- FAQ

What is ?

allows you to access the information you need, when you need it. You can use whenever you need more detailed information about a driver's log or violation. You can view individual logs by driver or you can run detailed log audit reports that show violation information by driver, by group or by company. Using this information, you can provide targeted training to your drivers so that many violations are eliminated.

How does work?

When logs are scanned and processed at our Operations Center, log data and images are stored in a database that is accessed using the application. You can access logs for a single driver or run detailed log audits for a group of drivers. The application is easy to use, accessible using a standard Internet browser and requires no costly software.

What reports are available in ?

offers several reporting options. Most of these reports have multiple filter criteria and sorting capabilities. You may select from the following reports:

  • Checkpoints

    • Checkpoint Summary - Provides a detailed report about specific checkpoint types that have been entered for a specific driver or for all drivers over a specified date range

    • Checkpoint User Productivity - Allows managers to track the productivity of a team; the report provides the number of checkpoints entered by user and grouped by type of checkpoint

  • Drivers

    • Driver Profile - Displays detailed information about drivers

    • Driver Risk Analysis - Assesses the number of violations and severity of violations for a driver or group of drivers over a specified time period

    • Driver Utilization - Provides a comprehensive report of a driver's utilization over a specified period

    • Drivers with No Checkpoints - Displays a list of drivers with no checkpoints; this will aid in determining whether a driver is using incorrect fuel information or if checkpoint information was set up in error

    • Flagged Drivers - Shows which drivers have been flagged as risky, so that the fleet, safety manager, or driver manager can monitor specific drivers; drivers are flagged in the "Driver Administration" section

    • Simple Driver Profile - A compact report that displays driver data, including driver ID, driver name, hire date, termination date, and manager

  • Exceptions

    • Data Exceptions - Displalys a list of all employees where a discrepancy exists in their relationship (i.e., organization, manager, and/or roles)

    • Import Exceptions - Displays errors/exceptions that were encountered during the nightly import process; results are only available for the previous day's import
  • Letters

    • Notification Letter - Provides violation notifications or congratulatory letters for drivers over a specified time period

  • Logs

    • Form Scan Metrics - Provides the log count and percentages that were scanned, by log type, for a given date range

    • Log Processing Summary - Provides a count of successfully audited logs and rejected logs (by reject reason) by day as a percentage of the total logs for that day

    • Proactive Log Monitor - Allows driver managers to proactively monitor for driver logs that may not yet be technically in violation (not yet considered missing), but have not been submitted in a timely manner

    • Re-Indexed Log User Productivity - Allows managers to monitor the productivity of their team; the report displays the number of logs re-indexed by user, subtotaled by user

    • Resubmitted Log User Productivity - Allows mangers to monitor the productivity of their team; the report displays the number of logs resolved by user, grouped by reject type and resolution

    • Resubmitted Log by Driver - Provides detailed information about logs that have been resubmitted for processing

  • Users

    • User Account Summary - Provides a detailed report of all user accounts and their status
  • Removed Violations

    • Removed Violation Audit - Lists all violations removed from reports for a specified date range

  • Violations

    • Missing Log - A condensed list of all drivers who have missing logs and the missing log dates; formerly known as Late and Missing Log

    • Violation Detail - Provides detailed information about violations by drivers, including the driver name and driver number, the violation date, the violation class, a description of the violation, the severity of the violation, and the number of points for the violation

    • Violation Free Drivers - Shows a list of violation free drivers for the specified violation type over a specified date range.

    • Violation Percentage - Provides the number of violations over a specified time period as a percentage of the expected log count

    • Violation Summary - Breaks down the number of violations a driver, group or company had over a specified date range

    • Violation Summary by Driver - Breaks down the number of violations by driver over a specified date range

What are the operating system requirements for ?

is specifically designed to run on the Windows platform. The Crystal Reports ActiveX Viewer Control can be installed and run on Windows 2000, Windows NT with Service Pack 6a or later, or Windows XP. Earlier versions of Windows will not allow you to install the Crystal Report ActiveX Viewer Control or access the many reports available in .

Does require any specific browser settings?

requires several browser settings. Most of these settings are standard settings. These settings include:

  • Enabling cookies - Cookies are implemented to allow user-side customization of Web information. You may enable cookies in your Privacy settings. To access your Privacy settings, go to the Internet Explorer menu bar and select Settings -> Tools -> Internet Options. Then click on the Privacy tab. You should adjust your privacy level to Medium High or lower. will not work if you select Block All Cookies.

