{"id":46669,"date":"2023-02-02T14:06:01","date_gmt":"2023-02-02T14:06:01","guid":{"rendered":"https:\/\/www.microlise.com\/faqs\/"},"modified":"2025-07-04T11:38:29","modified_gmt":"2025-07-04T10:38:29","slug":"faqs","status":"publish","type":"page","link":"https:\/\/www.microlise.com\/au\/faqs\/","title":{"rendered":"FAQs"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;General business information&#8221;][vc_tta_section title=&#8221;Is microlise classed as an sme?&#8221; tab_id=&#8221;1675246789095-d9a9509b-2bce&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">No. Microlise Group Ltd is not classed as an SME (Small and Medium Sized Enterprise) under the EU definition as it has greater than 250 employees.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What is microlise\u2019s companies house number?&#8221; tab_id=&#8221;1675254973543-73b53052-fbaf&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Microlise Group Ltd (1670983).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise operate from multiple locations?&#8221; tab_id=&#8221;1675254971370-e8bdbd3d-f8c6&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The Microlise Group of companies has locations in the UK, Australia, New Zealand, France &amp; India.<\/p>\n<p style=\"text-align: left;\">Microlise Ltd does not transfer customer data between locations unless specified\/agreed in the specific contract and\/or data processing agreement.<\/p>\n<p style=\"text-align: left;\">Data is held within UK data centres however support is provided from Pune in India.<\/p>\n<p style=\"text-align: left;\">Technical support staff in Microlise India will have access to relevant information to provide the required support to customers where appropriate.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is microlise listed on the information commissioners\u2019 office (ico) register of data processors?&#8221; tab_id=&#8221;1675246789105-1a219ec9-0ae7&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Registration Number: ZB240179.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is microlise iso certified?&#8221; tab_id=&#8221;1675255073266-25a92edc-0d2a&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: left;\">Yes. ISO 9001, ISO 20000 and ISO 27001 certified.\u00a0\u00a0Certification evidence is available from UKAS (https:\/\/certcheck.ukas.com\/).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What is the position of microlise on the use of ai?&#8221; tab_id=&#8221;1695375993740-f6f84136-b941&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Adding value to our customer\u2019s operations using Artificial Intelligence (AI) and Machine Learning (ML) is part of Microlise Group\u2019s roadmap. Some of its products already use AI, including both ClearVision AI Cameras and patent-pending Trailer Brake Performance Monitoring Systems (TBPMS). The Group is committed to expanding these advancements ethically across its portfolio of Fleet Compliance, Performance &amp; Safety, Transport Management System (TMS), Planning &amp; Optimisation (P&amp;O), Journey Management, and Driver Connected Mobility Services.<\/p>\n<p style=\"text-align: left;\">The Group recognises the significance of responsible AI integration and follows the ethical guidance from the UK Government [1] and the European Commission [2]. It is committed to the guidelines, ensuring standards are applied throughout its portfolio. Through continual assessment, the Group ensures impartiality and fairness across all AI-powered offerings, thereby pre-empting biases, discrimination, and reinforcing the public&#8217;s confidence in the reliability and safety of all AI products developed by Microlise Group..<\/p>\n<p style=\"text-align: left;\">The optimisation engine powering the Group\u2019s Planning &amp; Optimisation (P&amp;O) product is designed using mathematical models, optimisation methodologies, and heuristic algorithms. Consequently, it\u2019s a transparent and explainable solution for tackling the complex challenges around vehicle routing for pick-up and deliveries, while continually re-calculating operational constraints based upon user data. P&amp;O gives users complete control in adjusting and improving the suggested routing plans, providing them complete autonomy.<\/p>\n<p style=\"text-align: left;\">[1] UK Government: Navigating Artificial Intelligence Ethics and Safety: <a href=\"https:\/\/www.gov.uk\/guidance\/understanding-artificial-intelligence-ethics-and-safety\">https:\/\/www.gov.uk\/guidance\/understanding-artificial-intelligence-ethics-and-safety<\/a><\/p>\n<p style=\"text-align: left;\">[2] European Commission: Fostering Trustworthy AI with Ethical Guidelines: <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/ethics-guidelines-trustworthy-ai\">https:\/\/digital-strategy.ec.europa.eu\/en\/library\/ethics-guidelines-trustworthy-ai<\/a><\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Application security&#8221;][vc_tta_section title=&#8221;Do microlise apps use active directory (ad) for authentication?&#8221; tab_id=&#8221;1675265645179-ce05c9a3-d13f&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">No. Users and their access rights are administered locally to the Microlise application. Optionally, the Microlise application can be configured for single sign-on by integrating your Identity Provider with the Microlise Identity Provider cloud service. In this mode, new users are created when they access the Microlise application. Access rights management still takes place within the application itself.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Where is the authentication repository held and what security\/access is configured?&#8221; tab_id=&#8221;1675265645198-a79458f9-6f56&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">The authentication repository is held in a database.<br \/>\nThe schema is not available.<br \/>\nJDBC &amp; ODBC connections are not permitted.<br \/>\nStored Procedures are not available.<br \/>\nUser Administration APIs (Application Programming Interface) are not available.<br \/>\nAPI (Application Programming Interface) access is logged in a central elastic instance.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do microlise apps support saml or oidc?&#8221; tab_id=&#8221;1675265645216-d935aae3-fce7&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The integration protocol that we use with a customer&#8217;s own identity provider for our Execution Board is SAML 2.0.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Breach &amp; incident management&#8221;][vc_tta_section title=&#8221;Does microlise have a policy for all employees and contractors to report violations of information security policies and procedures without fear of recrimination?&#8221; tab_id=&#8221;1675266380595-13568b32-40ce&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. A policy and clear guidelines are available to all employees and contractors, describing the process for reporting violations of IS policies and other forms of breach and incident.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;If an information security breach involving a client&#8217;s data occurred, would the client be notified of the breach?&#8221; tab_id=&#8221;1675266380622-06969dea-9ca1&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The customer is to be notified within 72 hours of initial detection and communicated with throughout the incident management process.<\/p>\n<p style=\"text-align: left;\">A copy of the incident management policy &amp; process can be made available upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have procedures for information security incident management that include detection, resolution, and recovery?&#8221; tab_id=&#8221;1675266380678-4c5c97d5-d0b1&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy that is documented and maintained. This includes what happens when there is suspicion or identification of a security incident, how this is reported through Microlise and how the risk is isolated until resolved.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have procedures and responsibilities for incident response planning and management?&#8221; tab_id=&#8221;1675266380700-3dae124f-e524&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a full complement of policies and procedures in place to fully manage and plan incident response. A copy of the relevant documents can be provided upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do microlise have procedures for monitoring, detecting, analysing and reporting of information security events and incidents?&#8221; tab_id=&#8221;1675266581730-a27c2db8-41ac&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. We have policies and procedures for the effective logging, monitoring, detection, analysis and reporting of security events and incidents and the incident management activities relating to them. The TMC product has logging, and audit trails built in to show access. A copy of the relevant documents can be provided upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do microlise have procedures for handling (storage, transmission, transportation, retention and disposal) of forensic evidence?&#8221; tab_id=&#8221;1675266608538-56670309-67f2&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. These form part of our wider policies and procedures around incident management. Copies of the relevant documents are available upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have formal procedures for response to escalations, controlled recovery for incidents, and\/or communication to internal or external people or organisations?&#8221; tab_id=&#8221;1675266644475-4a2876eb-d4f2&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. These form part of our wider policies and procedures around incident management. Copies of the relevant documents are available upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise monitor network behaviour and analyse events for potential incidents?&#8221; tab_id=&#8221;1675266689509-ac850da1-106b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise utilise various monitoring tools and analyse and record the events they generate.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Business continuity &amp; disaster recovery&#8221;][vc_tta_section title=&#8221;Does microlise have business continuity and disaster recovery plans?&#8221; tab_id=&#8221;1675266754053-2c0e40e1-4007&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes, Microlise has both a business continuity plan and a disaster recovery plan.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What contingency plans do microlise have to back up customer data?&#8221; tab_id=&#8221;1675266754087-3f045716-7378&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">We have scheduled offline backups that are stored securely and are tested regularly.<br \/>\nVideo files are backed up daily and retained for 12 months.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy for data loss prevention?&#8221; tab_id=&#8221;1675266754121-1f7cd68e-6fb5&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy that defines what information may be released and implement controls and monitoring to control the flow of data within the network and detect the unauthorised release of sensitive information.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Certifications&#8221;][vc_tta_section title=&#8221;What certifications does microlise hold?&#8221; tab_id=&#8221;1675266981299-b87fd6b6-0460&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li style=\"text-align: left;\">ISO\/IEC 27001:2013 (INFORMATION SECURITY MANAGEMENT SYSTEMS)<\/li>\n<li style=\"text-align: left;\">ISO\/IEC 20000-1:2011 (INFORMATION TECHNOLOGY \u2014 SERVICE MANAGEMENT)<\/li>\n<li style=\"text-align: left;\">ISO 9001:2015 (QUALITY MANAGEMENT SYSTEMS)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Auditing &amp; vulnerability scanning&#8221;][vc_tta_section title=&#8221;Do microlise conduct regular reviews of effectiveness, undertaken using the results of audits, incidents, measurements and feedback from interested parties?&#8221; tab_id=&#8221;1675267294951-380ea0fa-183a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. All controls and areas are audited for compliance at least annually. Results of these audits, along with any external audits, incident reports, tests, and feedback from interested parties are logged to aid in the continuous improvement of our processes and procedures.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise allow clients the right to audit their systems and controls?&#8221; tab_id=&#8221;1675267295010-812da675-361a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. We allow clients the right to auditing under the Master Service Agreement (MSA).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise receive a statement on standards for attestation engaements (ssae-16 soc) report? if yes, what type?&#8221; tab_id=&#8221;1675267295069-f8885966-5f3d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">No. Microlise own and operate all equipment in the secure data centres &#8211; which are covered under the ISO27001 certificate. The data centre providers have an SOC report which is available upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy to ensure regular, formal information security related reporting?&#8221; tab_id=&#8221;1675267295105-108b91b3-617d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes, regular formal reporting arrangements are in place at board level or an equivalent senior responsible role.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is regular network vulnerability scanning performed?&#8221; tab_id=&#8221;1675267295136-4620e8bf-a058&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. A summary of recent test findings and remedial action can be made available on request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Data handling&#8221;][vc_tta_section title=&#8221;Do microlise applications store, process, access, or share customer data?&#8221; tab_id=&#8221;1675267525825-88e85e6e-f11d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Data provided by the client, in combination with publicly available data, is used for the telematics process. The relevant data for backup\/disaster recovery and any relevant statistical analysis are stored as per our data handling policy and the contract agreed with the specific client.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Which classification(s) of data does microlise use?&#8221; tab_id=&#8221;1675267525862-7baa329b-5ca3&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Microlise uses <strong>Public<\/strong> &amp; <strong>Internal<\/strong> data. The definitions are listed below:<\/p>\n<ul>\n<li style=\"text-align: left;\"><strong>Public data<\/strong>: This type of data is freely accessible to the public (i.e., all employees\/company personnel). It can be freely used, reused, and redistributed without repercussions. An example might be first and last names, job descriptions, or press releases.<\/li>\n<li style=\"text-align: left;\"><strong>Internal data<\/strong>: This type of data is strictly accessible to internal company personnel or internal employees who are granted access. This might include internal-only memos or other communications, business plans, etc<\/li>\n<li style=\"text-align: left;\"><strong>Confidential: <\/strong>Data is only to be shared held and processed by parties given access be the data owner.<\/li>\n<li style=\"text-align: left;\"><strong>Secret: <\/strong>Data is held at a need to know, need to hold basis. Compromise of this data could lead to a negative impact with regards to company\u2019s reputation, legal action, or financial loss.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise replicate data to locations outside of the eea?&#8221; tab_id=&#8221;1675267525900-47fdfe5e-98bb&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">No. However, Microlise DBA &amp; TechOps staff in Pune will have access to support the service.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise outsource its data storage?&#8221; tab_id=&#8221;1675267525937-ca13eaa7-b43c&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">No. Microlise have two UK based Data Centres, all equipment is owned and operated by Microlise Ltd.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise use encryption technologies?&#8221; tab_id=&#8221;1675267525976-573c873c-fd6a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise uses encryption technologies per industry governing standards, to protect the confidentiality of sensitive information both at rest and during transmission.<\/p>\n<p style=\"text-align: left;\">Data at rest is encrypted using AES256 encryption.<br \/>\nData in transit is encrypted using SIPs (HTTPS, SFTP, etc.).<br \/>\nAll Microlise databases use only secure connections and their associated log files are encrypted with a key.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Where is the camera footage data stored?&#8221; tab_id=&#8221;1675267779304-f5a147ae-5a5e&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Camera footage is stored securely on the DVR servers, on Enterprise level SANs located in our London data centres.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What security measures are in place to keep camera footage secure?&#8221; tab_id=&#8221;1675267864608-b8ee5738-d95a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Video files are encrypted at rest. Access control to the DVR servers and role-based authentication in the Microlise WebPortal prevents unauthorised access to the videos.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have and follow a secure data destruction policy for confidential data and it equipment?&#8221; tab_id=&#8221;1675267899511-73e161dc-90fa&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. This service is contracted through a third party vendor. Full details of the policies and process can be provided upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy for storing, accessing and handling sensitive information securely?&#8221; tab_id=&#8221;1675267925312-bde741b8-50de&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy and has designated roles within the organisation that guide managers, users and service providers on the individual responsibilities and the specific procedures that should be followed.<\/p>\n<p style=\"text-align: left;\">Any bulk data transfers are subject to formal approval before release and are done using only secure and approved communication channels.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What checks have been made to ensure you are collecting the minimum amount of data necessary for a project?&#8221; tab_id=&#8221;1675267964460-0077d4e8-c446&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Only data captured is to be able to set up profiles for users and drivers and tracking data is taken from customer equipment. Driver name and performance can be used in the Microlise driver of the year award (customer can choose to opt out).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Microlise employee security&#8221;][vc_tta_section title=&#8221;Does microlise have security measures in place for data protection?&#8221; tab_id=&#8221;1675268295833-a264b85f-ce60&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Full details of the policies and procedures can be provided upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do you have a member of microlise acting in the capacity of data protection officer (dpo), or a member of microlise\/a third party who advises you on data protection requirements, operation and compliance?&#8221; tab_id=&#8221;1675268295876-a98dcd35-1e29&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes, there is a Data Protection Lead appointed within Information Security Department. DPO is provided by a third party.<br \/>\nYou can reach the information, and data protection contacts via email at <a href=\"mailto:informationsecurity@microlise.com\">informationsecurity@microlise.com<\/a>.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is microlise going to store or process personally identifiable information where the customer is named as the \u2018data controller\u2019 as defined in regulation (eu) 2016\/679 of the european parliament aka general data protection regulation (gdpr)?&#8221; tab_id=&#8221;1675268295918-68e535a4-f67b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Depending on the contract with the client and the services being provided, PII (Personally Identifiable Information) involved may include:<\/p>\n<ul style=\"text-align: left;\">\n<li>Driver name\/ID (as supplied by the client)<\/li>\n<li>Geolocation of driver, and\/or<\/li>\n<li>Geolocation and information relating to other individuals (if supplied by the client).<\/li>\n<li>Driver contact details (Phone number, email address)<\/li>\n<li>Client customer details (Name\/ID, address, phone number, email address)<\/li>\n<\/ul>\n<p style=\"text-align: left;\">PI (Personal Information) &amp; PII are only collected, stored, and processed where they are provided by the client and the client has expressly requested the use of such information.<\/p>\n<p style=\"text-align: left;\">Microlise does not collect, process, or store Payment Card Information (PCI).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise implement controls to segregate different customer\u2019s data?&#8221; tab_id=&#8221;1675268295959-0f08d0e0-925d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Each customer has their own secure database instance, as well as a separate front end and middleware using virtualisation to provide the separation.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Data protection&#8221;][vc_tta_section title=&#8221;Does microlise have a policy for verifying an individual\u2019s credentials prior to their employment?&#8221; tab_id=&#8221;1675268539334-95d3058c-7c9f&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy that complies with our legal requirements. Microlise conducts DBS checks on all employees prior to commencement of employment, and where employees are granted privileged access, Microlise will establish additional trustworthiness, e.g., through the length of service, risk assessment or managerial sign-off.<\/p>\n<p style=\"text-align: left;\">For employees working on relevant contracts, BPSS is also used, and a number of those employees also hold SC.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a disciplinary process in place to ensure that action is taken against those who violate security policy or procedures?&#8221; tab_id=&#8221;1675268539384-e3ba276c-4b0a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a formal process, which is regularly reviewed and communicated to employees.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise ensure that personnel with information security responsibilities are provided with suitable training?&#8221; tab_id=&#8221;1675268748769-deb8b4b8-d751&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise defines minimum skillsets for specific roles and have a continuous education process in place to ensure that our employees meet or exceed these requirements.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do all staff receive information security awareness training?&#8221; tab_id=&#8221;1675268539427-26c015bb-ea03&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. All staff are required to undergo mandatory Information Security and GDPR\/Data Protection training every 2 years, along with a full awareness program that is administered throughout the year.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy to secure organisational assets when individuals cease to be employed?&#8221; tab_id=&#8221;1675268539473-5cf30c02-e71d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. All assets are required to be returned and the employee loses their access to all Microlise systems upon the termination of their employment.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Physical security&#8221;][vc_tta_section title=&#8221;How is data processing equipment (servers and network equipment) physically protected against unauthorised access and other risks such as accidental damage?&#8221; tab_id=&#8221;1675268790589-5f850b3b-52ff&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Customer data is stored in the secure space at Microlise\u2019s two UK-based data centres which can only be physically accessed by authorised personnel.<\/p>\n<p style=\"text-align: left;\">Our contract with our data centre provider includes secure dedicated suite space, power, cooling, IP internet connectivity, DC &#8211; DC connectivity and remote hands\/eyes support as well as protection against fire and flood.<br \/>\nTests on the physical security features are conducted in line with Tier 3\/4 data centre requirements.<br \/>\nMicrolise own and operate all the active hardware within the data centres.<br \/>\nCertificates of compliance for Microlise\u2019s data centres can be provided on request.<\/p>\n<p style=\"text-align: left;\">Microlise\u2019s on-site technical facilities are restricted to a similar standard with restricted access card keys, round the clock monitoring and air cooling\/fire suppression\/flood prevention. Further details of Microlise\u2019s on-site security measures can be provided upon request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is there a process for secure disposal of both it equipment and media?&#8221; tab_id=&#8221;1675268790654-62e042b8-612a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy for the secure disposal of documents and devices which applies to both in the office and working remotely.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Risk management&#8221;][vc_tta_section title=&#8221;What financial insurance do you carry to cover any potential loss\/costs of our data?&#8221; tab_id=&#8221;1675269623508-aa307d4a-0f11&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Microlise holds Public &amp; Products Liability Insurance.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise use an appropriate and repeatable information security risk assessment process?&#8221; tab_id=&#8221;1675269623561-e8c59605-5bf8&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. These are formalised in accordance with and form part of corporate policy, and the criteria for performing information security risk assessments. Acceptable levels of risk are also defined and documented.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise manage vulnerabilities for which there are no countermeasures?&#8221; tab_id=&#8221;1675269764749-b79346f9-18a5&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise also manages risks to legacy systems, where possible isolating these systems, and\/or providing additional protective controls and monitoring until they can be updated\/replaced.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Ict systems &amp; controls&#8221;][vc_tta_section title=&#8221;Does microlise maintain the scope and configuration of the information technology estate?&#8221; tab_id=&#8221;1675269951618-59f43d81-55b7&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a verified understanding of the size and topology of our corporate networks. We have a register of all assets that is regularly reviewed.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy to control the exchange of information via removable media?&#8221; tab_id=&#8221;1675269951683-a30a8a8b-413a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise assesses the risks of the use of removable media and are managing it with a policy that is documented and maintained.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is antivirus software installed and running on data processing servers and updated with new signatures as released?&#8221; tab_id=&#8221;1675269951749-133414b9-860c&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. All devices within Microlise\u2019s network have antivirus and antimalware technologies installed and these are regularly updated and patched.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are network boundaries protected by firewalls?&#8221; tab_id=&#8221;1675270055575-1d861b0a-1589&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Firewalls are regularly monitored for any suspicious activity to further mitigate risks posed by outsider threats.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are intrusion detection systems (ids) or intrusion prevention systems (ips) used by microlise?&#8221; tab_id=&#8221;1675270115167-a2538051-5043&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. IPS\/IDS modules are installed to enterprise firewalls and our external F5 Silverline WAF, and we block known suspicious network behaviour and direct all outgoing traffic through an authenticated proxy server.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are system and security patches applied to workstations &amp; servers on a routine basis?&#8221; tab_id=&#8221;1675270182249-07217e23-b65c&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. We routinely patch workstations and laptops; critical server patches are applied to mitigate vulnerability as required to counter the risk.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are computer systems (servers) backed up according to a regular schedule?&#8221; tab_id=&#8221;1675270214566-f0b0f67e-e16d&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a verified back up process.<br \/>\nThe backups are encrypted, stored offsite &amp; tested every 4 weeks.<br \/>\nThe encryption keys are not rotated.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy to control the use of authorised software?&#8221; tab_id=&#8221;1675270247155-2c111841-b284&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy, and we maintain a list of software that is authorised for use.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Access control&#8221;][vc_tta_section title=&#8221;Does microlise have a policy to control access to information and information processing facilities?&#8221; tab_id=&#8221;1675271022698-81886b19-22d7&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has formal access and handling &#8211; storage, transmission, transportation, retention, and disposal &#8211; procedures based on our classification scheme, and a policy that is documented and maintained.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy to manage the access rights of user accounts?&#8221; tab_id=&#8221;1675271022765-06888393-19da&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has an access control policy which covers how we establish appropriate user access rights, to ensure that users only have access to information necessary for them to perform their role. Access rights are granted on a &#8216;least privilege&#8217; basis and all users are provided with a unique log-in ID when accessing data.<\/p>\n<p style=\"text-align: left;\">Role based access is applied in customer https portals which is set via configuration and managed by the customer.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy for ensuring that sensitive information is clearly identified?&#8221; tab_id=&#8221;1675271022829-afd70416-614f&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise identify such information and apply a formal classification scheme in accordance with our policies or regulatory requirements and communicate this to all staff to ensure they clearly understand the scheme and their responsibilities for ensuring it affords appropriate protection to sensitive information.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is there formal control of access to system administrator priveleges?&#8221; tab_id=&#8221;1675271022890-0e7f1db7-bfd9&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. SysAdmin privileges are controlled via IPSec VPN to HQ, then secure tunnels to the data centres.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are servers configured to capture who accessed the system and what changes were made?&#8221; tab_id=&#8221;1675271022972-e7f342aa-68dd&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Logs are kept for up to 90 days and a log correlation tool is used. A SIEM (Security Information and Event Management) solution is not currently in place but is planned for implementation in 2023. Alerts are monitored by ServiceDesk, TechOps &amp; SRE, with critical alerts monitored 24\/7. No other logging is used to identify IOC.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are employees required to use a vpn when accessing microlise\u2019s systems from all remote locations?&#8221; tab_id=&#8221;1675271023057-7494150c-942b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The VPN does not require two-factor authentication (2FA) but the devices themselves require 2FA before the VPN can be accessed.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Is wireless access allowed in microlise?&#8221; tab_id=&#8221;1675271023131-c5316feb-20b9&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Data centres have no Wi-Fi access. For Microlise business employees, Wi-Fi access is controlled by Business Systems Team.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a policy which details specific employee and contractor responsibilities for information security before granting access to sensitive assets?&#8221; tab_id=&#8221;1675271023190-59020d99-0b94&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has a policy and require confirmation before granting access.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise ensure that administrative access is performed over secure protocols using multi-factor authentication (mfa)?&#8221; tab_id=&#8221;1675271023247-a5f24fd9-a333&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. MFA protocol is in place.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Has microlise defined and implemented a policy for monitroing account usage and managing changes to access rights?&#8221; tab_id=&#8221;1675271023311-c68effc1-866b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise actively control user access to user accounts through a corporate-wide, technically enforced mechanism such as the use of a mandatory password complexity algorithm, with managers actively matching staff with existing accounts. We monitor compliance to acceptable use policies and procedures through technical controls.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise control remote access to its networks and systems?&#8221; tab_id=&#8221;1675271023381-e89bdb78-933e&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise control access to our networks and systems by ensuring that those approved to connect do so using approved mechanisms and devices. We actively confirm right to access, verify end point security, and identify before connection is completed.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What audit system is in place to assess who has accessed the data?&#8221; tab_id=&#8221;1675271023444-f83f4676-7783&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">System access is managed on a \u2018least privileged\u2019 basis for Microlise employees i.e., Access is managed based on role within the organisation. System monitoring is in place across the Microlise systems. Logs are held for a period of 12 months.<br \/>\nFront end log in activity is captured in audit tables and database access logs are obtainable from the DBA\u2019s. There are several logs in place that record session and user activity within the Web Application. Some web activity logs are held for 60 days, others within the retention period of the database (typically 90 days) or available from database backups if older than 90 days. We have several audit tables \/ columns in our databases for when things are changed, where the last timestamp and user will be recorded if a change to data is made directly. We also only allow edit access to database to a limited number of internal users. This is managed via Active Directory. Worth noting all data is stored in the Data Centres.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Change management&#8221;][vc_tta_section title=&#8221;Does microlise have a formal change control process for it changes?&#8221; tab_id=&#8221;1675271799825-7717270e-b9a0&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Formal process in place utilising Service Now application. Further details on the process can be provided on request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;General information security (is)&#8221;][vc_tta_section title=&#8221;Does microlise have an approved information security policy in place?&#8221; tab_id=&#8221;1675270414860-88d3c3cc-ac58&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes, Microlise has a documented and maintained policy that considers as a minimum the following areas: information risk management regime, network security, user education and awareness, malware prevention, removable media controls, secure configuration, managing user privileges, incident management, monitoring, and home and mobile working (and physical security).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are employee and contractor responsibilites for information security formally defined?&#8221; tab_id=&#8221;1675270414954-cdc7105d-4366&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. In the general terms and conditions of employment and\/or corporate policy. (For the avoidance of doubt this should cover full-time employees, contractors, and agency staff).<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are information security relevant roles identified and responsibilities assigned within microlise?&#8221; tab_id=&#8221;1675270415017-5d532a84-2b5a&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Roles and responsibilities have been assigned and are formalised in accordance with and form part of corporate policy.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have formal written information security policies?&#8221; tab_id=&#8221;1675270415069-748a01f0-2c03&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Further details on any specific policies can be provided on request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise ensure that asset owners are identified and that they control access to these assets?&#8221; tab_id=&#8221;1675270415124-4b1712b5-56f9&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Microlise has an inventory of our organisation&#8217;s assets and ensure that all information-related assets have a defined owner who ensures that, where appropriate, assets have rules for their acceptable use.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Do you have a member of microlise with dedicated information security duties?&#8221; tab_id=&#8221;1675270415294-8baf5865-f555&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The Information Security Department can be reached at <a href=\"mailto:informationsecurity@microlise.com\">informationsecurity@microlise.com<\/a>.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Passwords security&#8221;][vc_tta_section title=&#8221;Does microlise have a policy and deploy technical measures to maintain the confidentiality of passwords?&#8221; tab_id=&#8221;1675271888311-68d01b8a-4dfc&#8221;][vc_column_text]Yes. In addition, we ensure that password files can only be accessed by administrators with the business need and permissions to do so.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have a written password policy that details the required structure of passwords?&#8221; tab_id=&#8221;1675271888387-a594e304-88a0&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Further details on this policy can be provided on request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have any measures in place to verify password strength?&#8221; tab_id=&#8221;1675271888451-d5200a5e-7c9e&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. Customer passwords are configured within the HTTPS secure portal.<\/p>\n<p style=\"text-align: left;\">For Microlise employees, there is a policy and process in place. Further details of the policy can be provided on request.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What are the minimum amount characters technically enforced for customer account passwords.&#8221; tab_id=&#8221;1675271888541-954c1a49-cd5b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">TMC is configurable and supports federated SSO to allow the customer to tie in with their identity provider.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Third parties, suppliers &amp; subcontractors&#8221;][vc_tta_section title=&#8221;Does microlise define and implement a policy that addresses information security risks within supplier relationships?&#8221; tab_id=&#8221;1675272015267-b56ae179-7f26&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. It ensures that all relevant &#8216;cyber standards&#8217; required through contracts or regulation are flowed down. We also have additional requirements that are flowed down as required.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does microlise have controls in place to ensure that any sub-processors return or delete customer data once the processing activities have concluded?&#8221; tab_id=&#8221;1675272015339-2d56266c-3ae7&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: left;\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">A list of sub-processors available on request.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;Schedule execution board (seb) tool&#8221;][vc_tta_section title=&#8221;How do users access the schedule execution board tool?&#8221; tab_id=&#8221;1707391357430-89190a16-4bc3&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">User authentication takes place in the application itself against a local user store.<\/p>\n<p style=\"text-align: left;\">If a customer is on the Microlise Identity Provider platform, then Single Sign On (SSO) integration with their preferred identity provider can be implemented.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Are there multiple levels of access within the seb? e.g. are there some users who have superuser access or other enhanced permissions?&#8221; tab_id=&#8221;1675272083779-17353954-4d7b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">The level of access of individual users at the customer end is controlled by the customer. There are options for varied levels of access, depending on requirement.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Does the seb support saml 2.0 for sso?&#8221; tab_id=&#8221;1675272167631-3fb0130b-c36f&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Yes. The Microlise Identity Provider platform supports SAML 2.0<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Who can advise on what information would need to be shared between the seb mobile app and the clients idp server?&#8221; tab_id=&#8221;1675272197291-9486184f-838b&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\">Our Federated Identity Management Integration Guide states our current capability in this area.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_tta_accordion title_tag=&#8221;h3&#8243; section_title_tag=&#8221;h6&#8243; style=&#8221;flat&#8221; color=&#8221;white&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; title=&#8221;General business information&#8221;][vc_tta_section title=&#8221;Is microlise classed as an sme?&#8221; tab_id=&#8221;1675246789095-d9a9509b-2bce&#8221;][vc_column_text] No. Microlise Group Ltd is not classed as an SME (Small and Medium Sized Enterprise) under the EU definition as it has greater than 250 employees. [\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;What is microlise\u2019s companies house number?&#8221; tab_id=&#8221;1675254973543-73b53052-fbaf&#8221;][vc_column_text] Microlise Group Ltd&hellip; <\/p>\n","protected":false},"author":4,"featured_media":40940,"parent":0,"menu_order":50,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-46669","page","type-page","status-publish","has-post-thumbnail","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>FAQs - Microlise Australia<\/title>\n<meta name=\"description\" content=\"2 February 2023 - FAQs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microlise.com\/au\/faqs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQs\" \/>\n<meta property=\"og:description\" content=\"2 February 2023 - FAQs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microlise.com\/au\/faqs\/\" \/>\n<meta property=\"og:site_name\" content=\"Microlise Australia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MicroliseANZ\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-04T10:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microlise.com\/wp-content\/uploads\/2016\/10\/home-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1673\" \/>\n\t<meta property=\"og:image:height\" content=\"938\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@microliseANZ\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/\",\"url\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/\",\"name\":\"FAQs - Microlise Australia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microlise.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/home-banner.jpg\",\"datePublished\":\"2023-02-02T14:06:01+00:00\",\"dateModified\":\"2025-07-04T10:38:29+00:00\",\"description\":\"2 February 2023 - FAQs\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microlise.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/home-banner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microlise.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/home-banner.jpg\",\"width\":1673,\"height\":938,\"caption\":\"Cutting-edge telematics and fleet tracking solutions from Microlise help logistics companies improve efficiency, safety, and compliance through advanced vehicle telemetry technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/faqs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FAQs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#website\",\"url\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/\",\"name\":\"Microlise Australia\",\"description\":\"Telematics, Transport &amp; Fleet Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#organization\"},\"alternateName\":\"Microlise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#organization\",\"name\":\"Microlise\",\"alternateName\":\"Microlise\",\"url\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.microlise.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-Microlise-Logo-Primary-Electric-1.png\",\"contentUrl\":\"https:\\\/\\\/www.microlise.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-Microlise-Logo-Primary-Electric-1.png\",\"width\":235,\"height\":30,\"caption\":\"Microlise\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microlise.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/MicroliseANZ\\\/\",\"https:\\\/\\\/x.com\\\/http:\\\/\\\/twitter.com\\\/microliseANZ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/microlise\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/MicroliseLtd\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FAQs - Microlise Australia","description":"2 February 2023 - FAQs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microlise.com\/au\/faqs\/","og_locale":"en_US","og_type":"article","og_title":"FAQs","og_description":"2 February 2023 - FAQs","og_url":"https:\/\/www.microlise.com\/au\/faqs\/","og_site_name":"Microlise Australia","article_publisher":"https:\/\/www.facebook.com\/MicroliseANZ\/","article_modified_time":"2025-07-04T10:38:29+00:00","og_image":[{"width":1673,"height":938,"url":"https:\/\/www.microlise.com\/wp-content\/uploads\/2016\/10\/home-banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@microliseANZ","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.microlise.com\/au\/faqs\/","url":"https:\/\/www.microlise.com\/au\/faqs\/","name":"FAQs - Microlise Australia","isPartOf":{"@id":"https:\/\/www.microlise.com\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microlise.com\/au\/faqs\/#primaryimage"},"image":{"@id":"https:\/\/www.microlise.com\/au\/faqs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microlise.com\/wp-content\/uploads\/2016\/10\/home-banner.jpg","datePublished":"2023-02-02T14:06:01+00:00","dateModified":"2025-07-04T10:38:29+00:00","description":"2 February 2023 - FAQs","breadcrumb":{"@id":"https:\/\/www.microlise.com\/au\/faqs\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microlise.com\/au\/faqs\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.microlise.com\/au\/faqs\/#primaryimage","url":"https:\/\/www.microlise.com\/wp-content\/uploads\/2016\/10\/home-banner.jpg","contentUrl":"https:\/\/www.microlise.com\/wp-content\/uploads\/2016\/10\/home-banner.jpg","width":1673,"height":938,"caption":"Cutting-edge telematics and fleet tracking solutions from Microlise help logistics companies improve efficiency, safety, and compliance through advanced vehicle telemetry technology."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microlise.com\/au\/faqs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microlise.com\/au\/"},{"@type":"ListItem","position":2,"name":"FAQs"}]},{"@type":"WebSite","@id":"https:\/\/www.microlise.com\/au\/#website","url":"https:\/\/www.microlise.com\/au\/","name":"Microlise Australia","description":"Telematics, Transport &amp; Fleet Management Solutions","publisher":{"@id":"https:\/\/www.microlise.com\/au\/#organization"},"alternateName":"Microlise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microlise.com\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.microlise.com\/au\/#organization","name":"Microlise","alternateName":"Microlise","url":"https:\/\/www.microlise.com\/au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.microlise.com\/au\/#\/schema\/logo\/image\/","url":"https:\/\/www.microlise.com\/wp-content\/uploads\/2024\/06\/cropped-Microlise-Logo-Primary-Electric-1.png","contentUrl":"https:\/\/www.microlise.com\/wp-content\/uploads\/2024\/06\/cropped-Microlise-Logo-Primary-Electric-1.png","width":235,"height":30,"caption":"Microlise"},"image":{"@id":"https:\/\/www.microlise.com\/au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MicroliseANZ\/","https:\/\/x.com\/http:\/\/twitter.com\/microliseANZ","https:\/\/www.linkedin.com\/company\/microlise","https:\/\/www.youtube.com\/user\/MicroliseLtd"]}]}},"cmb2":{"microlise_home_banner_metabox":{"microlise_home_banner_title":"","microlise_home_banner_content":"","microlise_home_banner_image":"","microlise_home_banner_image_id":"","microlise_home_banner_vtype":"","microlise_home_banner_VID":"","microlise_home_banner_Vcode":"","microlise_home_banner_cta":"","microlise_home_banner_hctatxt":"","microlise_home_banner_hctaurl":"","microlise_home_banner_hctabgcolor":"","microlise_home_banner_hctatcolor":"","microlise_home_banner_hctatxt2":"","microlise_home_banner_hctaurl2":"","microlise_home_banner_hctabgcolor2":"","microlise_home_banner_hctatcolor2":""},"microlise_home_customersmetabox":{"microlise_home_customers_title":"","microlise_home_customers_logo":""},"microlise_home_infometabox":{"microlise_home_info_title":"","microlise_home_info_details":""},"microlise_home_product_metabox":{"microlise_home_product_details":""},"microlise_home_awards_metabox":{"microlise_home_awards_title":"","microlise_home_awards_sub_text":"","microlise_home_awards_logo":"","microlise_home_awards_logo_id":"","microlise_home_awards_link":"","microlise_home_awards_button":""},"microlise_home_faq_metabox":{"microlise_home_faq_title":"","microlise_home_faq_details":""},"microlise_page_metabox":{"microlise_page_title":"","microlise_page_use_title":"","microlise_page_btext":"","microlise_page_cta":"","microlise_page_hctatxt":"","microlise_page_hctaurl":"","microlise_page_hctabgcolor":"#01CBDE","microlise_page_hctatcolor":"#151D25","microlise_page_hctatxt2":"","microlise_page_hctaurl2":"","microlise_page_hctabgcolor2":"","microlise_page_hctatcolor2":"#151D25","microlise_page_video":"","microlise_page_vtype":"","microlise_page_VID":"","microlise_page_Vcode":""},"microlise_page_pometabox":{"microlise_page_embed":""},"microlise_page_fleet_metabox":{"microlise_page_fleet_case_study":"","microlise_page_fleet_cimage":"","microlise_page_fleet_cimage_id":"","microlise_page_fleet_ctitle":"","microlise_page_fleet_ct_color":"","microlise_page_fleet_ccontent":"","microlise_page_fleet_ccontent_color":"","microlise_page_fleet_crbtn_text":"","microlise_page_fleet_crbtn_link":"","microlise_page_fleet_crbbgcolor":"","microlise_page_fleet_crbtcolor":"","microlise_page_fleet_crbgcolor":"","microlise_page_fleet_brochure":"","microlise_page_fleet_brtype":"","microlise_page_fleet_bimage":"","microlise_page_fleet_bimage_id":"","microlise_page_fleet_btitle":"","microlise_page_fleet_bt_color":"","microlise_page_fleet_bcontent":"","microlise_page_fleet_bcontent_color":"","microlise_page_fleet_brbtn_text":"","microlise_page_fleet_brbbgcolor":"","microlise_page_fleet_brbtcolor":"","microlise_page_fleet_brbgcolor":"","microlise_page_fleet_hide_brochure":"","microlise_page_fleet_rimage":"","microlise_page_fleet_rimage_id":"","microlise_page_fleet_rtitle":"","microlise_page_fleet_rt_color":"","microlise_page_fleet_rcontent":"","microlise_page_fleet_rcontent_color":"","microlise_page_fleet_rebgcolor":"","microlise_page_fleet_rebtn_text":"","microlise_page_fleet_hide_report":"","microlise_page_fleet_benefit":"","microlise_page_fleet_bctatxt":"","microlise_page_fleet_bctaurl":"","microlise_page_fleet_bctabgcolor":"","microlise_page_fleet_bctatcolor":"","microlise_page_fleet_benefits":"","microlise_page_fleet_feature":"","microlise_page_fleet_features":"","microlise_page_fleet_anfeature":"","microlise_page_fleet_anfeatures":"","microlise_page_fleet_thirdfeature":"","microlise_page_fleet_thirdfeatures":"","microlise_page_fleet_faq":"","microlise_page_fleet_faqtitle":"","microlise_page_fleet_faqs":"","microlise_page_fleet_strip":"","microlise_page_fleet_stitle":"","microlise_page_fleet_sbtntext":"","microlise_page_fleet_sbtnurl":""}},"_links":{"self":[{"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/pages\/46669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/comments?post=46669"}],"version-history":[{"count":0,"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/pages\/46669\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/media\/40940"}],"wp:attachment":[{"href":"https:\/\/www.microlise.com\/au\/wp-json\/wp\/v2\/media?parent=46669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}