/content/honeywellbt/us/en/search.html
    title
    subtitle

    TRUST CENTER Integrity Fuels Innovation

    Building the future starts with trust. Transparency and accountability help make that happen. Protecting your data and responsibly innovating with AI are core values at Honeywell. Learn more about our approach to privacy, security, AI governance and compliance below.

    Privacy

    Privacy is our priority. We aim to give you control over your data and to be transparent about our privacy practices. Explore our privacy program below.

    Privacy Statement

    Trust is built on transparency. We strive to provide clear, straightforward information to you about our privacy practices. Our Privacy Statement explains our approach to privacy when we are the data controller and how to exercise your rights.

    Data Processing Agreement

    You trust us with your data, and we take protecting that data seriously. We include privacy commitments in our customer contracts and make securing your data our priority. Our DPA applies where we process personal data on behalf of customers.

    Global Privacy Program

    As a global organization, we have built a global privacy program to oversee our data protection strategy and its implementation to ensure compliance with applicable data protection regulations worldwide.

    Privacy FAQs

    Have additional questions? Review our Data Privacy FAQs for more information about commonly asked questions.

    Security

    Security is embedded throughout our business. Our approach is built around confidentiality, integrity and availability by design. We continually evaluate our security program to identify opportunities for improvement to better meet our customers’ needs.

    forge
    forge

    Product Security

    Security reviews are automatically built into our software development lifecycle. Product Security Leaders are integrated into the product release process and work closely with our developers to enhance the security of our products

    Policies and Standards

    Honeywell implements global policies, standards and procedures covering security, while aligning to industry-standard compliance frameworks. We regularly review and update our security policies to evaluate risks and the effectiveness of controls.

    Vulnerability Management

    Honeywell systems are monitored for different security aspects, such as cyber attacks and vulnerabilities. We use various automated and manual tools to help identify vulnerabilities which are scored via the CVSS, then remedied by the relevant internal party.


     

    Change Management

    Honeywell’s change management process strives to ensure all changes are approved with minimal business impact. All changes, such as patches and applications, are run in a controlled manner, logged and assessed before implementation, then reviewed for impact.

    Incident Response

    Honeywell’s Security Operations Center (SOC) follows industry security practices and adheres to a defined cybersecurity incident-response policy for monitoring incidents. Our SOC maintains onsite, controlled chain-of-custody during evidence collection.

    Product Security Incident Response Team (PSIRT)

    PSIRT manages the receipt, investigation, internal coordination, remediation and disclosure of security vulnerability information related to Honeywell products, including software, applications, hardware, devices, services and solutions.

    AI Governance

    Honeywell is committed to using AI responsibly. Our responsible AI principles inform our use of AI across the company and in our products.

    Responsible AI Principles
    Accountable

    We strive to hold ourselves accountable through robust AI governance, clear lines of responsibility and monitoring to help ensure continuous improvement. We expect our partners to do the same.

    Safe and Secure

    We seek to protect against unintended applications, access or harm associated with our use or provision of AI.

    Valid and Reliable

    We aim to employ technology that produces appropriately consistent and accurate results and incorporates controls designed to help minimize disruptions.

    Fair and Equitable

    We strive to treat people fairly and equitably from the design to implementation of AI, including seeking to identify and mitigate algorithmic bias.

    Privacy and Intellectual Property

    We strive to safeguard individual confidentiality, autonomy, and control over the use and disclosure of Personal Data as feasible, appropriate and legally required and to protect Honeywell and third-party intellectual property and data rights.

    Transparent and Explainable

    We promote transparency in our design, function, description, and use of AI and endeavor to maximize explainability of AI decision-making when feasible and appropriate.

    Sustainable

    We are committed to reducing our environmental footprint, including supporting the environmentally and socially conscious use of AI.

    Compliance

    Many of our products and services maintain security certifications to demonstrate compliance to industry security standards. These services undergo independent third-party audits and use best-in-class cloud providers.

    ORGANIZATION 
     
    SCOPE
     
    CERTIFICATION 
     

     

    Honeywell Connected Enterprise 

    Honeywell Forge Performance+ (Platform)  SOC2 Type II 

     

    Honeywell Connected Enterprise 

    Honeywell Forge Performance+ (Platform)  CSA Star Level I

     

    Sine Group Pty Ltd 

    Honeywell Forge Visitor and Contractor Management (formerly Sine) SOC2 Type I

     

    Movilizer GmbH 

    Honeywell Connected Logistics  ISO/IEC 27001:2013 
    ISO 9001:2015

     

    Sparta Systems Inc. 

