Privacy and Security at Unisys
Upholding the highest standards of privacy, proven through our privacy and security practices
Protecting client information is a top priority at Unisys. We have the deep expertise, dedicated resources and proven technology for robust protection of personal information. We work with our clients to identify and design privacy and security practices that meet their operational needs.
Dedicated to protecting critical data from threats such as theft, fraud, misuse and disaster, Unisys employs rigorous measures to protect personal information while in use and at rest, the media where it is stored, the systems that process it and the methods by which it is transmitted. This protection works to ensure the integrity, availability and confidentiality of information and information systems.
At the heart of every solution we design and every system we deploy is an understanding that our clients need their information, including personal data, to be protected and properly used. Our team of experienced privacy and information security technologists develop and enforce strategies that continually meet the needs of our clients around the globe. Our commitment to upholding the highest standards of privacy is proven through our privacy and security practices.
We ensure your privacy through the following components:
Unisys Privacy Principles
We process personal data for the purpose(s) for which it was provided to us. We use technical and organizational security measures to limit accessing and processing of personal data to Unisys associates, contractors, vendors and others who require access for the performance of their obligations to Unisys and in accordance with the purpose for which the data was collected.
We only disclose personal data to third parties (including our contractors, vendors, partners, customers and others) who agree to comply with applicable data protection and privacy laws and agree to implement and maintain appropriate technical and organizational security measures to safeguard the personal data. We will also disclose personal data when required by law or for a valid business purpose, for example, due diligence to comply with regulatory obligations or when necessary for a transfer of business operations pursuant to a merger or acquisition.
Personal Data Protection
We comply with applicable laws when transferring personal data within Unisys or to third parties by utilizing a combination of standard contractual clauses, data protection agreements and consent. Appropriate technical and organizational security measures are used to protect the personal data.
Things every person, place, and thing should do
Patching your phones and computers is the cheapest and easiest way to avoid becoming victim number two, and beyond!
Malware will eventually get into any network -- so ensure that it gets stuck in a little segment and doesn’t take down your entire enterprise!
Plugging into threat intelligence feeds from the government and commercial feeds will avoid many known threats!
Your insiders will carry out hostile actions on your network, whether knowingly or unknowingly, so it’s incumbent on you to keep an eye inside!
Shortages in cyber talent shouldn’t stop you from doing the right things, if you automate as much of your detection-through-response operations as possible!
Knowing what to do after an attack needs to be planned, trained, and practiced before the attack. It saves time, money, reputation, and maybe your job!
Working with government organizations like federal law enforcement is a great way to lower your risks, but remember to start the conversations before an attack!
Cybersecurity is no longer just an IT issue; it’s a business issue, and must be considered at the highest levels of your organization!
Your reputation is not just based on how you protect yourself, but your entire supply chain of suppliers and partners are now partly your risk and responsibility!
Unisys’ Peter Altabef Discusses Security and Trust on BBC World News' "Talking Business"
Unisys Chair and CEO Peter Altabef was interviewed by Aaron Heslehurst on BBC World’s Talking Business. They discussed the secure rollout of 5G, the findings of the report from the Cybersecurity Moonshot subcommittee of NSTAC, cyberattacks and national security, and our trust in technology for economic growth.
Creating a complex password
Watch this helpful quick guide video to learn how you can create a private passphrase and create a password key - and how you can apply a password key to your private passphrase.