The sensors are regularly subjected to external security audits. Data transfer between sensors and the backend environment is encrypted, which prevents classic "man-in-the-middle" attacks. Access to the backend environment by our employees and our service provider is via secure communication networks.