Browse Definitions :
Definition

fleet management

Contributor(s): Matthew Haughn

Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations. While most commonly used for vehicle tracking, fleet management includes following and recording mechanical diagnostics and driver behavior.

Fleet management is used by couriers, oil and gas delivery, utilities, repair and service industry businesses to ensure responsible vehicle use, confirm safety and enable real-time tracking. Although commonly associated with delivery cars and trucks, the boating industry uses fleet management technology as well.

Vendors offer many fleet management technologies. Vehicles use telematics like GPS for reliable global automatic vehicle location (AVL) detection, though some use GLONASS or less expensive cellular triangulation in remote and less-traveled areas.

Fleet management software allows a company’s management and dispatchers to track all vehicles from a central location. Tracking systems are used to monitor driver behavior, proper vehicle use, work breaks and safety. Fleet management software may also include some remote control capabilities such as speed limiting, engine revolution limiting and gradual slowing or stopping of vehicles. Remote security features help prevent stolen vehicles and cargo with GPS, mapping and cellular technology to quickly and accurately locate rogue vehicles. Vehicle operation is often monitored for mechanical problems and efficiency, helping the overall efficiency of the company and protecting profitability.

Because commercial vehicle accidents can be subject to an investigation, the data logged in fleet management software may be subpoenaed by law enforcement.

This was last updated in March 2017

Continue Reading About fleet management

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close