We are proud to announce that Padam Mobility has been ISO/IEC 27001 certified since April 2025— the international gold standard for information security management. This certification reflects our ongoing commitment to protecting the data of our customers, partners, users, and employees.
ISO/IEC 27001 is an international standard that defines the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It ensures that an organization rigorously identifies, evaluates, and manages information security risks, while implementing appropriate controls to protect the confidentiality, integrity, and availability of data.
Achieving this certification means that Padam Mobility complies with international best practices in cybersecurity and has implemented a robust, long-term framework for safeguarding sensitive information.
The ISO 27001 certification obtained by Padam Mobility covers both strategic and operational areas. It applies to all internal and external tools used by the company, including client-facing management platforms, as well as employee and applicant data.
The full scope of Padam Mobility's ISO 27001 certification includes: secure hosting, security management, technical support, software development, operational maintenance, monitoring and access management, and incident response, specifically for Padam Mobility’s software platforms dedicated to demand-responsive transport and mobility services for people with reduced mobility.
It also encompasses HR operations and data security for employees and candidates, as well as business and prospect data, financial and strategic company data, and intellectual property.
This certification represents a major milestone for Padam Mobility and demonstrates our commitment to delivering secure, reliable services that meet the highest cybersecurity standards. To obtain a copy of Padam Mobility’s ISO 27001 certification document, we invite you to request it via our Trust Center.
Do you have any questions about our information security approach?