305 ELD Privacy Policy
Client Information
To access our web-based applications, users must create an account.
Information collected during account creation is strictly for internal use.
We will never sell, distribute, or share your data with third parties under any circumstances.
You may also be asked to provide personal or company details.
You can update this information at any time via links provided within the online applications.
Use of Background Location
The 305 ELD app collects coarse location data in the background to detect when a vehicle crosses U.S. state borders.
We do not share your precise location—only coarse location is used to calculate miles traveled per state for IFTA reporting.
Log Files and System Information
The application automatically logs certain system information, such as:
- IP address, browser type, referring/exit pages, operating system, date/time stamps
- Device-specific details (hardware model, OS version, unique device IDs, mobile network data, phone number)
This data helps us enhance user experience, analyze trends, monitor interaction patterns, and support internal administration.
Legal Access to Your Information
We may disclose personal or company information when required to:
- Comply with government, official, or regulatory requests
- Enforce violations of our Privacy Policy or Terms of Use
- Detect, prevent, or act upon fraud statutes
- Protect against copyright infringement as allowed by law
Personal Information Protection
We implement multiple security layers—physical, electronic, administrative, and managerial—to safeguard client data.
Although no public network is 100% secure, we take reasonable measures to protect your information once received.
- We do not store credit card numbers on our servers; transactions are processed through a secure authorization service.
- Personal information entered is encrypted and tokenized; uploaded files are encrypted.
- Our server environment uses advanced firewalls and encryption technologies.
Security Measures in Place
- Advanced access controls to prevent unauthorized access
- SSL encryption across all applications for secure data transmission
- Unique user credentials—users are responsible for safeguarding them
- Segmented network architecture, hardened servers, and redundant firewalls to block external threats
Online Threat Protection
- State‑of‑the‑art SSL encryption secures account access and data transmission
- Detailed access and usage logs for audit and monitoring purposes
- Cutting‑edge firewall and intrusion detection technology to protect against cyberattacks
California Online Privacy Protection Act Compliance
We comply fully with the California Online Privacy Protection Act.
We will not share your personal data without your consent.
You can update your personal information at any time via the links provided within our sites and apps.
Information From Third Parties
We do not trade, sell, or share customer information with third parties.
Occasionally, we may use third-party lists to send brochures or service-related updates.
These communications are for internal use only and are not meant to be intrusive.
