Browse Definitions :
Definition

fleet management

Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations. While most commonly used for vehicle tracking, fleet management includes following and recording mechanical diagnostics and driver behavior.

Fleet management is used by couriers, oil and gas delivery, utilities, repair and service industry businesses to ensure responsible vehicle use, confirm safety and enable real-time tracking. Although commonly associated with delivery cars and trucks, the boating industry uses fleet management technology as well.

Vendors offer many fleet management technologies. Vehicles use telematics like GPS for reliable global automatic vehicle location (AVL) detection, though some use GLONASS or less expensive cellular triangulation in remote and less-traveled areas.

Fleet management software allows a company’s management and dispatchers to track all vehicles from a central location. Tracking systems are used to monitor driver behavior, proper vehicle use, work breaks and safety. Fleet management software may also include some remote control capabilities such as speed limiting, engine revolution limiting and gradual slowing or stopping of vehicles. Remote security features help prevent stolen vehicles and cargo with GPS, mapping and cellular technology to quickly and accurately locate rogue vehicles. Vehicle operation is often monitored for mechanical problems and efficiency, helping the overall efficiency of the company and protecting profitability.

Because commercial vehicle accidents can be subject to an investigation, the data logged in fleet management software may be subpoenaed by law enforcement.

This was last updated in March 2017

Continue Reading About fleet management

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close