Our commitment to data security
We are actively committed to implementing and maintaining the information security management system to ensure the highest standards in data analysis and management processes. We adhere to European and national laws and guidelines, thereby ensuring compliance with the highest industry standards.
We have obtained ISO/IEC 27001 certification, the international standard that outlines best practices in information security.
DATA PROTECTION & GDPR
As a company specialized in mobile phone data analysis, we understand the importance of Confidentiality, Integrity, and Availability of information. Considering the nature of the data we work with, we are firmly committed to ensuring maximum protection and confidentiality through the following measures:
We ensure the utmost protection of data originating from mobile phones. All personal information, including phone numbers and geographic locations, is treated in full compliance with legal and contractual requirements.
PRIVACY BY DESIGN
Every piece of information extracted from the mobile phone network is aggregated and irreversibly anonymized directly at the source through the use of the “privacy by design” protocol.
AGGREGATION AND MASKING
USER ACCESS AND CONTROL
We implement stringent procedures for user access and control. Only authorized personnel can access the data with monitoring aimed at ensuring compliance with our security standards.
PERIODIC RISK ASSESSMENT
We conduct periodic risk assessments to identify and mitigate potential vulnerabilities in our system. This practice ensures continuous monitoring of threats and implementation of resulting security measures.
ISO/IEC 27001 Certification
Obtaining ISO 27001 certification is a result of implementing our policies and procedures. They ensure a high standard in information security management, particularly in monitoring the confidentiality, integrity, and availability of your information.
This achievement marks only the beginning. We will continue to invest in the most advanced technologies and best available practices to ensure that information security remains at the core of every operation we undertake.