Built for Safety. Powered by Trust.
A look into our security and data handling standards.
Data Encryption
At Rest
- • AES-256 encryption for stored data
- • Secure key management system
- • Regular encryption key rotation
In Transit
- • TLS 1.3 for all communications
- • End-to-end encryption for sensitive data
- • Certificate pinning for API requests
Access Control
Role-Based Access
Our internal teams follow strict role-based access control:
- • Granular permission system for team access
- • Regular access reviews and audits
- • No external third-party sharing without explicit consent
Auth & Account Protection
Authentication
- • Google/Microsoft Authenticator support
- • Biometric authentication options
- • Multi-factor authentication (MFA)
Session Management
- • Secure token-based sessions
- • Automatic session expiry
- • Device-based authentication
Hardware Safety
Device Security
Our hardware components are designed with safety in mind:
- • Wearable device tested for comfort and safety standards
- • Battery protection circuits for overcharge prevention
- • Certified charger compatibility requirements
- • Regular firmware security updates
User Protections
Privacy Controls
- • Opt-in camera usage with permissions
- • Local-only AI model processing
- • Data minimization practices
Data Control
- • User data export capabilities
- • Account deletion options
- • Transparent data usage policies
Incident Handling
Response Protocol
Our incident response plan includes:
- • Immediate user notification for security events
- • Automated threat detection and response
- • Regular backup and recovery testing
- • Detailed incident documentation and analysis