FAQs
Answers to common questions about our intelligent vehicle ownership platform
Commercial & contractual
AutoSymmetry’s role (including whether we act as a service provider and/or handle data on behalf of a partner) is defined in the relevant agreement and consent scope. Partner data rights are preserved, and access is purpose-limited.
Yes – partners retain their underlying data rights;
AutoSymmetry operates as a processor/controlled intermediary per contract and consent.
Yes – purpose limitation is enforced via scopes
(e.g., claims handling only, service reminders only).
Partner-friendly model: initial pilot term, then annual renewal;
data export + deletion workflows on termination.
Privacy, consent, and governance
Consent is logged with scope, timestamp, user identity context, and revocation state; logs are exportable for audit.
Access is removed for that scope; downstream insights
should degrade gracefully and flag uncertainty.
Minimisation by design: store only what is required for agreed purposes; separate PII from operational signals where possible.
Yes – process supports deletion and retention rules
aligned to contractual and legal obligations.
Only as authorised by contract and consent scope;
disclosures are documented (including subprocessors).
Security & assurance
Encryption in transit (TLS) and at rest (industry standard encryption mechanisms); keys managed with strict access controls.
Role-based access control, least privilege, strong authentication, logging and monitoring.
Our security programme includes routine scanning, patch SLAs, and independent penetration testing at defined milestones.
Yes – defined triage/severity, notification procedures, and post-incident root cause process (attestation roadmap below).
Operational & technical
API-based integration patterns; supports staged onboarding
(start with one source, then add more).
Lineage + validation; conflicting signals are flagged
and resolved by confidence rules (not silent overwrites).
Define per tier; pilots commonly start with pragmatic targets
and then harden to enterprise SLAs.
Yes – start with one narrow workflow (e.g., tyre condition + service reminders) to prove value, then expand.
Compliance & audit readiness
Yes – exportable logs for consent, access, lineage,
and key decisions.
Supported by hosting configuration; specify residency
in contract and architecture.
Procurement pack includes a maintained list
and a notification/change process.
