Security Policy

Note: only the English version of this Security Policy is legally binding.

THIS SECURITY POLICY IS A LEGALLY BINDING DOCUMENT. PLEASE READ IT CAREFULLY. THIS DOCUMENT COMPLEMENT THE ENDRESS+HAUSER MASTER SERVICE AGREEMENT. BY ACCEPTING THE SECURITY POLICY, BY (1) CLICKING A BOX OR BUTTON INDICATING ACCEPTANCE, (2) PLACING AN ORDER PURSUANT TO A QUOTATION REFERING TO THIS DESCRIPTION OF SERVICE, OR (3) USING FREE SERVICE, YOU AGREES TO THE CONDITIONS DEFINED IN THIS DOCUMENT AND THE CONDITIONS SET FORTH IN THE ENDRESS+HAUSER MASTER SERVICE AGREEMENT.

1. Introduction

This security policy affects your usage of the Netilion services as described in the corresponding Definition of Services.

The security measures defined in this document are encompassing the development, operation, and further improvement of the Netilion application and infrastructure. Endress+Hauser is not responsible for any application you are using outside of the boundaries of the Definition of Service (e.g., Third-Party Application not listed on the Netilion website).

2. Shared responsibilities

This document describes how Endress+Hauser will protect your data when you are using the Netilion services. In the matter of security, the responsibilities are shared. Please read this document carefully as it contains critical information on your role in ensuring an adequate level of security for your data and the Netilion services.

3 Cyber security program

Endress+Hauser introduced a holistic cyber security program (CSP), effectively ensuring that the business processes and processed information are securely handled. For the development and operation of the Netilion services, Endress+Hauser created a dedicated Information Security Management System (ISMS) according to ISO 27001 and ISO 27017. This ISMS is certified by a third-party independent certification body. As part of the ISMS, the Secure Development Life Cycle (SDLC) follows the requirements of the IEC 62443-4-1 which is also certified by a third-party independent certification body. The certification process is evidence-based and confirm the compliance of the scope with the listed standards. The current certificate can be downloaded here: cybersecurity-certification.

4. Limitation of information

Please note that the Endress+Hauser’s information security measures aim to protect customer process and personal information and thus are not compatible with the storage of following information or information type:

  • Medical information of individuals
  • Financial information like fiscal statement or banking information other than the credit card information required for the payment of the Netilion paid services
  • Any type of cryptocurrency
  • Cryptographic keys and certificates
  • External information related to justice procedures other than event information specifically protected by Endress+Hauser
  • Any information not compliant with the Endress+Hauser terms of service or other legal agreement with Endress+Hauser

Endress+Hauser shall not be held responsible for any non-compliance issues, legal procedures or any other such incident of customer related to the storage the abovementioned information or information type.

5. Organizational controls

As part of its ISMS, Endress+Hauser developed appropriate organization and processes to ensure an adequate level of security and privacy for its processes and information handled through them. These processes are assuring that Endress+Hauser is prepared to identify treats, analyse risks, handle information in a structured way, and respond to adverse events and information security incidents properly. In these processes, Endress+Hauser will rely on your information related to vulnerabilities and information security incidents:

If you have identified or were informed of technical vulnerability which are or may be relevant for the Netilion services, please report it to our Product Security Incident Response Team through the PSIRT@endress.com email address immediately.

Endress+Hauser sets all means necessary and reasonable to protect your information and privacy, however, should you experience data breaches, e.g. finding your information on platforms not related to Netilion or by getting access to information which are not yours, please raise such incidents immediately to QM.PCPS@endress.com, mention “Data Breach” in the email object and provide as much information on the incident as you reasonably can. Such incidents will be treated rapidly and confidentially by our experts.

When planning on using the Netilion Services it is essential that you carry out a risk assessment for the entire system taking a holistic approach. Endress+Hauser implemented security controls as described in this document which should support your risk analysis.