  • Enabling JavaScript - JavaScript is embedded as a small program in a web page that is interpreted and executed by the Web client. You may enable JavaScript in your Security settings. To access your Security settings, go to the Internet Explorer menu bar and select Tools -> Internet Options . From the Internet Options window, select the Security tab. Click once on the Internet icon to ensure that it is selected. Then click on the Custom Level button. In the Security Settings window locate the Scripting item. Then locate the Active scripting item. Under Active scripting, click the Enable radio button. This will allow your browser to run JavaScript.

  • Enabling ActiveX Controls - ActiveX is a code that defines Microsoft's interaction between Web servers, clients, add-ins and Microsoft Office applications. You may enable ActiveX in your Security settings. To access your Security settings, go to the Internet Explorer menu bar and select Tools -> Internet Options. From the Internet Options window, select the Security tab. Click once on the Internet icon to ensure that it is selected. Then click on the Custom Level button. In the Security Settings window locate the ActiveX controls and plug-ins item. Then locate the Run ActiveX controls and plug-ins item; click the Enable radio button. This will allow your browser to run ActiveX.

  • Enabling SSL - Secured Sockets Layer (SSL) is a protocol that transmits your communications over the Internet in an encrypted form. You may enable SSL in your Advanced settings. To access your Advanced settings, go to the Internet Explorer menu bar and select Tools -> Internet Options . From the Internet Options window, select the Advanced tab. Locate the Security item. Then ensure that the boxes next to Use SSL 2.0 and Use SSL 3.0 are checked. This will allow your browser to use SSL.

What are the software requirements for ?

In order to use you must have several free, third party applications installed on your computer. If you do not currently have these applications, the program will prompt you through the installation process. These third party applications are:

  • Internet Explorer 6.x. - used by the web application

  • Adobe Acrobat Reader - used to view driver logs

  • MeadCo's ScriptX - used for printing.

    To download MeadCo's ScriptX, click here. Follow the steps provided to download the component.

  • WinZip - used to decompress saved log files

For information on installing WinZip and for any related licensing issues, contact your IT group. They will be able to provide you with details regarding this application. 

  • Adobe SVG Viewer  - used to view graphical logs

If the application does not provide a prompt to install the Adobe SVG viewer due to Internet Explorer security settings or if the popup is blocked, the SVG viewer can be installed manually by downloading and running the install from the following link:

http://www.adobe.com/svg/viewer/install/main.html

Select the viewer for Win98 - XP.

  • Crystal Report ActiveX Viewer Control - used to view log audit reports

Depending upon your company's security and firewall settings, you may experience difficulties installing the Crystal Report ActiveX Viewer Control. Make sure that Active X controls are enabled for your computer (see Enabling ActiveX Controls above).

If you are connecting to the web server computer through a proxy server or firewall, certain types of files may be prohibited from being downloaded to a client machine through a browser. If a proxy server or firewall is blocking the download of the files that make up the ActiveX Viewer, you will receive a red "X" in the browser window. Your Internet security software should let the following file types through to the client computers to ensure proper functionality of the ActiveX Viewer:

  • .ETF - Encapsulated Totaller File (Group Tree)

  • .EMF - Encapsulated Message File (message handling such as parameter dialogue boxes, etc.)

  • .EPF - Encapsulated Page File (report pages)

  • .RPT - Report Files

  • .CAB - Cabinet File (ActiveXViewer.cab or ActiveX Viewer)

  • .TMP - Temporary Files

Note: If your security policies prohibit the downloading of ActiveX cabinet files, you can manually install the ActiveX Viewer onto the client computer. For detailed instructions and further troubleshooting steps for installing the ActiveX Viewer, click here.

Do I need to adjust my display settings?

For optimal display, the following display settings are recommended when using :

  • Recommended Screen Resolution - When using the following screen resolution is recommended: 1024 x 768 pixels. To set your screen resolution, click on your Start button and the select Control Panel -> Display . In the Display Properties window, select the Settings tab. On the Screen Area slider, select 1024 x 768. Then click OK.

  • Recommended Text Size - When using , you should set your browser text size to Medium. To set your text size, go the Internet Explorer menu and select View -> Text Size; then select Medium.

What do I do if I've forgotten my password?

Please contact your company application administrator. They will reset your password for you so that you can access the application.

I was told my session was being terminated. Why?

If data is being reloaded from the database, generally in the middle of the night, users who attempt to log in will be presented with a message indicating that their session must be terminated. You will be given a time when you should be able to access the application again.