25Jun25) FINAL Adobe PDF Library 25.1.51

Related Documents

Preview Mitel Unify Phone Data Processing Agreement Annexes
This document outlines the annexes to the Data Processing Agreement (DPA) for Mitel Unify Phone, detailing service descriptions, personal data processing activities, security measures, standard contractual clauses, and authorized subprocessors.
Preview Mitel Workflow Studios DPA Annexes: Service Description, Data Processing, Security, and Subprocessors
This document outlines the service description, details of personal data processing activities, technical and organizational security measures, standard contractual clauses (including UK, EU, and Swiss), and authorized subprocessors for Mitel Workflow Studios.
Preview Mitel Secure Cloud DPA Annexes: Service Description and Data Processing
This document outlines the service description, data processing activities, technical and organizational security measures, and standard contractual clauses for Mitel Secure Cloud services, ensuring compliance with data protection laws.
Preview Mitel Cloud Services Acceptable Use Policy
This document outlines the Acceptable Use Policy (AUP) for Mitel Cloud Services, detailing rules and guidelines for customers and users to ensure the integrity and performance of the network and services. It covers prohibited uses such as encumbering resources, unauthorized access, illegal activities, and misuse of data.
Preview Mitel Secure Cloud Data Retention Schedule
This document outlines Mitel's data retention policy for its secure cloud services, detailing the periods for which different types of customer data are stored and how they are deleted.
Preview Mitel MiCollab Security Guidelines Release 10.1: Secure Deployment and Operation
Comprehensive security guidelines for Mitel MiCollab Release 10.1, covering system architecture, OS security, administration, identity, network access, and development practices to ensure secure enterprise collaboration.
Preview Mitel Workflow Studios Customer Data Retention Schedule
This document outlines the data retention policy for Mitel Workflow Studios, detailing how long customer data, configuration data, and logs are stored and where they are located.
Preview Mitel Cloud Services Global Terms of Service
This document outlines the global terms of service for Mitel Cloud Services, covering user responsibilities, data handling, service limitations, and legal provisions for customers and users.