We collect information for two main reasons: to provide better service and support, ensure accountability and auditability in our systems, and for asset tracking purposes.
Our products may collect IP addresses, machine names, installation directories, platform versions, device identifiers, screenshots, and mobile device phone numbers. Some of this information is collected when you log into one of our products and some is collected only if you run into an error while using the product. The date and time at which the information is collected is also recorded.
When you use our services we automatically collect and store certain information in server logs. This includes: details of how you used our service; such as your search terms, screens visited, and filters; IP addresses from which you accessed our service; The date and time at which you accessed our service; Device information, such as crash information, machine names, and installation directories
When using RoutingBox Mobile we may collect information about your real-time actual location. Your location is determined by a combination of GPS and cell tower proximity.
When you make changes to records within our products we may collect the date, time, logged in user, what your change is, and in some cases your location.
We use the information we collect from all of our services to provide, maintain, protect and improve them, to develop new ones, and to protect BiTS and our users. Device information is used primarily to provide you better service and to quickly address any errors you run into. Log information is used primarily to monitor the health of our servers and to better respond to issues isolated by geographic location.
Location information collected by RoutingBox Mobile is used to provide real-time asset tracking, route suggestions, and for reporting purposes within RoutingBox. Audit information is used to provide a log of changes made to records within our systems to our users.
We do not share the information we collect with companies, organizations and individuals outside of BiTS unless one of the following circumstances applies:
For legal reasons
We will share information with companies, organizations or individuals outside of BiTS if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable law, regulation, legal process or enforceable governmental request; detect, prevent, or otherwise address fraud, security or technical issues; protect against harm to the rights, property or safety of BiTS, our users or the public as required or permitted by law.
As request by a client
If an employee of a company or organization that is currently in contract with BiTS requests information related the whereabouts of an asset belong to or employed by the company or organization, BiTS may provide them with that information. Information collected from any company or organization other than that of the requester is never provided.
We work hard to protect BiTS and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular, we encrypt many of our services using SSL; we review our information collection, storage and processing practices to guard against unauthorized access to systems; we restrict access of information to BiTS staff who need to know in order to service our clients.