VTech Holdings Limited
6
VTECH APPROACH
Privacy and Information
Security
In order to gain trust from our
stakeholders, the security of their
personal information is important to us.
VTech acknowledges the importance
in handling the personal information
carefully. We have policies in place to
monitor how the personal information of
our stakeholders is collected, used and
managed. The personal information is
usually collected from our online shop;
authorised dealer or agents; and media
channels for enquiries and complaints
whenever necessary to provide services
to the stakeholders.
VTech understands stakeholders
use their personal information for
different purpose while surfing the
internet. Therefore, it is important
for us to handle this information with
care. To protect this information from
any unauthorised access, accidental
loss and destruction, VTech adopts
appropriate security measures in the
transfer and storage of the personal
data and only processes corresponding
information when necessary.
In November 2015, we experienced
a cyber-attack in which an intruder
gained unauthorised access to some of
our databases and servers, and stole
certain personal data of our customers
around the world. In order to ensure
that our customer data would be safe
from further attack, we have taken
immediate actions to suspend all the
affected websites and services, inform
the affected customers and report the
incidents to a number of governmental
authorities. With the assistance of
one of the world’s leading cyber
security firms, we have also further
strengthened our data protection and
network security measures.
Protection of Intellectual
Property Right
VTech is devoted to protecting its
own intellectual property rights, whilst
respecting the intellectual property
rights of others as well. VTech has
proper policy and protocol in place
to protect its intellectual property
rights including, but not limited to
its patents, designs, technologies,
trademarks, trade secrets, copyrights,
computer programmes, inventions,
product information, video and sound
recordings. Without our permission,
third party cannot own or display any
related intellectual properties. The
Company will take legal actions and
seek for judgment for any violations of
its intellectual property rights or misuse
of its intellectual properties.