Privacy & Data Protection
At AAW Group, we respect your privacy and are committed to protecting your personal information. We collect, use, and store personal data only for legitimate business purposes and in compliance with applicable privacy laws.
We take appropriate measures to safeguard your information from unauthorized access, disclosure, or misuse. Your data is handled with transparency, and we ensure that you have control over how your information is used.
This policy outlines how we collect, use, and protect your personal information and your rights regarding your data. For detailed information, please refer to our full Privacy Policy.
Cybersecurity Commitment
The logistics industry is heavily reliant on IT to support every aspect of day-to-day operations. AAW Group is no exception, virtually all our business and information are processed through IT systems. For that reason, any disruption to the IT environment or systems is a serious matter that can lead to significant losses and inconveniences.
AAW is committed to maintaining the highest standard of cyber security to protect our people, customers, partners, data, and systems from the ever-increasing risk posed by cyber criminals, malware, and phishing attacks. We have dedicated resources to monitor, counter and minimize these risks as much as possible.
We recognize that no cyber defence strategy is perfect, but we seek to minimize the risks by partnering with specialists in the cyber security sector to ensure that our multi-layered defence strategy includes the latest knowledge and countermeasures to protect our systems and environment.
Our cyber security strategy is defined by the following key points:
- A strong cyber security culture is crucial to our overall strategy. Our people are the first line of defence for protection against cyber threats. AAW provides cyber security awareness training and information to ensure our people are well educated on how to safely navigate the online world.
- Prevention technologies from market leading security companies.
- Segmentation of our network to prevent any attacks from spreading to the entire network.
- Stringent policies and procedures related to the application of the latest updates and security patches.
- Defined and tested disaster recovery processes.
- Major incident management procedures ensuring swift response in the event of a cyber-attack.
- Cyber security risk management which involves identifying, analysing, evaluating, and addressing cyber security threats, as well as taking steps and implementing methods and strategies to safeguard the company’s valuable assets.
Relevant Documentation
For more information, please refer to our policies and reports below:
Relevant Documentation
For more information, please refer to our policies and reports below:
- Supplier Code of Conduct
- Modern Slavery Statement
- Modern Slavery Policy
- Whistleblower Policy