All other Information Security incidents shall be raised via a support ticket. The condition, delay and procedure for the resolution of the incident are described in the Netilion Service Level Agreement (SLA).

On a regular basis, Endress+Hauser is conducting internal audits and penetration testing for the Netilion services. At least once a year, external certification bodies are auditing the ISMS and the security controls for conformity.

6. People controls

All the people involved in the development and operation of the Netilion services are selected by Endress+Hauser according to strict criterions, including background checks for critical positions.

No Endress+Hauser employees ever access customer data unless required to do so for support reasons, and after active sharing of the information by you. When working on a support issue we do respect your privacy; we only access the files and settings needed to resolve your issue that you shared with us. All Endress+Hauser employees with possible access to customer data are regularly trained on policies related to accessing personal data and data privacy.

For the setup of the Netilion environment, very few employees with administrative role have privileged access rights, enabling access to the backend of Netilion and therefore the customer’s information rough databases. These few admins are highly trained employees, which also signed dedicated agreements preventing them ever accessing customer’s information.

As part of its certified ISMS, all employees of Endress+Hauser are regularly trained on the information security topic.

As users of Netilion, you are responsible for the training and awareness of your employees.

7. Physical controls

Endress+Hauser physical infrastructure for the provision of the Netilion services is hosted by global leaders in the cloud computing industry. The Endress+Hauser processes ensured that the security controls set up by our partners are in line with our own security controls.

Especially, it is validated that our hosting partners are at least certified according to:

  • ISO 27001
  • ISO 27017 and ISO 27018
  • SOC2 Type 2 and/or ISAE 3402

The data centers utilized for the provision of the Netilion Services are listed in the Endress+Hauser data localization policy.

In addition to the physical access to the data processing facilities of the data hosting providers, Endress+Hauser implemented strong physical access control policies to its premises to ensure proper data security while developing the services and handling potential information.

For the achievement of adequate security level, it is necessary that you control the physical access to your assets, especially assets with direct communication capability towards Netilion such as, but not limited to edge devices, or native IIOT devices.

8. Technological controls

Endress+Hauser implemented multiple technological controls to ensure the security of the Netilion services, and the data handled herewith. This document does not aim to be an exhaustive list of all controls, the following controls shall be understood by you.

Logging and monitoring

Activities on the Netilion platform are monitored and all interactions are logged. The logging and monitoring of information happens on an anonymous basis. Endress+Hauser may use the logging information for troubleshooting and alerting means. By using the services, you acknowledge the anonymous logging of your activities on the platform.

Password handling

Netilion enforces the creation and usage of strong authentication. It is your responsibility to properly store and protect your passwords for the usage of Netilion. Your credentials are stored with strong encryption and cannot be retrieved by Endress+Hauser. If you were to lose your password, the “I forgot my password” is the only mean to retrieve your account. In such event retrieval key will be sent to the stored email address.

Secure Development Life Cycle (SDLC)

Endress+Hauser follows the principles of SDLC as required by the ISO 27001 and IEC 62443-4-1. Endress+Hauser processes ensure that sufficient tests are performed before publishing new productive code. Pursuant to this process, we require you to communicate any flaws, bugs, or vulnerability you might find to our team for further processing.

DDOS Protection

Endress+Hauser implemented several actions to prevent Distributed Denial Of Service (DDOS) such as request throttling or firewalling.

File system and backup

Endress+Hauser regularly back up the whole Netlilion system and its data to prevent data loss and enable data recovery. Backup data are physically separated from the productive data and secured with at least the same level of protection as in the productive system.

9. Decommissioning

Should you cancel your Netilion account, and unless agreed otherwise in writing, your data will remain available for three (3) months on the platform. This delay enables you to retrieve any valuable information you might want to relocate to another service. Netilion provides export capability to extract all your data, as defined in the MSA, in commonly accepted data standard (JSON or equivalent).

After this period all your data will be cleaned from the Netilion databases, without any possibility of retrieval.