Information Security

We have a responsibility to safeguard Bio-Rad and third-party data in a manner consistent with our Code, our policies, and the law.

We can only innovate and experiment with new ideas and products if our information and data are at hand and secure. Therefore, we are all committed to keeping the data and information we use, access, collect, process, and store safely and properly secured. Bio-Rad has developed policies and procedures to make sure we keep this commitment, so we must learn the procedures that apply to our role.
 

    • Use or access data only when there is a business purpose for its use.
    • Keep user IDs, passwords, and other security measures confidential.
    • Make sure we are familiar with all of the information security procedures that apply to our role.
    • When not working on the Bio-Rad network, make certain we follow all of Bio-Rad’s procedures for remote access and data protection.
    • Never install software to Bio-Rad electronic devices unless specifically authorized to do so.
    • Never download files or data to electronic devices unless authorized to do so.
    • Contact the Chief Privacy Officer, Chief Compliance Officer or the Corporate Compliance Department if we believe a security breach may have occurred, or if we have any questions about our Information Security Program.

    Expectations


    • We must make sure we are familiar with and follow all of the information security and data protection procedures that apply to our role at Bio-Rad.
    • When we are on the job – whether it’s at a Bio-Rad office, a local coffee shop, a healthcare provider, an academic institution, or a government agency — Bio-Rad’s online safety and security are a responsibility we all share.
    • Be vigilant and watch for possible security threats such, as phishing emails. Remember, if you receive a suspicious email, never open any attachments, delete the email, and contact the Service Desk.
    • We speak up, ask questions, and report any concerns we might have about suspicious activity or potential information or data breaches.

    Training Videos in Multiple Languages

    Key Terms

      Unauthorized access, movement, and/or disclosure of information that Bio-Rad keeps on its electronic systems and in our applications.

        Digital (usually email) form of random social “hacking” to deceive individuals into providing sensitive information.

          The use of electronic resources (computers and mobile devices) for conducting company business outside of a Bio-Rad network.

            A form of phishing targeted to a specific individual or organization for financial gain or trade secrets.

              Malicious software that compromises the operation of a computer system by performing unauthorized functions.

                Type of malware which restricts access to and/or encrypts a computer system until a ransom demand is paid.

                FAQs

                A: Yes. Immediately report the incident to the Bio-Rad Service Desk, since you may have compromised your laptop and possibly our network.

                Was this answer helpful?

                Thank you, your feedback has been sent!

                A: No. Microsoft does not call users and Bio-Rad maintains its own computers. This is a common scam that could result in a data breach. Phone calls are difficult to trace, so as long as you did not comply with the caller, you’re fine. If you did anything that the caller asked, contact the Bio-Rad Service Desk to have your computer cleaned and checked

                Was this answer helpful?

                Thank you, your feedback has been sent!

                A: No. Do not plug unknown drives or devices into your computer, as this is a common method of installing malware on your computer. If you did not plug it in, it should be disposed of as soon as possible. If you did plug it into your computer, contact the Bio-Rad Service Desk to have your computer checked and cleaned.

                Was this answer helpful?

                Thank you, your feedback has been sent!

                A: Unfortunately, it’s easy for cyber criminals to make an email look like it came from someone else. Ask yourself if your job role is one where a request like this might happen. If there are any doubts, don’t comply and contact the privacy hotline.

                Also, here are a few reminders on ways to spot phishing attacks:

                • Always be vigilant. It’s human nature to trust and want to help others. Cyber criminals know this and use it to their advantage.
                • If an email is delivered to your spam folder, there is a reason it was identified as suspicious.
                • Hover over the sender’s name to see if the email name in the pop-up window matches the sender’s name. Cyber criminals can impersonate Bio-Rad executives as well as colleagues, friends, and family. Always check to be sure.
                • Watch for “trick” addresses. EMAIL@BlO-RAD.COM is not the same as EMAIL@BIO-RAD.COM (in the first address, the “I” in Bio-Rad is actually a lower case “L.”)
                • Ask yourself “why would this person ask me to do this?” This is especially true if you feel pressured to do something quickly. Take a moment to think it through. If it sounds too good to be true, it probably is.
                • Finally, if you suspect you’ve been targeted by a phishing attack:
                  • Don’t open any attachments.
                  • Click on the three vertical dots next to “Reply” and select “Report phishing” so we can improve our filtering.
                  • Contact the Service Desk (biorad.service-now.com/ess) so the personnel there can assist in gathering pertinent information for Information Security to investigate.
                  • Delete the email.

                Was this answer helpful?

                Thank you, your feedback has been sent!
                All Rights Reserved