TDK Electronics · TDK Europe

Supplier Security Principles

Cybersecurity is a top priority for TDK.

We implement comprehensive measures to ensure and continuously improve an appropriate level of protection for confidential information and data. 

To ensure the availability, confidentiality, and integrity of TDK processes and information, and to comply with legal obligations, TDK places great importance on maintaining an appropriate level of security among its suppliers.

In addition, we align with our customers’ expectations, which increasingly demand a high level of information security throughout the entire supply chain. This means that our partners must comply not only with legal requirements but also with industry-specific standards such as ISO27001 or TISAX. A robust security level is essential to minimize risks, build trust, and maintain competitiveness in an increasingly digitalized environment.

Qualität

“The security of our supply chain is a key component of our cybersecurity strategy. In a connected world, it is not enough to protect only our own organization – we must ensure that all partners meet the same high standards. TISAX and comparable industry standards are essential for us to build trust, minimize risks, and strengthen the resilience of our entire value chain.”

 Thomas Zeulner, 
CISO, TDK Electronics AG



Cybersecurity Requirements

To ensure the availability, confidentiality, and integrity of TDK processes and information, as well as to comply with legal obligations, TDK places great importance on maintaining an appropriate level of security among its suppliers.

The requirements outlined here apply to all suppliers and supplied items and are intended to guarantee a fundamental minimum level of cybersecurity.

In cases where TDK faces an increased risk, individual cybersecurity requirements may be defined and agreed upon, extending or specifying the minimum requirements described in this document.

Requirements for All Suppliers

1. General Provisions

(a) When engaging external personnel or subcontractors, the supplier must ensure that all obligations outlined in this document are equally observed by these external parties.
(b) If compliance with the cybersecurity requirements requires support or contributions from TDK, the supplier is obligated to explicitly and in writing specify these requirements.
(c) Other contractual agreements between TDK and the supplier remain unaffected by these provisions.

2. General Cybersecurity Requirements for Suppliers

Technical Requirements

  • Use up-to-date hardware and software, ensuring regular updates and patches.
  • Implement recognized, industry-standard security solutions such as firewalls and antivirus software to prevent malware attacks.
  • Utilize secure connections for file transfers, with transport encryption of at least TLS 1.2.

Organizational Requirements

  • Apply a role-based access control concept to ensure that provided information is accessible only to authorized personnel.
  • Report any identified security vulnerabilities to TDK without delay.
  • Use strong, secure passwords to protect internal IT systems.
  • Operate an access control system for physical premises.
  • Implement additional security measures as required by TDK.
  • The contracting partner shall grant access at any time to all information collected and stored under the contract.
  • The contracting partner undertakes to conduct regular information security awareness training in the relevant work areas.

 

3. Collaboration Rules with TDK Regarding Cybersecurity

(a) Incident Notification
The supplier is required to inform TDK without undue delay if a cybersecurity incident becomes known that has enabled or could enable unauthorized access to TDK information, or that has had or could have a negative impact on the supplier’s ability to deliver agreed products or services (hereinafter referred to as “Cybersecurity Incident”).

(b) Actions in Case of Incidents
For incidents involving TDK information, the supplier will:

  • Take appropriate and reasonable measures without delay to minimize potential damage to TDK
  • Document all actions taken during the incident in a traceable manner and provide this documentation to TDK upon request
  • Coordinate any public disclosure of information regarding the incident with TDK
  • Immediately notify TDK of any inquiries from authorities regarding disclosure or transmission of information and agree on further steps with TDK
  • Conduct a thorough root cause analysis, define and implement preventive measures to avoid similar cases, and keep TDK informed about the action plan and its progress until full implementation

(c) Requests from Authorities
If the supplier is requested by authorities to disclose TDK information without TDK’s consent, the supplier will exhaust all legal options to prevent disclosure and inform TDK immediately, provided this is legally permissible.

(d) Access to TDK Systems and On-Site Activities
If the supplier works with TDK systems or performs activities on TDK premises, the supplier commits to requesting and complying with the applicable TDK cybersecurity policies.

(e) Return of Assets and Information
Upon TDK’s request, and no later than upon termination of the supply relationship, the supplier must promptly return all assets provided by TDK for the fulfilment of the agreement. If the supplier still has access to TDK systems related to service delivery, such access must be terminated immediately, and TDK must be informed. Furthermore, the supplier is obligated to return all developed information, software, and agreed documentation upon request or at the latest upon termination of the supply relationship.

Report an Incident

The supplier is required to inform TDK without undue delay if a cybersecurity incident becomes known that has enabled or could enable unauthorized access to TDK information, or that has had or could have a negative impact on the supplier’s ability to deliver agreed products or services (hereinafter referred to as “Cybersecurity Incident”).

Please contact us: TEG-Cybersecurity-supplier@tdk.com or telephone.: +49 89 54020-0

Please provide the following details regarding the incident:

  • Brief description of the incident: Summarize what happened in a few sentences (e.g., type of issue, how it was detected, and its impact).
  • Countries affected: Indicate which geographic regions or countries are impacted by the incident.
  • Nature of the incident: Specify whether this is a data breach (unauthorized access or disclosure of data) or a cyberattack (malicious activity targeting systems, networks, or services).
  • Detailed contact information: Include the name, position, phone number, and email address of the responsible contact person for further communication.