T-Mining makes maritime logistics processes like Secure Container Release more secure and efficient. Every day, more than 2.000 companies in over 25 different countries rely on our solution, build on decentralized technologies such as blockchain.

The secure exchange of data & digital tokens is therefore of utmost importance. As the business processes in our scope will nearly always cross the boundaries of a single company, a strong focus on security is even more important compared to solutions used by a single company (e.g. ERP solution) where security responsibilities can be partially handed over to clients.

With Secure Container Release, T-Mining provides a safer and more secure container release process than traditional paper- or pincode-based release processes. Today, different stakeholders involved in this process, like ocean carriers, freight forwarders, transport companies, deep sea terminals or port community systems, rely on T-Mining to safeguard the integrity of their staff and the security of their processes, based on a more secure information flow.

It goes without saying that setting superior IT security standards is therefore a main objective, not only for the management, but also for all employees, subcontractors and suppliers with whom T-Mining works. 

The focus on security is not only key for T-Minings’ activities, but part of our DNA. The physical safety & integrity of our staff and our users and customers is always more important, referring to various incidents with port workers affected by malicious attempts.

Therefore, T-Mining management undertakes various initiatives to prevent employees, subcontractors, end-users or customers from being exposed to these risks by:

  • organizing awareness sessions, targeting staff, developers and support agents, and also externally, during workshops and webinars with end-users, creating awareness on the risks and training them on how they can work in a more safe and secure way;

  • completing the ISO27001 certification process;

  • investing in a technology stack where centralisation and access to data is limited, as far as possible;

  • organizing external audits;

  • having an open mind towards security where we expose ourselves to questions and concerns of prospects or customers, and exchange best practices;

  • stimulating a culture where any possible security issue can be discussed internally or with customers/suppliers/authorities.


You can download our Privacy Policy below.
Download the PDF here.