Sustainability: Business continuity:
Incident management

TI's incident command process is modeled after the U.S. National Incident Management System. We have evolved our incident command process over the last 20 years to meet the challenges of our rapidly changing global environment.

Our incident command process is designed to minimize the impact of events that threaten our operations. Through detailed risk assessments, we classify risks based on their severity. This enables our 24/7 security communication center to prepare for, and when necessary, quickly deploy resources to ensure the safety of people and the environment, and to reduce operational downtime.

Emergency response

We activate our emergency response system depending on the nature and severity of an incident. Our Emergency Response team quickly identifies appropriate resources, services and infrastructure required to mitigate potential loss. Each site has emergency response liaisons trained to coordinate efforts locally. They also collaborate with corporate response teams when issues escalate to deploy the best response strategies. TI also works to provide disaster relief to communities where we have operations when natural and other catastrophes occur.

Crisis communications

TI has a comprehensive crisis communication plan in place, which includes procedures and guidelines for how and when employees and managers communicate should an issue arise. We use this plan in conjunction with business continuity plans to manage unexpected events. To prepare for unforeseen events, we conduct drills, tabletop exercises and site-level exercises to ensure preparedness. We also conduct regular training.

Asset protection

Here are some additional measures TI takes to protect its assets.


We protect our employees by continuously monitoring and mitigating political, travel, occupational health and safety, and building risks. Our security personnel are trained to appropriately respond to a variety of situations, and they are required to adhere to our disciplinary and human rights standards.

Building security

Before TI builds, purchases or acquires any property or facilities, it conducts a thorough risk assessment to understand the facility's current condition and location. We secure building access and exits; install enhanced lighting, fencing and surveillance cameras; and protect storage warehouses, equipment and other restricted areas.

Supply chain security

TI takes measures to protect the security of its global transport and logistics system from such threats as terrorism, piracy and theft. We also voluntarily participate in the Customs-Trade Partnership Against Terrorism program, a global supply chain security program led by U.S. Customs and Border Protection.

Information technology and intellectual property

As computer-based threats and vulnerabilities continue to grow in number and sophistication, TI's global partners, suppliers and customers are increasingly concerned about information protection. We are diligent about protecting our own intellectual property and personally identifiable information as well as the information entrusted to us by others.

We use a combination of technology, processes and other controls to secure information technology (IT) hardware and software that monitors and alerts us to any inappropriate activity. We also require:

  • All new employees to take confidential information protection training, which we revise every two years.
  • Information owners in each business unit to take annual confidential information protection training.
  • IT Services employees to take specialized security training.

Privacy and data protection

We have implemented a multilevel security program to manage data and reduce cyberattack risks. Important elements of data protection for TI include the protection of intellectual property and personally identifiable information.

Our Global Information Security team establishes policies, trains our employees, identifies and responds to threats, and works with our business units and support teams to continue to improve our security. In addition, the team leverages industry frameworks and standards, and collaborates with expert resources and industry partners, exchanging information about threats, best practices and trends.

We also leverage close partnerships with key suppliers, and conduct risk and compliance assessments on third parties that request access to our resources and information. We use the guidance from these resources, as well as our internal assessments, to identify and decrease our risk.

Our cross-business governance and compliance councils also focus specifically on information and personal data protection. Our management team is directly involved in our information security program and receives regular updates on steps we are taking to defend the company. In addition, we regularly train all employees on both cybersecurity awareness and confidential information protection.

Corporate citizenship news