Security at RWS
At RWS, we recognize the paramount importance of information security to our valued customers. As a global organization, we have wholeheartedly embraced the ISO 27001 framework to establish a robust structure for our Information Security Management System (ISMS).
Why ISO 27001 Matters
- Widely Accepted and Industry Recognized: The ISO 27001 framework is universally acknowledged and respected. By adopting it, RWS ensures a solid foundation to meet our customers’ stringent security requirements.
- Certification Achievement: Our commitment to excellence has led us to achieve ISO 27001:2013 certification across many of our products, services, and supporting functions. This certification underscores our dedication to safeguarding information. For specifics about our certification scope, please refer to our current ISO 27001 certificate.
Our High-Level Information Security Policies
On this page, we've added some of our high-level information security policies alongside product-specific security documentation. These policies guide our actions and reinforce our commitment to maintaining a secure environment.
Contact Us
Whether you have specific needs, concerns, or questions related to security, we’re here to assist you. Below, you’ll find relevant contact information:
- For account-related requests such as account deletion, please contact global.supply@rws.com.
- For technical support issues, please follow the guidance at the following link: RWS Technical support
- If you have discovered a security vulnerability and would like to ethically disclose this, please report it to us via security.reporting@rws.com. Please note that RWS does not currently have a bug bounty program.
- For personal data subject requests in accordance with the RWS Privacy Notice, please contact us at privacy@rws.com.
If you are an RWS employee and require operational support such as with sign-in issues, please use the IT service desk.
FAQs
Please describe your initial selection and risk assessment process for suppliers/ vendors.
Does RWS have a Supplier management program for security?
Describe how you identify and manage the information security vulnerabilities in your IT systems, including change management processes.
Describe how you secure applications through the system development lifecycle including how you develop and test changes to applications.
Do you use a tool to track incidents, changes and problems?
Does RWS have an Acceptable Use Policy?
What is the retention policy for customer data?
Is there an Asset Management process?
Is there a Patch Management process?
Is there a Change Management process?
Has RWS implemented a formalized approval process for logical access requests based on the principles of least privilege?
Is there a risk assessment program that has been approved by management, communicated to relevant employees and an owner appointed to maintain the program?
Describe the key elements of the RWS security risk management program
Does RWS consider Data Privacy?
Does RWS have ISO 27001 certification?
Does RWS have SOC 2 type II attestation
Is an established, published, and annually approved security program in place?
Does RWS have a dedicated information security owner and/or team responsible for information security?
Is there an information security policy which has been approved by management, communicated to all personnell?
Please list your information security policies. Are such policies reviewed and updated regularly, and accessible to all RWS personnel?
Our policies are reviewed at least annually. Internal documents may be viewed on site or remotely viewed by the client during an audit under NDA / MNDA.
RWS Group ISMS Information Security Policy
RWS Group Information Security Policy
RWS Group Security Risk Management Policy (Internal)
RWS Group Security Testing Policy (Internal)
RWS Group Logical Access Policy (Internal)
RWS Group Business Continuity Policy (Internal)
RWS Group Global Classification & Handling Policy (Internal)
RWS Group Information Security Incident Management Policy (Internal)
RWS Group Physical Security Policy (Internal)
RWS Group Privacy Policy (Internal)
RWS Group IT System Policy (Internal)
RWS Group Cryptographic Controls Policy (Internal)
RWS Group Supplier Security Management Policy (Internal)
RWS Group Secure Software Development Policy (Internal)
RWS Group ISMS Acceptable Use Policy (Internal)
RWS Group ISMS Security Exceptions Policy (Internal)
Our policies are published on the corporate Intranet and available to all RWS employees, policies are regularly communicated to RWS employees via mandatory security & privacy awareness and training.