Locus Robotics

DOWNLOAD: Warehouse Automation Buyer’s Guide for Robotic Solutions

DOWNLOAD: Warehouse Automation Buyer’s Guide for Robotic Solutions Download Now

Compliance

TRUST CENTER

We know a lot about robots. We also know a lot about security, privacy, and sustainability.

Any Compliance Concerns?

If you have any questions or would like to report compliance concerns
or violations, please contact us at [email protected].

Warehouses trust Locus to increase their efficiency
and pick more units each day.

They believe in our company, our employees, our software, and our co-bots. That’s why we work every day to strengthen and keep that trust through ongoing security and compliance reviews, certifications, policies, and best practices.

Here are a few areas of importance that we focus on when it comes to TRUST:

Security

We deploy strong and tested security foundations and enforce our practices and preparedness with ongoing employee security awareness training for every member of our team.

Learn more about secure AMR deployments.

Read More

Privacy

We are committed to protecting the personal data and identifying information of our employees, our customers, and their customers alike.

Read More

Compliance

We are certified in compliance and undergo regular, third-party audits to ensure the highest level of compliance and trust to our customers.

Read More

Sustainability & Reliability

Locus Robotics is committed to global sustainability and reliability. As a technology leader, we actively support driving sustainability across all aspects of our business – from manufacturing to deployment, support, and maintenance.

Learn more about our Sustainability initiatives.

Read More

Availability

We ensure high availability by implementing disaster recovery strategies that prioritize resilience and rapid restoration. Our approach involves continuous monitoring, data redundancy, and automated failover mechanisms, all designed to minimize downtime and maintain seamless operations even in the face of unforeseen disruptions.

Read More

Patch Management

We apply security patches and updates to assets based on the risk vulnerabilities pose to data, assets, and business operations. 

Read More

Continuous Risk Mitigation

We prioritize remediation efforts based on risk assessments that leverage the context of the vulnerability, the complexity of the vulnerability exploit, and our resistance to the exploit through detective and preventive measures.  

Read More

Safety Attestations

We follow safety regulations and have confirmation of our safety protocols from the appropriate designations.

Read More

Data Protection

We protect all data, which encompasses personal data, PII, Protected Health information, sensitive and confidential data.

Read More