Take an interactive product tour
Fill out a few quick details and we’ll send you the product tour to make it easy to access and share with your team.
Button Arrow
OneTrack Icon
Thanks for reaching out!
We will reach out in a few minutes with your product tours.  
Oops! Something went wrong while submitting the form.

Data Security

Protecting your data is more than a checkbox - it’s our top priority.

Trusted by some of the largest and most complex companies in the world, OneTrack is built with enterprise security in mind. From multi-region availability, redundancy, end-to-end data encryption, and 24/7 monitoring and alerting — you can rest easy knowing that your data security and privacy are our top priorities.

icon

OneTrack Enterprise Security Highlights

Access controls

Robust role-based access controls

Data Security

End-to-end data encryption, in transit and at rest

SOC 2®

SOC 2® compliant with regular 3rd party security audits

Cloud-based

Application managed by OneTrack, hosted in the cloud

Audit & Logging

Audit and logging functions for enhanced security

An In-Depth Look at OneTrack Security

Role-Based Access Controls

To ensure certain data and permissions are only available to authorized users, OneTrack supports role-based access controls for users that can facilitate configurations for many different types of customer requirements.

Each user is configured for the following:

  • Access to events
  • Notifications for events
  • Access to reporting
  • Access to admin tools


Each of the user settings are grouped within profiles that are assigned to users. OneTrack provides default profiles, but recommends custom setup during implementation. Profiles are typically scoped by customer, plant, event type, and shift. 

Data Security & Encryption

OneTrack captures image and video data, but OneTrack does not extract, compute or store any biometric data. OneTrack does not perform any type of facial recognition or person recognition from any of the data that is stored.
 

All data is encrypted with TLS v1.2 and AES256 and logically separated by customer across distributed databases with authentication and authorization checks at every layer. Authentication and authorization follow the principle of least privilege. OneTrack does not delete sensor or telemetry data by default, but customers can request retention policies, which are implemented before go-live. Application users cannot download videos by default, and each video is watermarked with its origin.

SOC 2 Compliance & Reporting
Hardened & Redundant Cloud Infrastructure
Audit and Logging Functions 

OneTrack logs all user activity within the system. Certain customer users with the “AUDIT” permission are allowed to view audit and log information from within the scope they are assigned.

For example, an HR-related user may be allowed to view all user activity from their site. Audit and log data is retained for at least 30 days.