Skip to content

Cybersecurity

Our Policy

We each play a role in securing Avaya’s proprietary information as well as confidential information entrusted to us by our customers.

Avaya maintains security systems and processes to protect confidential data. Cyber threats constantly evolve to avoid detection by these systems. Attackers seek to lure unsuspecting individuals with authorized access into providing the information they seek or gain unauthorized access to Avaya’s network and systems.

Data breaches and data loss can result in financial and reputational damage to the company. In the event of a breach, we will be held accountable for compliance with our security practices and our response.

Showing Accountability and Trustworthiness

Attacks come in many different forms. Always keep your guard—especially in the following situations:

When asked for your username or password by anyone other than Avaya IT.

Do not click on links in an email from an unknown sender.

Requests to change banking information in Avaya’s systems or process invoices outside of process.

If you receive an email or text message from a leader you normally don’t interact with, asking you to do something outside of process.

Requests for information on projects you are working, organization charts, or other sensitive data.

Promptly report breaches to cybersoc@avaya.com, or suspected breaches as outlined in the Data Breach Response guideline. Responding quickly and appropriately protects Avaya and our customers.

Next Section:

Acceptable Use Policy