Start Optimizing your Delivery Routes and Schedules
Start optimizing your fleet with real-time fleet tracking, insights, and analytics
Smart planner for retail and service operations
Intelligent Network Optimization and Design Engine
Our new releases and upcoming products
Achieve accurate and efficient deliveries
Dynamic Route Planning
Handle orders in real time
Field Service Dispatch Planning
Accomplish more tasks every day
Territory-Based Route Planning
Tackling high order clusters efficiently
Reverse / Returns Logistics
Manage returns the right way
Increase efficiency, reduce delivery costs, enhance your customer’s experience.
Exceed customer expectation, serve more clients, improve SLA adherence.
Save man-hours, reduce operating costs, end-to-end automation.
Get omni channel fulfilment, reduce manual interventions, track operations effortlessly.
CPG & FMCG
Optimize retail fulfilment, reduce logistics cost.
Industry trends, product updates, technology deep dives and more
Long reads that capture the length and breadth of logistics
Our customer success stories
Our take on the news
Deep dives into trends that matter
Watch Locus in action
Trends and numbers at a glance
Use this list of definitions to learn new concepts
Our API directory
Company, Team Locus, Contact and more
Clients worldwide trust Locus to optimize their supply chain
Work culture, Open positions, Job perks
Partner categories, How to Partner with us & more
Trust & Security
Built on Data Security, Privacy & Compliance
News, Announcements and Press Releases
Last updated on Jun 2, 2020
Locus makes use of certain sub-processors for assisting us in providing our services as described in the following sections.
Sub-processors are third party data processors engaged by Locus who has or potentially will have access to or process information belonging to Locus or its customers (which may include Personal Information).
Locus evaluates the security and privacy practices of sub-processors to ensure that they meet our security and privacy requirements. This is followed by risk assessment to understand the information security and privacy risks that might be introduced by the third party and whether they can be treated or not. Once we are confident with supplier’s security and privacy practices, we execute appropriate data protection agreements with them.
|Sub Processor Name||Purpose||Type of Information|
|Amazon Web Services||All data processing and storage requirements||All data|
|Google Maps||To provide Geocoding and routing services||End customer’s address|
|Auth0||Identity and Access Management||Customer personnel’s name, email id and phone number|
|Plivo||To send SMS to end customer||End customer’s phone number|
|Zendesk||To provide support (tickets, issues and bugs)||Customer personnel’s name, email id, phone number|
|Microsoft SharePoint||To share data for consulting projects||Depending on the consulting project|
|Google Analytics||For web usage analytics||Customer personnel’s name|
|Pendo||For web and mobile usage analytics||Customer personnel’s name|
|Doorbell.IO||User feedback analysis||Customer personnel’s name|
How can Locus help manage your logistics?
Join Industry Leaders:
Schedule a demo