Takaful Malaysia
Security Statement
Security Statement

Takaful Malaysia is highly committed in ensuring that all transactions performed by you through our Online Renewals are secure, safe and confidential. For this purpose, we have put in place privacy protection control systems designed to ensure the highest security standards and confidentiality.

Access to Online Renewals
To control access to our Online Renewals, every Customer is required to input either 2 combination of the following:

  1. Certificate Renewal Number or
  2. Vehicle Registration Number or
  3. IC Number.​

Although, we exercise reasonable efforts to provide a safe and secure our Online Renewals, we do not have control over the computer you use to access the Online Renewals. Therefore, on your part, please be advised of the following:

  1. Please ensure that your computer does not provide any opportunities for anyone to gain access to your information. As an added security we have incorporated a feature in our Online Renewals to automatically log you off when there is no activity detected for a period of time.
  2. Please satisfy yourself that the equipment you are using will not allow eavesdropping or recording of your activities.
  3. Always log off our Online Renewals before visiting other Internet sites or once you have finished conducting your transactions.
  4. Please do not send information about your account via e-mail.


Data Confidentiality and Data Integrity
To ensure data confidentiality and integrity, all information transmitted over the Internet is encrypted using the Secure Socket Layer (SSL) secured 40-bit and 128-bit. SSL used digital certificates and it is a secure way of transferring information between two computers on the internet.
System Security and Monitoring
Takaful Malaysia has adopted a combination of the following systems security and monitoring measures for Online Renewals transactions:

  1. Firewall systems, strong data encryption, anti-virus protection and round the clock security surveillance systems to detect and prevent any form of illegitimate activities on our network systems.
  2. Regular security reviews are conducted on our systems by our internal System Audit as well as external security experts.
  3. Collaboration with major vendors/manufacturers to keep abreast of information security technology developments and implement where relevant. ​