iV
iVMS
Data Governance

Your Data, Your Rules

We process sensitive transportation data at national scale. This page explains exactly where it lives, who can access it, how long we keep it, and what controls you have.

Data Jurisdiction

Where Your Data Lives

Data residency is non-negotiable. We offer regional and sovereign storage options so your data never leaves the jurisdiction you choose.

Kingdom of Saudi Arabia

PDPL, NCA ECC

Primary data residency for KSA deployments. All personal data and telemetry records remain within the Kingdom in compliance with the Personal Data Protection Law and National Cybersecurity Authority requirements.

LocationRiyadh, Jeddah
InfrastructureSovereign cloud infrastructure

European Union

GDPR, ePrivacy

Data from European operations is stored exclusively within EU borders. Standard contractual clauses govern any cross-border data flows required for global fleet management.

LocationFrankfurt, Amsterdam
InfrastructureEU-certified data centers

United Kingdom

UK GDPR, DPA 2018

UK vehicle data and enforcement records are stored domestically. Post-Brexit data adequacy mechanisms ensure compliant data exchange with EU operations when needed.

LocationLondon
InfrastructureUK sovereign cloud

Multi-Region

Client-defined

For clients with strict sovereignty requirements, iVMS supports fully on-premises deployment with no external data dependencies. Air-gapped configurations available.

LocationClient-specified
InfrastructureOn-premises or private cloud
Access Control

Roles and Access Rights

Every user is assigned a role with the minimum permissions needed to do their job. No exceptions, no shortcuts.

RoleAccess ScopeMFAAudit Level
System AdministratorCan manage users, configure modules, and access system-level settings. Cannot view raw personal data without an audited justification.Full platform configurationRequiredFull
Operations ManagerCan view dashboards, run reports, and manage workflows within assigned modules. Access is scoped to their organizational unit.Module-level operationsRequiredFull
AnalystCan view aggregated data, generate reports, and export anonymized datasets. No access to personally identifiable information.Read-only analyticsRequiredStandard
Field TechnicianCan provision, configure, and troubleshoot edge devices. No access to stored data or analytics. Sessions are time-limited.Device management onlyRequiredStandard
External AuditorTime-limited, read-only access to audit trails and compliance reports. All access is logged and automatically revoked after the audit window closes.Read-only audit logsRequiredFull
Retention Policies

How Long We Keep Data

Every data category has a defined retention period, legal basis, and anonymization timeline. Nothing is kept longer than necessary.

Data TypeRetentionLegal BasisAnonymization
Telemetry (GPS, speed, route)24 monthsOperational requirementAfter 12 months
Enforcement evidence (images, video)36 monthsLegal hold periodAfter adjudication
Payment transaction records7 yearsFinancial regulationNot applicable
Access & authentication logs24 monthsSecurity auditAfter 18 months
Personal identity dataDuration of serviceConsent / contractOn account closure
Aggregated analyticsIndefiniteNo personal dataPre-anonymized
Audit Trail

Every Action, Recorded

Our audit system captures every data interaction — who accessed what, when, and why. Logs are immutable and cryptographically secured.

Immutable Logging

Every data access, modification, and deletion is recorded in append-only logs. Records cannot be altered or purged, even by system administrators.

Tamper Detection

Cryptographic hash chains link log entries. Any attempt to modify historical records is immediately detected and flagged for investigation.

Real-Time Monitoring

Anomalous access patterns — unusual query volumes, off-hours access, bulk exports — trigger automatic alerts to the security operations center.

Exportable Reports

Audit logs can be exported in structured formats for regulatory submissions, external audits, or integration with your own SIEM platform.

DPA

Data Processing Agreements

Every client engagement is governed by a comprehensive Data Processing Agreement. Here is what our standard DPA covers.

01Scope and purpose of data processing
02Categories of personal data processed
03Data subject rights and fulfillment procedures
04Sub-processor management and notification
05Security measures and encryption standards
06Cross-border transfer mechanisms
07Data breach notification obligations
08Data retention and deletion commitments
09Audit rights and inspection procedures
10Liability and indemnification terms

Need a DPA for Your Procurement?

Download our standard DPA template or request a custom version tailored to your jurisdiction and regulatory requirements.

Download DPA Template
FAQ

Data Governance Questions

Common questions about how we manage, protect, and govern your data.

Yes. At deployment time, you select your primary data jurisdiction. We support Saudi Arabia, EU, UK, and on-premises options. Data will never leave your chosen jurisdiction without explicit contractual agreement and appropriate transfer mechanisms.

Deletion requests are processed within 30 days. Our system identifies all instances of the data subject's information across modules, removes identifiable data, and provides a deletion certificate. Aggregated, anonymized data derived from the original records is retained for analytics.

We maintain a public sub-processor list that is updated whenever a new sub-processor is engaged. Clients are notified 30 days before any new sub-processor begins processing their data, with the right to object.

Yes. Our DPA includes audit rights. You can conduct on-site or remote audits of our data processing facilities and practices. We also provide annual third-party audit reports (SOC 2, ISO 27001) that satisfy most audit requirements without requiring a dedicated visit.

Upon contract termination, we provide a complete data export in standard formats within 30 days. After the export period, all client data is permanently deleted from our systems, including backups, within 90 days. A certificate of destruction is provided upon completion.

Ready to Review Our Data Practices?

Download our standard DPA template or schedule a call with our data protection team to discuss your specific requirements.