What
is apps.id-systems.com?
apps.id-systems.com is a tool used by our clients to manage,
analyze, understand, and improve their operations involving mobile assets.
We offer web-based software that enables customers to configure
their purchased systems, including defining how their devices and systems
should perform; to observe the current and historical status of their system;
and to analyze and make business decisions based on data from our systems.
What
information is collected?
When you visit our webpage, depending on the application you are
running, the following information may be collected:
o
Logins, both successful and unsuccessful, to
the system
o Browser type
o Device (Desktop/Tablet/Phone)
o Language
o Operating System
o Screen Resolution
o Duration (Time on Site)
o Navigation and interactions with the site
In addition, depending on the application you are running, you
may have the ability to administer or report on the personal information of
other users. Such data may include:
o
Authorized asset-users, including users’
names, job titles, access card numbers, access-expiration data (such as
certification, medical or training expiration)
o
Asset users’ use of monitored equipment, such
as when they log in, where, when and how they use the equipment, responses to
safety checklists or text messages. The application’s Software User to Asset
Operator Text Messaging Service and Customer defined Safety Checklists store
free-form text input by the software user for a retention period configured
specifically by each customer. Acting as
a processor, IDSY retains the data solely for auditing purposes and customer
information access. This data will not
be shared or used by any 3rd parties or added to any lists.
This
type of data is stored from various archive durations, configured by each
customer, based on the type of data collected, for compliance and/or legal
purposes.
In
addition, depending on the application you are running, certain data is stored
for even longer durations for analytical purposes. With this data,
personal information is removed and replaced with internal, pseudonymous
identifiers. The data is stored from various archive durations,
based on the type of data collected.
What
can I do?
Data Access
If you wish to obtain a copy of your data, and you are a
software user, please contact our Data Privacy team at
privacy@id-systems.com
. If you are an asset user but not
a software user, please contact your company’s system administrator who can
provide this data to you. If they are unable to process your request
or do not respond in a timely manner, please contact us at
privacy@id-systems.com
.
Data Correction
If you wish to correct your data, and you are a software user,
please contact our Data Privacy team at
privacy@id-systems.com
. If you are an asset user but not
a software user, please contact your company’s system administrator who can
correct this data for you. If they are unable to process your
request or do not respond in a timely manner, please contact us at
privacy@id-systems.com
.
Data Erasure
If you wish to erase your data, and you are a software user,
please contact our Data Privacy team at
privacy@id-systems.com
. If you are an asset user but not
a software user, please contact your company’s system administrator who can
erase this data for you. If they are unable to process your request
or do not respond in a timely manner, please contact us at
privacy@id-systems.com
.
Revoking Consent
If you gave your consent to have information processed and wish
to revoke it, please contact our Data Privacy team at
privacy@id-systems.com
.
Questions?
If
you have any questions, please email
privacy@id-systems.com
and we're happy to assist.