Heise Online reported on 07-27-2012 that it was possible to read data from a variety of different devices including measurement devices, barcode scanners, GSM / GPRS routers, etc. using port scanner software in a wireless network. Amongst these devices that were readable using this port scanner software were telematic devices from another provider that included info such as login details and current position data.
At ENAiKOON our tracking modules ensure that no data is read and cannot be passed on to unauthorized entities. ENAiKOONs technique works as follows: the tracking module has new information for the server, like a new position, a change in speed, ignition on, or other changes of digital or analogue input information, and then the data is wirelessly sent from the device to the ENAiKOON servers.
When the server wants to send data to the tracking device, this has to wait
until the tracking module logs onto the server, only then can the server
transmit data to the tracking module. The server cannot start a connection to
the device to send data or to read what data is on the device.
A request from outside does nothing, since the tracking device does not react. This could be compared to a phone that can only make calls but not receive them.
The external independent Data Protection Agent of ENAiKOON GmbH is Dipl. Jur. Karsten Böhm from PRIVACY ONE. He confirmed that the appropriate technical and organizational measures were in place to comply with the German Federal Data Protection Act (Bundesdatenschutzgesetzes), in particular in regard to the Data Protection Law (Appendix to §9 BDSG), for all modes of transmission of the location data from ENAiKOON