SECURITY

Protecting your data is our top priority.

Trusted by some of the largest and most complex companies in the world, OneTrack is built with enterprise security in mind.

Built for the security standards you require

Deployed at Fortune 500 manufacturers and the world's largest 3PLs. Passes the toughest IT security reviews.

Data Security
  • AES-256 encryption at rest
  • TLS 1.2+ in transit
  • Isolated tenant data
  • SOC 2 Type II certified
Access Control
  • SSO / SAML integration
  • Role-based permissions
  • Granular site access
  • Audit logging
Zero IT Footprint
  • Cellular connectivity built-in
  • No network changes required
  • Live in weeks, not months
  • You control what data is shared
Privacy First
  • No facial recognition
  • No biometric data
  • Operator ID via badge/QR only
  • Union-deployed at scale
PRIVACY FIRST

What we don't collect

We track actions, not people. No faces. No voices. No surveillance.

NO FACIAL RECOGNITION
Zero biometric data
We don't use facial recognition, fingerprints, or any biometric identifiers. Operators are identified by their assigned equipment and badges, not their faces.
NO AUDIO
Video only, no sound
Our cameras capture video without audio. Conversations stay private. We track actions, not words.
PURPOSE-BUILT
Operations data only
We capture what's needed for safety, productivity, and quality—nothing more. Video is event-based, not continuous surveillance.
FAQ

An In-Depth Look at OneTrack Security

Role-Based Access Controls
To ensure certain data and permissions are only available to authorized users, OneTrack supports role-based access controls that can facilitate configurations for many different types of customer requirements. Each user is configured for access to events, notifications, reporting, and admin tools. User settings are grouped within profiles that are assigned to users. Profiles are typically scoped by customer, plant, event type, and shift.
Data Security & Encryption
OneTrack captures image and video data, but does not extract, compute or store any biometric data. We do not perform any type of facial recognition or person identification. All data is encrypted with TLS v1.2 and AES256 and logically separated by customer across distributed databases with authentication and authorization checks at every layer. Application users cannot download videos by default, and each video is watermarked with its origin.
SOC 2 Compliance & Reporting
The System and Organization Controls (SOC 2) is a leading security report given to a company after a 3rd party audit of the company's internal data security practices. OneTrack is SOC 2 compliant and our report shows the controls and processes we use to keep customer data secure and ensure that our system remains online. Prospective customers can request OneTrack's SOC 2 compliance report from your main point of contact.
Hardened & Redundant Cloud Infrastructure
There are no additional on-prem infrastructure requirements for customers aside from the OneTrack AI sensors which are installed by the OneTrack Field Service Engineer team. OneTrack uses Amazon Web Services (AWS) to host all databases, storage, and backend services, which is ISO 27001 and SOC I Type II certified. Deploying within additional cloud providers (Google Cloud, Azure) is also possible upon request. Our infrastructure is hosted across multiple regions with automatic failovers.
Audit and Logging Functions
OneTrack logs all user activity within the system. Certain customer users with the "AUDIT" permission are allowed to view audit and log information from within the scope they are assigned. For example, an HR-related user may be allowed to view all user activity from their site. Audit and log data is retained for at least 30 days.