top of page


Last Modified: March 29, 2018

As a real-time tracking company, we are highly aware of the importance of the privacy of individuals and business, are giving a lot of thought on how to protect each and any of the users of our system, whether directly or indirectly.

We have compiled this document to allow anyone understand how we treat the information our various systems are collecting, may it be our website, our Online application and portal, our Mobile applications, or our hardware devices.

Information we collect

The information our various services collect includes direct information given us by the users (such as Name, Email, Time zone), information supplied by our devices, their sensors, and the Zeppos mobile application (such as its location, heading, battery status, temperatures, and vehicle statuses, and statistical information (such as pages and services visited, sensors accuracy, and coverage quality).


Seems like any privacy policy contains a section about cookies, so here it is – we store 2 cookies (short data information) on your browser – one to identify you in a unique manner when you switch between its screens, and one to store the template you use, to show it to you even after you’ve logged off. From time to time we may use external services (such as Google Analytics or PayPal) that require additional cookies. Blocking cookies on your browser will render these services inoperable.

We also serve cookies on meetings.

How we use the information

The information is used as part of our services to allow our users to manage their assets, to improve our system by analyzing users’ behavior, to keep our customers up-to-date with news and promotions, and to be able to serve them better.

Where we store the information

The information is stored on two independent IBM Cloud data centers located in the United States and The Netherlands.


We understand how sensitive the information we collect and therefore we have implemented various security layers to protect it, both during transmission, and while being stored.

The information is always being transmitted through encrypted channels, may it be SSL, cellular networks’ encryption, and our on in-device protocol encryption.

We never store any passwords (that’s why we cannot retrieve lost passwords), and storing the information on secured servers behind multiple, overlapping layers of protection.

Your choice

Several of our services allow our customers to remove the collected information on their own. All other users, whether they use our system directly or indirectly via our operators, can contact us at any time to have their information removed.


From time to time we may amend this policy. The most up to date policy can always be found on our website.

bottom of page