Security & privacy
Built for regulated industries — and the data they protect.
Mobility data is inherently sensitive. Telematics and service operations interact with information that demands the highest level of trust. We honor that responsibility by ensuring rigorous security and privacy are built into every design and deployment.
How we handle your data
Secure by Default. Tailored for the Strictest Requirements.
01 · DEPLOYMENT
Customer-owned cloud
Deploy in your AWS / Azure / GCP account where data residency, retention, and access live entirely under your control.
02 · RESIDENCY
Regional data residency
EU, US, and APAC residency supported. Data does not cross regional boundaries unless explicit policy permits it.
03 · ACCESS
Role-based access controls
Granular roles for engineers, technicians, service partners, and external auditors. Every access is logged.
04 · AUDIT
Full audit trail
Every diagnostic decision, every data access, every model invocation is captured and exportable.
05 · ENCRYPTION
In transit and at rest
TLS 1.3 everywhere; per-tenant keys for at-rest encryption with optional customer-managed keys.
06 · PRIVACY
Privacy by default
PII separation, configurable redaction, and explicit consent flows for any consumer-identifiable data.
Compliance posture
Aligned with the frameworks our customers already operate under.
- SOC 2 — in progress
- GDPR — supported by design
- CCPA — supported by design
- ISO 27001
- NHTSA reporting alignment
- WP.29 R155 / R156 awareness
We treat security and compliance as a moving target — and a contract with our customers. Detailed posture documents and questionnaires are available under NDA.
Talk to security
Have a security questionnaire? Send it.
Our security team responds to RFPs and questionnaires quickly. We've been on your side of that conversation.