Free trial TOGGLE MENU

Information security

Our goal is to be the world's leading mobile software solution for dynamic route planning for external sales and service reps. As such, information security is an essential foundation for successful collaboration with our stakeholders.

Information security addresses the preservation of confidentiality, integrity and availability of information:

  • Confidentiality: Information is provided or disclosed only to authorized individuals, organizations or processes.
  • Integrity: Information is correct and complete.
  • Availability: Information is accessible to and usable by an authorized party upon request.

In providing our service, we must meet the justifiably high information security requirements of our customers, employees and other stakeholders. This involves a large number of interlocking measures and processes. To ensure information security in all areas of our company in a structured and comprehensive manner, we have decided to implement an information security management system (ISMS). This also includes effective protection of personal data in cloud services.

ISO 27001:2013 certified
extended by ISO 27018:2019
GDPR compliant
portatour® runs on our own servers
Submission to regular independent audits
portatour® is 100% SSL-encrypted

To ensure that our ISMS is state of the art, we have implemented it in accordance with the globally recognized ISO 27001:2013 standard (extended by ISO 27018:2019). Following the standard specifications, we constantly evaluate and improve our ISMS and have ourselves audited annually by external auditors. Our certificate according to ISO 27001:2013 (extended by ISO 27018:2019) serves our stakeholders and us as proof of practiced information security.

Of course, our servers, on which portatour® is operated, are also located in ISO 27001:2013 certified data centers. The processing of personal data in portatour® takes place exclusively within the European Union or the European Economic Area. To ensure the security of personal data, we have accordingly taken appropriate technical and organizational measures (TOM). We are happy to send these to you upon request.

Related information on the topic information security:

Related information on the topic privacy: