Contacts
TG Online

Security and Compliance

Protected. Verified. Trusted.
Ensure asset data integrity and meet global industry standards.

Security and Compliance Overview

Security and Compliance covers TG Tracking’s foundational approach to protecting your devices, data, and operations. We enforce rigorous standards and global certifications so you can deploy with confidence and comply with regulations.
Through encryption, audit trails, role-based access, and certified processes, the platform safeguards both your physical and digital assets.

Core Features

AES-256 Encryption

Data is encrypted at rest and in transit using AES-256 and TLS protocols to protect against unauthorised access.

ISO/IEC 27001 Certification

The partner platform (Digital Matter) achieved ISO/IEC 27001:2022 certification on 11 Feb 2025, reinforcing structured security controls.

Role-Based Access Control (RBAC)

Access rights are defined per role (admin, installer, client) to limit exposure and reduce risk of internal misuse.

Audit Logging & Traceability

Every command, configuration change, login or data export is timestamped, logged and searchable for compliance.

Firmware & Device Integrity Management

Remote OTA updates are managed securely with signatures and version validation to prevent tampering.

Data Sovereignty & Regional Compliance

Tracking data can be segmented, stored and processed in required jurisdictions to meet regional regulations.

Technical Details

AES-256 Encryption

All device streams and cloud storage use AES-256 encryption. TLS 1.3 secures device-to-cloud communication. Key rotation and hardware key management modules ensure cryptographic hygiene.

ISO/IEC 27001 Certification

Achieved by Digital Matter, this certification confirms an established Information Security Management System (ISMS) aligned to global best practice.

RBAC Implementation

Roles are defined in the platform: Admin, Installer, Support, Client. Permissions are tagged and inherited; actions by each role are restricted by tag, region or fleet group.

Audit Logging

Logs include actor ID, target ID, action, timestamp, and result. Logs are exportable for third-party audits and retained according to retention policies.

Firmware Integrity Management

Devices receive signed firmware packages and verify signatures before applying updates. Failures trigger rollback and alert generation.

Data Sovereignty & Compliance Controls

Data separation per tenant ensures multi-tenant isolation. Storage location options support compliance with GDPR, POPIA or other regional rules.