- Mobile Theft
- Responsible Driving
- Wireless Communications and Health
Privacy is very important to our customers, and to us. We believe strongly that you alone have the right to control who collects and uses your personal information. Our customers show trust in buying our products and we return it by doing everything we can to protect their confidential information.
We work hard to protect the privacy of people who submit personal information to Motorola Mobility or use our products. We build technologies into our communications devices to allow customers to better protect confidential information. We also keep employees up to date with our ongoing privacy policies and information security measures through mandatory training.
|Roll out a privacy/data protection governance and compliance program for consumer, customer and employee data||Achieved. The program, which is operated by our cross-functional Privacy Working Group - comprised of Legal, Information Security, and Risk Assessment departments - is currently working to meet our privacy obligations. PWG’s principal clients are Product Management, Software Development, ATAP, Marketing, Service and Repair, and Human Resources.|
|Implement a system for assessing compliance with information protection policies and deploying process improvements on an ongoing basis||Partially Achieved. Our system for assessing compliance is still being implemented and staffed. However, we have instituted new policies and procedures for governing privacy compliance within our product development and marketing.|
|Roll out privacy controls that enable end users to easily make informed choices about what information Motorola Mobility collects from their mobile devices||Partially Achieved. Enhanced privacy controls and settings have been developed and are being refined. They will be included in our 2013 mobile devices products and experiences.|
|Revise mandatory training content and procedures to bring them up to date with developments in privacy and information security, and to improve employee compliance with mandatory training requirements||Partially Achieved. We have developed an enhanced privacy education and training program, which is in the process of being implemented. The plan includes an Intranet-based information protection awareness course, encompassing privacy, security and records management; live privacy-engagement events with functional teams; an updated and improved privacy portal for employees; and a continued emphasis on frontline privacy and information security engagement and counseling.|
- Refine and improve privacy compliance and governance program for consumer, customer and employee data.
- Complete implementation of system for assessing products, experiences, websites and applications for compliance with information protection policies.
- Complete rollout of enhanced privacy controls and settings within new mobile devices and experiences.
- Implement and assess enhanced internal privacy education and training program for employees.
In 2012, Motorola Mobility formed a cross-functional Privacy Working Group (PWG) to promote Motorola Mobility’s overall privacy compliance plan and to govern privacy and related data security policies and initiatives. This PWG includes representatives from Legal, Information Security, Risk Assessment and other functional areas. The PWG's principal clients are Product Management, Software Development, ATAP, Marketing, Service and Repair, and Human Resources. Additional staffing is occurring, principally at a product and software privacy engineering level.
Led by a dedicated team of privacy lawyers, our Legal Department works with clients in areas such as IT, marketing, human resources, product development and procurement, to improve our data protection capabilities.
We also have a dedicated information security team, which includes a privacy component to oversee policies and processes and to ensure compliance throughout our global business. Our product security team is responsible for certain security-by-design measures within our devices and software updates
We train employees in our privacy policies and practices and provide extra support for staff dealing with customers’ personal information. We also hold third parties, including suppliers and contractors that handle personal information for Motorola Mobility, to the highest privacy standards.
Employees who violate our information protection policies may receive disciplinary action, including loss of their jobs. Agents and subcontractors face contractual penalties and/or termination of our relationship with them.
Our internal information protection policy is called iProtect. It covers both our employees and third parties who handle customers’ personal information for us. iProtect requires us to:
- Inform customers and consumers about the types of information we collect about them and how we intend to use it
- Allow customers and consumers to choose whether their personal information is used for marketing purposes or shared with third parties
- Collect, process, transfer and store personal information in accordance with local laws
- Ensure the security of personal information so that it remains accurate, is not accessed without authorization and is used appropriately
- Provide customers, consumers and employees with the ability to access, correct, amend and/or delete their personal information when appropriate.
Review our statement of online privacy practices, which applies to personal information collected through our websites, and answers many frequently asked questions.
Products and Privacy
Our products are designed to protect user privacy and security. We include technology to guard against outside interference and provide voice data encryption on mobile phone networks. Our user manuals alert customers to their mobile phones’ privacy-protection functions. We work with an independent privacy auditor to make sure that certain products of ours comply with an objectively designed set of compliance standards.
Data encryption is an effective means to protect confidential information from unauthorized access and/or misuse. For example, laptops issued to our employees include full-disk encryption software. Also, we have introduced certain data encryption technology across our products designated “business ready” such as DROID RAZR, DROID RAZR MAXX and DROID 4 by Motorola. In addition, nearly all of our “business ready” smart phones offer remote wiping capabilities, which allow customers to wipe data from their device and memory cards if they are lost or stolen.
Breaches of Privacy
Motorola Mobility experienced no reportable data breach episodes in 2012. Nevertheless, we continue to enforce stringent privacy policies and practices, including incident response and remediation planning to protect personal and proprietary information that Motorola Mobility is responsible for protecting.