Intellectual property policy
Boten has always been committed to strengthening the construction of intellectual property management system and strictly protecting the intellectual property rights of customers, partners and itself.
Intellectual property strategy
Boten will continue to improve its intellectual property protection capabilities, including personnel management, it management, document management and policy process management, so as to create a good intellectual property protection atmosphere
Boten promises to keep all project information confidential, including all information provided by both parties in cooperation with customers or newly generated based on the project, and will not provide the above information to a third party or use it for purposes other than the agreement without the permission of customers
For the invention and creation derived from the customer's technical information, boten promises that it will not apply for a patent separately without the customer's permission. Customer technical information includes technical documents, e-mail materials, meeting exchanges and other information formally or informally provided by customers
Boten promises zero tolerance for intellectual property infringement
IPManagement organization
Boten has set up a full-time intellectual property management department
Physical security
It is divided into zones according to the confidentiality level, protected by access control management and perimeter security system, and monitored by omni-directional dead angle cameras
Human resource security
The company strictly implements the management norms for entry and exit. New employees are required to conduct intellectual property background investigation and their own intellectual property declaration when they enter into employment. They will also sign confidentiality agreement and non competition agreement when signing labor contract; Whether the non competition agreement is implemented will be evaluated at the time of resignation. The on-the-job stage needs to be implemented in strict accordance with the signed confidentiality agreement
Asset security
Clarify the protection level, responsible person, use management and scrap disposal of assets in information security to ensure the security of assets and related information
Information security in project management
In the whole process of project management, from customer inquiry to project approval and R & D, from R & D to commercial production, and then to transportation and shipment, information sharing and transmission adopt scientific management to ensure the safety of information to the greatest extent
Third party security
Through the management of suppliers, outsourcing units, contractors and agents, intellectual property background investigation, confidentiality agreement signing, intellectual property audit and other aspects, so as to reduce the risk of infringement and information disclosure
ITSystem security
Ensure the security of IT system from the development and maintenance of IT system and software, communication, mobile equipment and remote office
Business Continuity Management
By formulating continuity rules, improving and upgrading the management mechanism, ensure that all management requirements of intellectual property rights are consistent with the company's strategy and can continuously meet the needs of business development
Information security processing and review
An internal and external review mechanism for information security has been established to solve information security problems with scientific and effective methods