Security Policy

Enterprise security standards and compliance measures for the TelemetryOS platform

Effective Date: November 10, 2025

TelemetryApp Services Inc., doing business as TelemetryOS, centers its information security policy on protecting the confidentiality, integrity, and availability of customer data collected through the TelemetryOS application and through the TelemetryOS Application Programmers Interface (API). To achieve this goal TelemetryOS implements an in-depth strategy organized into 10 control objectives:

1. Maintain a secure network architecture to protect customer data

Comprehensive steps are taken to ensure that our network infrastructure is secured and attack surfaces are limited.

2. Ensure systems that store or process customer data are properly configured and adequately hardened

Data storage is stored in secure facilities with proper access control.

3. Protect customer data during transmission across the network and during storage

All data between users and TelemetryOS's data centres is sent over SSL HTTPS encrypted connections.

4. Develop and maintain secure systems

Software that runs critical infrastructure is patched regularly, continuously monitored for vulnerabilities, and updated through managed change control processes.

5. Develop and maintain secure applications

TelemetryOS's applications are tested for security compliance to ensure that security vulnerabilities are found and patched and steps are taken to minimize their occurrence.

6. Use strong access control measures

Access to customer data is limited to those requiring access with strong authentication procedures including 2FA when applicable.

7. Restrict physical access to customer data

Customer data is stored in secure data centres with limited physical access.

8. Track and monitor all access to customer data

Employee and contractor access to customer data is strictly monitored to ensure compliance.

9. Regularly test security systems and processes

TelemetryOS regularly monitors security to ensure systems are not vulnerable.

10. Maintain security policies, procedures, guidelines and standards that address information security for all employees, contractors, and third parties

TelemetryOS's employees and contractors are bound to a comprehensive security policy that outlines standard operating procedures and outlines acceptable use of data.

Privacy and collection of Personally Identifiable Information (PII)

We take every precaution to safeguard customer information and to be transparent about the information that we collect. For further details on how we use this information, please refer to our privacy policy at https://telemetryos.com/privacy-policy/.