Information We Collect
1. Location Data
- Background Location Permission: We collect background location data to record the track of drivers. This is essential for providing accurate and efficient fleet management services. The location data is used to help drivers know their routes and to track the fleet's movements for maintenance purposes.
2. Camera and Library Permissions
- Camera: We use the camera permission to allow users to upload images of the odometer and invoices. This helps in maintaining accurate records of vehicle usage and expenses.
- Library: We access the device's library to let users upload existing images from their device for odometer readings and invoices.
How We Use Your Information
- Fleet Management: Your location data is used to manage and maintain the fleet effectively. This includes tracking the routes taken by drivers and ensuring that vehicles are maintained properly.
- Route Guidance: The location data helps drivers to know their routes, ensuring efficient and timely deliveries or services.
- Record Keeping: Images of odometers and invoices uploaded via the camera or library are used for record-keeping and financial management.
Data Sharing and Disclosure
We do not share or disclose your data to any third party. Your information is solely used within the application for the purposes outlined in this policy.
Data Security
We implement a variety of security measures to maintain the safety of your personal information. Your data is stored in secure environments and access is restricted to authorized personnel only.
- Encryption: All sensitive data, such as location information and uploaded images, are encrypted both in transit and at rest. This ensures that your data is protected from unauthorized access.
- Access Controls: Access to personal data is restricted to authorized personnel only. We use role-based access controls to ensure that employees only have access to the data necessary for their job functions.
- Regular Audits: We conduct regular security audits and assessments to identify and address potential vulnerabilities in our systems. This helps us to continuously improve our security posture.
- Data Anonymization: Where possible, we anonymize personal data to further protect your privacy. This means that data is processed in a way that it cannot be linked back to you.
- Security Training: All employees undergo regular security training to stay updated on best practices for data protection and to ensure that they understand the importance of maintaining data security.
- Secure Infrastructure: Our servers are hosted in secure data centers that comply with industry standards for physical and digital security. These data centers are equipped with advanced security measures such as biometric access controls, surveillance systems, and firewalls.
Despite our efforts to protect your personal information, no security measures are completely infallible. Therefore, we cannot guarantee the absolute security of your data. However, we strive to protect your information to the best of our abilities.
Your Rights
You have the right to access, correct, or delete your personal information. If you wish to exercise any of these rights, please contact us at support@vor7.com.
Changes to This Privacy Policy
We may update this Privacy Policy from time to time. Any changes will be posted on this page, and we will notify you of any significant changes by email or through our application.
By using Vor7, you consent to our privacy policy. If you do not agree with our policies and practices, please do not use our application.