Role-Based Access Controls
To ensure certain data and permissions are only available to authorized users, OneTrack supports role-based access controls that can facilitate configurations for many different types of customer requirements. Each user is configured for access to events, notifications, reporting, and admin tools. User settings are grouped within profiles that are assigned to users. Profiles are typically scoped by customer, plant, event type, and shift.
Data Security & Encryption
OneTrack captures image and video data, but does not extract, compute or store any biometric data. We do not perform any type of facial recognition or person identification. All data is encrypted with TLS v1.2 and AES256 and logically separated by customer across distributed databases with authentication and authorization checks at every layer. Application users cannot download videos by default, and each video is watermarked with its origin.
SOC 2 Compliance & Reporting
The System and Organization Controls (SOC 2) is a leading security report given to a company after a 3rd party audit of the company's internal data security practices. OneTrack is SOC 2 compliant and our report shows the controls and processes we use to keep customer data secure and ensure that our system remains online. Prospective customers can request OneTrack's SOC 2 compliance report from your main point of contact.
Hardened & Redundant Cloud Infrastructure
There are no additional on-prem infrastructure requirements for customers aside from the OneTrack AI sensors which are installed by the OneTrack Field Service Engineer team. OneTrack uses Amazon Web Services (AWS) to host all databases, storage, and backend services, which is ISO 27001 and SOC I Type II certified. Deploying within additional cloud providers (Google Cloud, Azure) is also possible upon request. Our infrastructure is hosted across multiple regions with automatic failovers.
Audit and Logging Functions
OneTrack logs all user activity within the system. Certain customer users with the "AUDIT" permission are allowed to view audit and log information from within the scope they are assigned. For example, an HR-related user may be allowed to view all user activity from their site. Audit and log data is retained for at least 30 days.