FREE TRIAL UPGRADE!
Thank you for investing in EnvironmentalHazmatHuman ResourcesHuman Resources, Hazmat & Environmental related content. Click 'UPGRADE' to continue.
CANCEL
YOU'RE ALL SET!
Enjoy your limited-time access to the Compliance Network!
A confirmation welcome email has been sent to your email address from ComplianceNetwork@t.jjkellercompliancenetwork.com. Please check your spam/junk folder if you can't find it in your inbox.
YOU'RE ALL SET!
Thank you for your interest in EnvironmentalHazmatHuman ResourcesHuman Resources, Hazmat & Environmental related content.
WHOOPS!
You've reached your limit of free access, if you'd like more info, please contact us at 800-327-6868.
Data security and asset tracking
  • With emerging technology comes the elevated danger for carriers of vulnerability to cyberattacks.
  • Asset tracking technology can reduce back-office costs and minimize reporting errors.

While technology has many benefits, it brings with it some challenges, not the least of which is a vulnerability to cyberattacks. In the wrong hands, a company’s electronic data could be used to track and steal shipments, transfer funds, obtain financial information (including credit card numbers), etc. Electronic equipment and files are not just vulnerable to theft and unauthorized access; they’re vulnerable to accidental loss (e.g., hard-drive crashes or accidental file deletion).

Over the past few years, few could have missed the news headlines detailing large, well-known companies that have fallen victim to data security breaches. The phenomenon has become all too common, and companies all over the United States have faced negative publicity and considerable fines in the wake of their data being improperly shared.

Among the areas of concern for motor carriers are:

EDI: The transmission of data from a motor carrier to customer or vendor via electronic data interchange (EDI) can become a weak point in a motor carrier’s security protocol.

ELD security: Because electronic logging devices (ELDs) are internet-enabled, they can be targeted by hackers. Unfortunately, many ELDs being installed on trucks are not well-protected from cyberattacks. An ELD presents an access point for a cybercriminal to steal a fleet’s critical information.

ELDs send inspection reports to the Federal Motor Carrier Safety Administration (FMCSA) and are required to connect to a vehicle’s electronic control module (ECM) to track date, time, location information, engine hours, vehicle miles, user identification data, vehicle identification data, and motor carrier identification data. ELDs must also permit wireless connectivity.

As a result, ELDs create a bridge between critical vehicle components and wireless data transmission, such that the vehicle components themselves can be accessed remotely through Wi-Fi or Bluetooth. The most common ELDs use built-in cellular modules, but satellite, Bluetooth, or cabled tethering to cellular-enabled smart phones and tablets are also options.

The ELD mandate does not contain any cybersecurity or quality assurance requirements for ELD suppliers. As a result, no third-party validation or testing is required before vendors can self-certify their ELDs. Before deploying an ELD, or if there are concerns about a current provider, contact the ELD supplier and ask about its cybersecurity. ELDs can include a combination of in-vehicle, communications link, user interface, and cloud back-end systems. The supplier should be asked for details that address the cybersecurity of all functions and components.

In May 2020, FMCSA released a set of cybersecurity best practices for ELD solutions in “Cybersecurity Best Practices for Integration/Retrofit of Telematics and Aftermarket Electronic Systems” [FMCSA-RRT-19-013]. The best practices provide guidance for trucking companies when acquiring new devices and what suppliers can expect from customer acceptance testing of these requirements. ELD solutions from J. J. Keller & Associates, Inc. meet these security requirements.

Personally Identifiable Information (PII): For starters, employers should ensure verify that any PII collected by the company is amassed for a specific reason. Where data is necessary, controls should be in place to ensure it is available only to employees with a clear business need to access it. When these controls include individual user passwords, employees need to be reminded to create passwords thoughtfully and to keep them secure. Despite increasing awareness of the importance of data security, “password” and “12345” have been at or near the top of the list of the most common internet passwords annually.

Bottom line: Electronic files probably play a core role in the functioning of any motor carrier’s business and need to be protected along with physical assets.

For more in-depth information on data security, click on the following links:

Asset tracking

Vehicle and other asset tracking systems assist operations teams to manage a fleet more efficiently, safety managers to track safe operations, and the legalization staff to accurately submit required state and federal filings. Both large and small fleets can benefit from in-cab technology.

Asset tracking technology has many uses, including to:

  • Automate International Fuel Tax Agreement (IFTA), International Registration Plan (IRP), and Heavy Vehicle Use Tax (HVUT) recordkeeping and reporting;
  • Monitor driver and vehicle location and productivity; and
  • Update customers on the timeliness of deliveries or service appointments.

The use of technology can significantly reduce back-office costs and minimize reporting errors.

For more in-depth information on asset tracking topics, click on the following links: