1. Introduction
This policy outlines the guidelines for the use and management of
the Transport Management System (TMS) and the associated mobile
application within Inntri Labs Pvt Ltd. The purpose of this policy
is to ensure efficient, secure, and effective transportation
operations, leveraging technology to streamline processes and
enhance service delivery.
2. Scope
This policy applies to all employees, contractors, and third-party
service providers who use the TMS and mobile application for
transportation-related activities.
3. Objectives
-
To ensure the proper use of the TMS and mobile application.
-
To protect the security and integrity of transportation data.
-
To enhance the efficiency and effectiveness of transportation
operations.
- To ensure compliance with relevant laws and regulations.
4. Roles and Responsibilities
4.1 Users
-
Ensure proper use of the TMS and mobile application as per
this policy.
-
Report any issues or security breaches immediately to the IT
department.
- Keep login credentials confidential and secure.
4.2 IT Department
- Maintain and update the TMS and mobile application.
- Ensure the security and integrity of the system.
- Provide training and support to users.
-
Monitor the system for any unauthorized access or unusual
activity.
4.3 Management
- Ensure compliance with this policy.
- Review and update the policy periodically.
-
Provide necessary resources for the effective implementation
of the TMS and mobile application.
5. Usage Policy
5.1 System Access
-
Access to the TMS and mobile application is restricted to
authorized personnel only.
-
Users must use their unique login credentials to access the
system.
5.2 Data Entry and Accuracy
-
Users are responsible for ensuring the accuracy of data
entered into the TMS.
-
Any discrepancies or errors must be reported and corrected
promptly.
5.3 Data Security
-
All data within the TMS and mobile application must be treated
as confidential.
-
Users must not share data with unauthorized individuals.
-
Encryption must be used for sensitive data transmissions.
5.4 Mobile Application Usage
-
Users must ensure their mobile devices are secure and
protected with passwords or biometric authentication.
6. Compliance and Monitoring
6.1 Compliance
- All users must comply with this policy.
-
Non-compliance may result in disciplinary action, including
termination of access or employment.
6.2 Monitoring
-
The IT department will regularly monitor the usage of the TMS
and mobile application to ensure compliance with this policy.
- Any suspicious activity will be investigated promptly.
7. Training and Support
The IT department will provide regular training sessions for all
users on the proper use of the TMS and mobile application. Support
will be available to users for any technical issues or questions.
8. Policy Review
-
This policy will be reviewed annually and updated as necessary
to ensure its effectiveness and relevance.
-
Any changes to the policy will be communicated to all users
promptly.
9. Contact Information
For any questions or concerns regarding this policy, please
contact the IT department at: