Jabil IP Security

Secure Sites, Products, and People

The security of our partners’ corporate property — cyber IP and physical — is a fundamental Jabil priority. Delivering a new product first-to-market gives companies a distinct advantage in today’s global marketplace. It’s the difference between being a market-leader over the next market cycle and being an also-ran. And in this world of constant acceleration, protecting intellectual property in the early stages of product design and development is more important and challenging than ever.

Partners trust us with their most treasured products, assets, and intellectual property. To preserve that trust, our leadership dedicates significant resources to security and maintains a robust, global security team of senior professionals with proven track records. Our team makes sure that in all we do, Jabil exceeds our customers’ security needs. Our team also develops strong relationships with our customers to facilitate collaboration, understand their expectations, and build roadmaps for the successful production of their product. This fierce commitment to security is at the forefront of every one of our customer engagements.

Our capabilities for cyber and physical security include:

  • Customized security solutions — we create custom and executable security plans to secure, protect, and reduce risk around partners’ intellectual property, manufactured assets, and proprietary processes.
  • Confidentiality agreements — both Jabil employees and service providers sign nondisclosure and confidentiality agreements, demonstrating their commitment to Jabil and our partners’ security.
  • Asset protection —asset inventory processes for all physical and customer property ensure that Jabil can trace and track high-value assets to eliminate loss.
  • Site security — all Jabil sites enforce strict physical access controls. Controls vary by location, but typically include card-reader access to facilities, site security staff, and defined procedures for visitor access control.
  • Incident management — all security incidents are reported and thoroughly documented immediately.