Information     Security

Physical Security – Data Theft – Governance

Information security is of utmost importance to us as a company. In an increasingly digitalized world where data plays a central role, it is essential that we ensure the confidentiality, integrity, and availability of our information.

Protecting our sensitive company data is crucial as it forms the core of our business operations. We process a multitude of information on a daily basis, including customer data, trade secrets, financial information, and strategic plans. Any loss or compromise of this data could not only result in significant financial losses but also undermine the trust of our customers and partners.

Furthermore, we recognize that information security directly impacts the efficiency and productivity of our employees. If our systems and data are not adequately protected, we become vulnerable to cyber-attacks, data breaches, or operational disruptions. This could lead to significant disruptions in our business processes and hinder our ability to provide seamless service to our customers.

Our mission to establish information security

To ensure that we maintain information security, we have implemented extensive measures. We have established a robust information security management system based on the international ISO 27001 standard. This includes regular review and updating of our security policies, training our employees on secure information handling practices, and implementing technical security measures such as firewalls, encryption, and access controls.

Additionally, we collaborate closely with external experts and partners to ensure that we stay up to date with the latest insights and best practices in information security. We regularly participate in industry conferences and conduct audits to assess our security posture.

We also understand the importance of fostering a culture of security within our organization. We encourage our employees to be vigilant and proactive in identifying and reporting potential security risks. We have established clear protocols for incident response and have designated a dedicated team to handle security incidents promptly and effectively.

By prioritizing information security, we demonstrate our commitment to protecting the interests of our stakeholders, maintaining the trust of our customers, and safeguarding our reputation. We continuously invest in the latest technologies, conduct regular risk assessments, and adapt our security measures to address emerging threats.

In conclusion, information security is not just a compliance requirement for us; it is a fundamental aspect of our business strategy. We recognize that the security of our information assets is critical to our success, and we are dedicated to maintaining high standards of information security to ensure the long-term sustainability and growth of our company.

TISAX® Committment at MBE

TISAX® , or Trusted Information Security Assessment Exchange, is a globally recognized standard for information security in the automotive industry. As a supplier, our commitment to TISAX® is of utmost importance to us. We understand the significance of protecting sensitive information and ensuring the confidentiality, integrity, and availability of data. By adhering to TISAX®, we demonstrate our dedication to maintaining a robust information security management system.

Our commitment to TISAX® involves implementing and continuously improving security measures to safeguard our systems and data. We undergo regular assessments and audits to ensure compliance with TISAX® requirements and address any potential vulnerabilities or risks.

By embracing TISAX®, we not only protect our own information but also contribute to the overall security of the automotive industry. We recognize the importance of collaboration and trust among suppliers, manufacturers, and other stakeholders, and TISAX® provides a common framework for achieving this.

In conclusion, our commitment to TISAX® reflects our dedication to information security and our commitment to meeting high standards in the automotive industry. We strive to continuously enhance our security practices to ensure the confidentiality, integrity, and availability of data, thereby building trust with our partners and customers.

Business Partner Committment

When selecting business partners and suppliers, it is essential for us to evaluate their commitment to information security. They should demonstrate a proactive approach to protecting data, employing robust security measures and adhering to industry best practices. This includes the following measures to mitigate potential risks:

  • Implementing Firewalls
  • Encryption techniques

  • Access Controls
  • Regular security audits

  • Employee training programs

Furthermore, business partners and suppliers should be willing to align their information security practices with the standards and values of their clients. Each business has its unique security requirements and protocols, which may be influenced by industry regulations, customer expectations, or internal policies. It is crucial that partners and suppliers understand and respect these specific requirements, ensuring that their security measures are compatible and complementary.

Collaboration and communication are key in establishing a strong information security framework with partners and suppliers. Regular discussions should be held to exchange knowledge, share insights, and address any concerns related to data protection. This collaborative approach fosters a shared understanding of the importance of information security and encourages the implementation of effective security measures throughout the supply chain.

In addition to technical measures, it is equally important for partners and suppliers to prioritize the human aspect of information security. This involves promoting a culture of security awareness among their employees, emphasizing the significance of data protection, and providing regular training to enhance their knowledge and skills. By doing so, they contribute to creating a secure ecosystem where all stakeholders are actively engaged in safeguarding sensitive information.


We require a supplier self-assessment from each new supplier. A non-disclosure agreement (NDA) is required if one or more of the following apply to your company:

  • Do you work with (highly) confidential MBE data?
  • Do you have access to MBE IT-systems?
  • Do you have access to copies of (highly) confidential MBE documentation?
  • Do you have access to (highly) confidential areas on the company’s premises?
  • Do you manufacture parts to specific MBE requirements?

The documentation that is handed over or transferred to you is always classified as follows:

  • Public
  • Internal
  • Confidential
  • Highly Confidential

In case you have encountered any kind of any information security incident, please feel free to contact us using the concact form:

If you have any questions about TISAX® and information security, you can find the answers to your questions in the links below:

ENX Home Page
TISAX Participant Handbook