Texas Instruments

2012 Corporate Citizenship Report

Like us on FacebookFollow us on TwitterE-mail

Incident management

Emergency response | Crisis communications | Asset protection

TI's incident command (IC) process is modeled after the U.S. National Incident Management System. We have evolved our IC process over the last 20 years to meet the challenges of our rapidly changing global environment.

Our IC process is designed to minimize the impact of events that threaten our operations. Through detailed risk assessments, we classify risks based on their severity. This enables our 24/7 security communication center to prepare for, and when necessary, quickly deploy resources to ensure the safety of people and the environment, and to reduce operational downtime.

Emergency response

We activate our emergency response system depending on the nature and severity of an incident. Our Emergency Response team quickly identifies appropriate resources, services and infrastructure required to mitigate potential loss. Each site has emergency response liaisons trained to coordinate efforts locally. They also collaborate with corporate response teams when issues escalate to deploy the best response strategies.

Crisis communications

TI has a comprehensive crisis communication plan in place, which includes procedures and guidelines for how and when employees and managers communicate should an issue arise. We use this plan in conjunction with business-continuity plans to manage unexpected events. To prepare for unforeseen events, we conduct drills, tabletop exercises and site-level exercises to ensure preparedness. We also conduct regular training.

Asset protection

Here are some additional measures TI takes to protect its assets.

We protect our employees by continuously monitoring and mitigating political, travel, occupational health and safety, and building risks. Our security personnel are trained to appropriately respond to a variety of situations, and they are required to adhere to our disciplinary and human rights standards.

Building security
Before TI builds, purchases or acquires any property or facilities, it conducts a thorough risk assessment to understand the facility's current condition and location. We secure building access and exits; install enhanced lighting, fencing and surveillance cameras; and protect storage warehouses, equipment and other restricted areas.

Supply-chain security
TI takes measures to protect the security of its global transport and logistics system from such threats as terrorism, piracy and theft. We also voluntarily participate in the Customs-Trade Partnership Against Terrorism program, a global supply-chain security program led by U.S. Customs and Border Protection.

Information technology and intellectual property
As computer-based threats and vulnerabilities continue to grow in number and sophistication, TI's global partners, suppliers and customers are increasingly concerned about information protection. We are diligent about protecting our own confidential information as well as the information entrusted to us by others.

We use a combination of technology, processes and other controls to secure information technology (IT) hardware and software that monitors and alerts us to any inappropriate activity. We also require:

  • All new employees to take confidential information protection training, which we revise every two years.
  • Information owners in each business unit to take annual confidential information protection training.
  • IT Services employees to take specialized IT security training.

To keep apprised on the latest threats and security best practices, TI participates in the Information Systems Security Association. We also leverage close partnerships with key suppliers, and conduct risk and compliance assessments on third parties that request access to our resources and information.