At TomTom Telematics, we’re committed to the security and privacy of information. We invest continuously in our engineering, proven technologies, processes, and people to make sure we can always provide you the most reliable telematics service on the market. As one of the world‘s largest providers of telematics services, continual investment in our service is important. We’re always improving to make sure that we are the best partner in the field of telematics for our clients – now and in the future.
TomTom has established and applies an Information Security Management System according to the “Statement of Applicability” for Architecture, Engineering, Quality Assurance, as well as IT operations of the TomTom Telematics Service Platform including Business Continuity Management provided to the TomTom Telematics BV, at the Technology Headquarters and at our secure Data Center co-locations in Germany in accordance with the ISO/IEC 27001:2013 international standard.
“The ISO/IEC 27001:2013 certification underpins that we’re in complete control of our processes and even more importantly, that our client data is in safe hands, which is crucial for us providing a business critical fleet management “Software as a Service” (SaaS) solution.”
The cornerstone of TomTom Telematics’ commitment to information security is our set of security policies and programs. Based on our rigorous risk management program our policy aligns security with operations across the following topics:
A detailed set of security policies designed to provide management direction and support of the information management system and all operational activities with respect to the TomTom Telematics Service Platform.
Information Security is everyone’s business.Employment of a full-time information security team to provide compliance and governance of our Information Security Management System (ISMS) based on the ISO/IEC 27001:2013 international standard in addition to the EU General Data Protection Regulation (GDPR) and other relevant legislations. All of our employees and external partners play an integral part in supporting the ISMS.
Security in the employment life cycle is critical to ensure that security is emphasized prior, during, and after the termination of employment.
Inventory, ownership, and maintenance of all our assets throughout the life cycle is important to ensure that assets are categorized, labeled, and assigned risk owners to ensure that all assets including those with company IP or customer data are handled in a correct and secure way to maintain security.
Through authentication / authorization controls and identity management, all access is limited to a need-to-have basis. Additional controls assist to prevent unauthorized access, for example system logging and monitoring which provides real-time detection across our security perimeter.
We invest in state of the art hardware and software solutions including proven cryptographic technologies in order to protect the confidentiality, integrity and availability of our customer’s data as well as our operational systems.
We place great value on ensuring physical and logical separation is maintained in the TomTom Telematics Service Platform. This includes ensuring that the physical location in which information assets are located is protected from unauthorized access and that equipment is protected from environmental conditions to prevent the failure of services for our customers.
The protection of physical and virtual assets is critical to a secure telematics solution. This also includes maintaining a secure communication network and the facilities from which the network is hosted for secure transfer of the data between your vehicle and our TomTom Telematics Service Platform back end.
TomTom Telematics operates two independent data centers in the European Union due to the high level of data protection standards required. Our active / active configuration also ensures the highest availability including full disaster recovery.
As a software company, all of our products depend on secure coding principles and processes to ensure an agile product life cycle.
Software design analysis
Static inspection of code
Dynamic analysis of the application
Deployment and stabilisation of the application
The TomTom Telematics Service Platform Life Cycle includes:
In addition, we facilitate the following programmes to secure our engineering perimeter:
Securing the external risks at the edge of our scope helps to ensure that no additional risk is added to the organization through our partners or suppliers. When possible, we select suppliers who are ISO/IEC 27001:2013 certified, as well as actively monitor our suppliers in order to maintain a secure working relationship and to be aware of changes to their environments which could affect our secure operations.
Should a security incident occur, it is important to have an effective approach for managing the incident, which includes the communication to all interested parties, as well as the internal reporting of security weaknesses which helps support a secure perimeter.
We manage a detailed Business and Information Security Continuity program to ensure that the TomTom Telematics Service Platform will be available to our customers even in the event of a disaster. Through our Active/Active data center configuration, the probability of a major disaster in both centers is unlikely, as each center can maintain our entire operation if necessary, which means you can rely on the TomTom Telematics Service Platform service being available when you need it.
TomTom Telematics utilizes a full time Data Protection Officer (DPO) to advise on data protection matters and oversee compliance with the GDPR as well as other relevant local privacy legislations.
Our ISMS Security team performs regular reviews of legal or security requirements which might have an effect on the TomTom Telematics Service Platform or our information security management system.