Fleet software needs to be ready to respond to new technological advancements as smart vehicles start to flood the market, with a primary focus on the importance of data security, says Chevin.
The company points out that autonomous and connected cars and vans are becoming increasingly popular amongst British drivers, so it’s important that fleet software adapts simultaneously in order to support increased levels of data and tighter security measures that will be needed.
Managing Director, Ashley Sowerby, said that following the release of new government guidelines that call for strict, cyber protection laws when engineering new autonomous vehicles, fleet software providers will also need to step-up a gear to ensure that it’s possible to keep secure management of all data that is produced.
“There are many important factors businesses need to consider when managing their fleet information, the first of which should be whether their software system is adequately secure. Official accreditations, such as ISO 27100 formally acknowledge that providers are committed to data protection issues, and software companies should also be striving to achieve these accreditations if they don’t already have them in place.
“Hierarchical user permissions within a system are also essential in order to control who has access to certain levels of data. Drivers, for example, will not need access to the same level of intelligence as fleet managers, and authorisation should depend on job role versus data sensitivity.”
1 Million strong
Ashley added that data analysis and security is paramount in the face of an autonomous future and, due to the complexity of the matter, this is something that businesses and software providers alike should be considering now.
“Chevin currently holds operational data on more than 1,000,000 vehicles that are managed via its FleetWave software, and it is our responsibility to ensure that our database has the appropriate levels of protection and monitoring in place to prevent unauthorised access.
“The intelligence that we hold on behalf of our clients has a commercial value, and information requests from external parties is not unheard of – we of course refuse such requests, but there’s certainly an appetite for these details.
“As technology evolves even further, it’s vital that software providers develop a preventative means of deterring hackers – whether searching for vital competitive vehicle data, attempting car theft or overriding technology to inflict harm – instead of finding a later cure for any direct attacks. Our software is regularly put through penetration testing, as data security is essential for enterprise-level businesses.”