Whitepaper: Wiliot IoT Pixels and Cloud Privacy

Explore how Wiliot's secure, privacy-focused technology builds GDPR-compliant solutions by encrypting data, minimizing tag information, and offering secure data access controls.

Download the Whitepaper

What’s in the case study

Tha Challenges
To address the universal challenge of food waste, the grocery retailer wanted a view into how its time-and temperature-sensitive goods were transported and stored, aiming to improve its reputation for excellence by guaranteeing produce availability at peak freshness.

The Solutions
The Wiliot Intelligence Platform revolutionizes how grocery retailers monitor the temperature and location of their inventory, offering comprehensive insights down to the case level through automated, continuous monitoring and instant, actionable alerts.

How it Works

Wiliot IoT Pixels were applied to cases of strawberries, tracking their temperature and whereabouts from the distribution center, through transit, to multiple stores, providing high-resolution insights into the state of their goods.

The Outcome

The Wiliot Intelligence Platform promptly detected temperature and process compliance issues, allowing the retailer to tackle underlying problems as they arise, minimizing wasted inventory and ensuring fresher produce with more predictable availability.

The Benefits

Insights delivered by the Wiliot Intelligence Platform guaranteed that the retailer’s produce met the highest standards of freshness and quality, directly enhancing customer trust and enabling systematic elimination of food spoilage and waste causes.

What's in the Whitepaper

The Wiliot solution has been designed with privacy in mind.
The use of end-to-end encryption between Wiliot's Ambient IoT Pixels tags and the cloud, having no personal information on the tags, and zero logging on the tags, makes them a great building block for GDPR-compliant solutions.

In this whitepaper we detail the information that is stored on Wiliot tags, what can be seen by customers and third parties, how data is secured, and some of the principles applied to building private and secure solutions using Wiliot technology.