Built on trust.
Backed by evidence.
Vetrol handles sensitive financial and operational data for every fleet we serve. Here is exactly how we protect it — and the commitments we hold ourselves to.
Data Security
AES-256
All data encrypted at rest and in transit.
Uptime SLA
99.9%
High-availability infrastructure with redundancy.
Compliance
RDB / RRA
Compliant with Rwanda data protection and tax law.
Audit Trail
Immutable
Every event logged and tamper-proof by design.
Your data stays in Rwanda.
All fleet data processed through the Vetrol platform is stored on infrastructure hosted within Rwanda. We do not transfer operational or financial data to servers outside the country.
Vetrol operates in full compliance with Rwanda\'s Data Protection Law (Law No. 058/2021) and is subject to oversight by the Rwanda Utilities Regulatory Authority (RURA). Our privacy practices are documented in full in our Privacy Policy.
- Data stored exclusively on Rwanda-based infrastructure
- Compliant with Rwanda Data Protection Law (Law No. 058/2021)
- No sale or sharing of data with third parties for commercial purposes
- Data retention policy: transaction records held for 7 years for tax compliance
- Right to access, correct, and delete personal data on request
What data we collect
What we never do
- Sell or monetise your fleet data
- Share transaction data with third parties without consent
- Store payment card or banking credentials
- Use your data to train external AI models
How we protect the platform
Encryption at rest & in transit
All stored data is encrypted with AES-256. All data in transit uses TLS 1.3. Vehicle Tag communications use a proprietary encrypted protocol.
Tamper-proof transaction ledger
Every transaction is written to an append-only ledger. Records cannot be edited or deleted — only new entries can be added. This applies to approved transactions, denied attempts, and rule changes.
Role-based access control
Fleet managers, finance users, and station operators each see only what their role permits. Permissions are configurable per account and logged on every access event.
Real-time anomaly detection
Vetrol's rules engine flags unusual patterns — fills outside normal hours, volumes above vehicle history, stations outside approved geography — and alerts your team immediately.
Incident response
In the event of a security incident, affected customers are notified within 24 hours. We maintain a documented incident response plan and conduct post-incident reviews for all severity-1 events.
Penetration testing
The Vetrol platform and POS device firmware undergo regular third-party penetration testing. Critical findings are patched within 48 hours of disclosure.
99.9% uptime. Built for markets where downtime costs money.
A fueling event that fails to authorize doesn\'t just inconvenience a driver — it stops an operation. Vetrol is built on high-availability infrastructure with redundancy at every layer, designed to stay online even when connectivity is degraded.
- 99.9% platform uptime SLA
- POS devices continue operating in offline mode during connectivity loss
- Offline transactions synced and settled automatically on reconnection
- Status page available at status.vetrol.io
- Planned maintenance communicated 48 hours in advance
Platform Status
All systems operational