Cyber Security​

As a Pandora supplier, it is crucial that you understand our Global Security standards and the responsibilities that come with safeguarding our information, systems, and operations. Here you will find an overview of our security expectations, key processes, and how to contact Pandora’s Global Security team to ensure full alignment and protection across our partnership.

As a supplier of Pandora, it is essential to be acquainted with our Global Security team and understand our processes to safeguard the integrity, availability and confidentiality of our systems and data.

Our team is dedicated to protecting the security and privacy of Pandora's information assets, to protect both our customers, and our employees.

We work diligently to ensure that all suppliers meet our security standards, are mature from an information security perspective and are committed to maintaining a secure environment.

INFORMATION SECURITY AT PANDORA

Pandora adheres to the highest Cyber Security standards to ensure the protection of our information assets. ​

These include:​

  • Alignment with international security frameworks such as ISO 27001​
  • Implementation of strong access controls​
  • Regular security training and awareness programs​
  • Continuous monitoring and threat assessment​
  • Incident response ​

This matter is of utmost importance to our organization; therefore, we impose the same standards upon our suppliers. During the onboarding process and contract negotiations, we require our suppliers to agree to and adhere to our information security schedule, and also demonstrate that their security posture is satisfying.​

OUR PRIMARY RESPONSIBILITIES

  • Overseeing the supplier onboarding process from information security standpoint
  • Evaluating suppliers' information security posture
  • Assessing the controls implemented by suppliers
  • Providing guidance on relevant security best practices and coaching our suppliers on their way to more mature security posture
  • Monitoring compliance with Pandora's security policies

PANDORA'S SECURITY STANDARDS

During the supplier onboarding process, our team meticulously evaluates each supplier to ensure they adhere to Pandora's security standards.

This involves:

  • Reviewing the supplier’s information security policies
  • Conducting risk assessments
  • Verifying the implementation of robust security controls
  • Ensuring compliance with industry standards

CONTACTING PANDORA’S GLOBAL SECURITY TEAM AND REPORTING INCIDENTS

If you have any questions, please reach out to the Global Security team at [email protected].​

Help us keep Pandora's operations safe and efficient.

If you want to report any potential security incidents including personal data or potential risks in our stores, facilities, or supply chain, please report them here

Your input supports a safer environment for everyone.

For building and improving your company’s security program, you may find the following resources particularly helpful:​

The NIST Cybersecurity Framework (CSF) 2.0

The CIS Critical Security Controls (CIS Controls)

ENISA (European Union Agency For Cybersecurity)