Cases - f.case - catalogue Fischer Elektronik - page 13

Certificate
Standard
ISO/IEC 27001:2013
Certificate Registr. No.
01 153 101878
Certificate Holder:
Fischer Elektronik GmbH & Co. KG
Nottebohmstr. 28
58511 Lüdenscheid
Germany
Scope:
Design/construction, manufacture, assembly and sales for
heatsinks, sockets, connectors, mounting parts, cases,
19" assembly systems, PCB accessory
SoA Version 2.0 from 04.09.2017
Proof has been furnished by means of an audit that the
requirements of ISO/IEC 27001:2013 are met.
Validity:
The certificate is valid from 2017-10-01 until 2020-09-30.
First certification 2011
2017-10-24
TÜV Rheinland Cert GmbH
Am Grauen Stein · 51105 Köln
®TÜV,TUEVandTUVare registered trademarks.Utilisation and application requires priorapproval.
The authorised economic operator
AEO-certificate
Since 1st January 2008 companies based in the European
Union and involved in customs activities have been able to ap-
ply for the status of Authorised Economic Operator (AEO). The
status entitles a benefit of safety-relevant custom controls and/
or simplification according to custom regulations.
The goal is here to ensure an uninterrupted global supply chain
from the producer to the end user. The status of an authorised
economic operator is valid in all Member States and is not
limited in time.
Our company has the status AEO-C (customs simplification).
The legal requirements of an authorised economic operator are
essentially the result of:
Article 5a community custom code (ZK)
Article 14a - 14x community custom code implementing provi-
sion (ZK-DVO)
Information management norm
DIN EN ISO/IEC 27001
Information security is becoming more important. For the suc-
cess of our business information are essential values. Admi-
nistrating and protecting those has our top priority.
The information security management system to
ISO/IEC 27001 considers three kinds of information:
availability, confidentiality and integrity.
This information security management system is the basis for
continuous monitoring and optimisation processes.
It also ensures the scrupulous handling with information. A
protection against attacks on the corporate network and theft
is ensured.
Within the information security management system the risk
evaluation such as human misconduct takes place by means
of error-possibility-influence-analysis.
1...,3,4,5,6,7,8,9,10,11,12 14,15,16,17,18,19,20,21,22,23,...174
Powered by FlippingBook