Security at Izhon Telematics
How we protect your fleet data and keep our platform reliable for logistics operations across East Africa.
Our approach
Encryption
Data in transit is protected with TLS. Sensitive data at rest is encrypted. Access to production systems and databases is restricted and audited.
Infrastructure
We use dedicated and isolated infrastructure where it matters. Fleet and analytics data are stored in environments designed for performance and access control, reducing cross-tenant risk.
Access control
Role-based access ensures that only authorized users see the data they need. We support strong authentication and principle of least privilege in our operations.
Monitoring and audits
We monitor our systems for anomalies and unauthorized access. Security-related practices are reviewed and improved on an ongoing basis.
What we protect
- GPS and telemetry data — Location and vehicle data are used only to deliver the services you subscribe to and as described in our Privacy Policy.
- Account and contact information — Stored securely and used for authentication, support, and service communications.
- Fuel and operational analytics — Processed within controlled environments; we do not sell or share your fleet data with third parties for their marketing.
Your role
Keeping data secure is a shared responsibility. We ask you to:
- Use strong, unique passwords and protect your login credentials.
- Only grant platform access to people who need it for their job.
- Tell us promptly if you suspect unauthorized access or a security issue.
If you have security questions or want to report a concern, contact us at support@izhontelematics.online or +250 788227933. We take reports seriously and will respond as quickly as we can.