    Honeywell Life Sciences Applications Suite  ISO 9001:2015
    SOC2 Type II 
    TrackWise  
    TrackWise Digital 

     

    Honeywell International Inc. 

    Managed Security Services (Houston, TX)  ISO/IEC 20000-1:2018 ISO
    IEC 27001:2013


     

    Honeywell Romania s.r.l. 

    Managed Security Services (Bucharest, Romania)  ISO/IEC 20000-1:2018
    ISO/IEC 27001:2013 

     

    Honeywell International Inc. 

    Multiple Systems  ISO/IEC 27001:2022

     

    Honeywell UK Limited 

    Multiple Sites  Cyber Essentials Scheme
    Cyber Essentials Plus Scheme 

     

    Tridium, Inc.

    Secure Software Development Lifecycle   IEC 62443-4-1

     

    Honeywell Cyber Security 

    Secure Software Development Lifecycle  IEC 62443-4-1

     

    Honeywell Connected Enterprise

    Secure Software Development Lifecycle  IEC 62443-4-1 

     

    Honeywell Process Solutions 

    Secure Software Development Lifecycle  IEC 62443-4-1 

     

    Honeywell Buildings Technology

    Secure Software Development Lifecycle  IEC 62443-4-1 

     

    Honeywell Specialty Chemicals Seelze GmbH 

    Seelze, Germany  Trusted Information Security Assessment Exchange (TISAX) 

    Some of Honeywell Forge cloud products are built on Microsoft Azure, Amazon Web Services or Salesforce Cloud. The cloud services maintain industry-leading compliance and security certifications such as Cloud Security Alliance (CSA) STAR, ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, SOC 3 and FedRAMP.

    Request a copy of our compliance reports using the form below.

    Frequently Asked Questions

    Does Honeywell have a privacy program?

    Honeywell is committed to protecting the personal data that we process and complying with applicable data privacy laws in the countries in which we operate. Honeywell’s global privacy program includes a dedicated in-house data privacy team (the “Data Privacy Function”), led by our Chief Privacy Officer, which monitors developments in data privacy regulation globally, including the General Data Protection Regulation (“GDPR”). The Data Privacy Function is responsible for overseeing our data protection strategy and its implementation to ensure compliance with applicable data protection regulations worldwide (which includes formal policies procedures and processes to facilitate data subject rights, privacy impact assessments, data transfers, data retention, appropriate technical and organizational measures, incident response plan, and privacy training and awareness).

    Do your employees receive data privacy training?

    Honeywell’s annual compliance training includes a requirement for employees to complete an online course and pass an assessment covering information security and data privacy. Additional privacy training is provided for specific job functions. We work hard to promote a positive culture of data protection compliance across our business.

    Does Honeywell conduct privacy impact assessments?

    Honeywell generally conducts privacy impact assessments to identify and manage privacy risks associated with new products and services.

    What happens when Honeywell receives a data subject access request?

    Where the customer is the controller, Honeywell will redirect the data subject access request to the customer in accordance with our customer agreement. Honeywell will not respond directly to the data subject unless authorized by the customer to do so and mutually agreed between the parties. Where Honeywell is the controller, Honeywell will deal with the data subject access request in accordance with its policies and procedures.

    Where is my data stored?

    Honeywell uses leading cloud service providers to host our applications. The data centers for Honeywell Forge are primarily located in the United States, but regional deployment models may be available for some products. Please contact your sales representatives for more information regarding in-region cloud hosting availability.

    Does Honeywell have policies and procedures designed to ensure the security, confidentiality, integrity and availability of its systems?

    Honeywell maintains a suite of security policies that address numerous areas, including physical and logical access, environmental, change management, backup and retention, remote access, firewall management, logging and monitoring, batch processing, segregation of duties, host hardening/vulnerability management and security operations/incident management. We regularly review and update our policies, conduct vulnerability scanning and perform penetration testing to test and monitor compliance with our security policies.

    How is security integrated into your development process?

    We use a range of tools and practices throughout our secure software development lifecycle where security is embedded into each phase to secure our products. Depending on the product risk profile, these may include threat modeling, security testing and vulnerability scanning. Our developers are trained to follow secure coding guidelines.

    Does Honeywell conduct security coding reviews?

    Source code reviews and security testing are conducted to identify potential system flaws, with the goal of mitigating risk, protecting data and maintaining intended systems functionality. Requirements of security testing may include confidentiality, integrity, authentication, availability, authorization and nonrepudiation. Actual requirements tested depend on the context of the security implemented by the system.

