Privacy & Security

Security & Privacy
Built-In, Not Bolted-On

Enterprise-grade security and privacy controls to protect your data and comply with global regulations. Your data never leaves your premises.

Our Security Principles

Security and privacy are fundamental to everything we build

On-Premise Only

All AI processing happens on your infrastructure. Zero cloud dependencies.

Data Encryption

End-to-end encryption for data at rest and in transit using industry standards.

Privacy by Design

Privacy controls built into every feature from the ground up.

Compliance Ready

GDPR, CCPA, BIPA compliant with comprehensive audit trails.

Technical Security Measures

Enterprise-grade security architecture

Data Protection

Encryption at Rest

AES-256 encryption for all stored data including video, face embeddings, and databases

Encryption in Transit

TLS 1.3 for all network communications between components

Secure Storage

Encrypted file systems with key management and rotation

Data Isolation

Multi-tenant architecture with complete data separation

Access Control

Role-Based Access Control (RBAC)

Granular permissions system with customizable roles

Multi-Factor Authentication

Optional 2FA/MFA support for enhanced security

Session Management

Secure JWT tokens with automatic expiration

SSO Integration

SAML 2.0 and OAuth 2.0 support for enterprise SSO

Network Security

Firewall Support

Works behind corporate firewalls with configurable ports

VPN Compatible

Full support for VPN and air-gapped deployments

Network Isolation

Separate networks for management and video traffic

DDoS Protection

Rate limiting and connection management

Audit & Monitoring

Complete Audit Logs

Detailed logs of all user actions and system events

Compliance Reporting

Generate compliance reports for audits

Intrusion Detection

Monitor for suspicious activities and anomalies

System Health Monitoring

Real-time monitoring of system security status

Compliance & Regulations

Built to meet global privacy and data protection standards

GDPR

General Data Protection Regulation

European Union

  • Right to erasure (delete face data)
  • Data portability and export
  • Consent management
  • Data processing records
  • Privacy impact assessments

CCPA

California Consumer Privacy Act

California, USA

  • Consumer data requests (DSAR)
  • Opt-out mechanisms
  • Data disclosure reports
  • Data deletion capabilities
  • Privacy policy compliance

BIPA

Biometric Information Privacy Act

Illinois, USA

  • Biometric data consent
  • Retention schedules
  • Disclosure policies
  • Secure storage requirements
  • Destruction protocols

Additional Compliance Support

We also support industry-specific regulations including HIPAA (healthcare), FERPA (education), and various government security standards. Contact us to discuss your specific compliance requirements.

Privacy-First Features

Powerful capabilities that respect privacy

Automatic Data Retention

Configure automatic deletion of old video footage and face data based on your policies

Privacy Zones

Mask or blur sensitive areas in video feeds to protect privacy

Anonymization

Option to anonymize faces and people in recordings for non-security use cases

Access Logging

Complete audit trail of who accessed what data and when

Data Minimization

Only collect and store data necessary for your specific use case

User Consent Management

Built-in consent tracking and management for face recognition

Our Security Commitments

Regular security audits and penetration testing
Secure development lifecycle (SDL)
Vulnerability disclosure program
Regular security patches and updates
Security training for all employees
Incident response procedures
Data backup and disaster recovery
Third-party security assessments
Continuous monitoring and improvement

Questions About Security?

Our security team is happy to discuss your specific requirements