Your data: our responsibility.

TISAX®

One ISMS for the entire WeMatch Group.

We match specialists in the fields of IT, construction, engineering and healthcare. Our 110 employees work independently and in interdisciplinary teams.

The scope of our ISMS (information security management system) covers the entire WeMatch Consulting GmbH, including all branches in Berlin, Hamburg, Düsseldorf and Frankfurt. Our employees also comply with our ISMS when they are mobile or working from home.

The importance of information security is.

We work with information of our business partners (companies and specialists). We process their information according to modern standards with the help of IT. Should our IT systems ever fail, the ISMS is our safety net, ensuring that our business continues without interruption.

As we work with sensitive information from specialists and companies, information security is a top priority. Confidentiality, integrity and availability are at the heart of our efforts to provide secure services.

Safety goal.

Our primary goal is to ensure the confidentiality, integrity and availability of information – with the main focus on the data of our business partners.

Confidentiality

We protect confidential information from unauthorized disclosure.

Availability

Our systems provide services, information or functions at agreed times.

Integrity

Data remains unchanged and intact with us. This is because any manipulation or alteration of information means the loss of its integrity.

Raising awareness for information security

Our employees receive regular training on information security and measures; the effectiveness of the training is reviewed.

Individual contractual customer requirements for IT security

Customer requirements that deviate from our standard contracts are uniformly documented, communicated and continuously checked for correct implementation.

Continuous improvement of our ISMS

The ISMS is continuously developed to increase its effectiveness and optimize processes. To this end, it is fundamentally important to identify, assess and appropriately handle risks.

For this reason, all legal, regulatory and contractual information security requirements are continuously recorded and taken into account.

Our information security measures are regularly reviewed for their effectiveness and adapted to the latest technical developments.

Security organization.

In order to achieve our information security goals, we have appointed an internal information security officer. This person plans, implements and reviews our ISMS and associated security measures together with external professionals.

The ENX Association supports the joint acceptance of information security assessments in the automotive industry with TISAX (Trusted Information Security Assessment Exchange) on behalf of the VDA.

The results can be viewed here:
https://portal.enx.com/en-en/TISAX/tisaxassessmentresults

Security measures.

For all processes, information, IT applications and IT systems, one responsible person is appointed who determines the respective protection requirements.

Access authorizations are assigned as required and managed centrally.

Deputies have been set up for all responsible functions. Training and detailed documentation provide additional security.

The security of buildings and rooms is ensured by access controls. Access to IT systems is regulated by access controls. Data is protected by a restrictive authorization concept.

It is impossible to completely prevent data loss. Regular back-ups ensure that IT operations can continue quickly if parts of the operational database are lost or damaged.

To prevent major damage from occurring in case of emergency, it is important to respond quickly and consistently to security incidents.

This is why there is a separate emergency preparedness concept. This allows critical business processes to be maintained even in the event of a system failure, while the failed systems are safely restored.

Obligations to cooperate.

Our management is committed to supporting the information security objectives set out in our guideline. It also encourages all employees to actively contribute to improving information security.

The guideline applies without restriction to all our employees. Deviations are unacceptable. WeMatch guarantees that all employees have read, understood and documented their agreement with the guideline. Any changes will be communicated immediately.

What are your thoughts?

Are you looking for a company that knows when to go all in and when it’s better to be safe than sorry? We go all-in to make matches, but when it comes to information security, we don’t believe in taking risks. If this is the right approach in your eyes too, we should get to know each other.