    How does Honeywell define security requirements for products?

    We use security design patterns based on Honeywell standards and industry best practices. Components included in our infrastructure, platform and applications are reviewed against these design patterns to identify problematic coding activities that could lead to vulnerabilities in our code.

    Does Honeywell follow secure coding guidelines for software development?

    Our policies require developers to use secure coding practices and conduct security testing, which are aligned with OWASP guidelines.

    How is physical access to data centers holding customer data restricted and monitored?

    We use industry-leading cloud service providers who follow comprehensive physical security controls to limit access to authorized personnel. Our data center providers are audited by independent third-party auditors who report their findings via SOC 2 Type 2 reports.

    How does Honeywell manage access to systems and services?

    Honeywell has a defined procedure for provisioning user access. All users have individual logins. We use role-based access to ensure staff only have access appropriate to their roles. We control access to our corporate applications through a single sign-on platform.

    How does Honeywell use data encryption?

    Honeywell uses commercially standard cryptography and security protocols to protect the confidentiality and integrity of customer data. 

    How does Honeywell manage cryptographic keys?

    Cryptographic keys are managed according to defined policies and procedures. Duties are segregated to ensure an appropriate level of security controls.

    What are Honeywell’s patch management procedures for securing endpoint devices and production environments?

    We use commercially reasonable efforts to promptly apply security patches (including open source software) after potential vulnerabilities become known to us.

    Are security events logged?

    Logs associated with security events are aggregated and stored centrally and are monitored through Honeywell’s security operations center (SOC).

    Does Honeywell have documented incident response plans and procedures for handling security incidents?

    Incident response procedures exist for security and data protection incidents, which includes incident analysis, containment, response, remediation, reporting and the return to normal operations. We have an incident response capability which includes a Computer Incident Response Team (CIRT) with a formal process to respond to cyber attacks. Intrusions are logged, monitored and investigated. Incident response plans are maintained, updated and tested on an annual basis.

    Does Honeywell provide notice to customers if their data is involved in a security incident?

    Yes, we adhere to our incident response procedures to ensure timely reporting of security breaches in compliance with applicable regulatory and contractual requirements.

    Does Honeywell prevent and monitor its systems for data breaches?

    Yes, we follow industry-leading security practices to enable logging and monitoring of security events through our security operations center (SOC) that helps detect data privacy-related incidents.

    Does Honeywell have change-of-control procedures?

    Yes, our development and operations teams follow a defined change management process while making configuration changes on applications and their underlying infrastructure platform to ensure all changes are approved and that there is minimal business impact. Changes are logged, assessed and authorized prior to implementation and reviewed against planned outcomes following implementation.

    How often does Honeywell scan its networks and applications for vulnerabilities?

    Vulnerability scans are conducted periodically with static code scans on every checked-in code change. Open source and container scans are performed on every build. Infrastructure resources are continuously scanned for vulnerabilities.

    Does Honeywell have a documented business continuity and disaster recovery plan?

    Honeywell follows a global resilience framework that includes conducting business impact analysis and maintaining business continuity plans. Honeywell periodically tests its business continuity and disaster recovery plans as per Honeywell’s Global Resilience framework.

    How does Honeywell ensure application security while using open source components in its services?

    Honeywell validates and approves usage of open source as part of the security requirements' definition and scans the source code using security tools to help identify and remediate known vulnerabilities.

    Does Honeywell perform background checks on all employee candidates, contractors and third parties with access to customer data?

    Honeywell performs background checks as part of the recruitment process for employees and contractors, where allowed by local law and as reasonable for job roles.

    Do agreements with third parties (for example, subservice providers) include information security, confidentiality and data protection requirements?

    Prior to engaging a third-party supplier, Honeywell reviews any proposed engagements and requires suppliers to provide evidence of their security practices. We require suppliers to comply with minimum security requirements, and these standards are incorporated into the supplier’s contract.

    Resources

    Honeywell Responsible AI Principles
    Download File Multiple Download been Selected
    Honeywell Global Data Privacy Program Overview
    Download File Multiple Download been Selected
    Honeywell Data Processing Agreement for Customers
    Download File Multiple Download been Selected
    Honeywell Data Processing Exhibit for Suppliers
    Download File Multiple Download been Selected
    Standard Contractual Clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679
    Download File Multiple Download been Selected
    Controller to Controller Transfers
    Download File Multiple Download been Selected