Your privacy and security
is important to us
The information security and privacy protection of users have always been regarded as the first priority of our enterprise production. Your experience in using AiDot products, such as using AiDot Cameras to record family conditions, turning off lights through the AiDot application,and storing data in the AiDot cloud... All background activities should be carried out under your thought and control. We keep this in mind: your privacy is crucial to us.
We collect, use, store and destroy your personal information in strict accordance with our privacy policy and terms. All our products and services always provide links to the corresponding privacy policies, so that you can understand how we handle your data when you use our products. We will always explain why we need to process your information and start collecting and processing after receiving your consent. If there is a new purpose, or we need to collect more personal information, we will notify you of such situation and ask for your consent again. You have the right to access, correct or delete the personal information stored by us.
Data MinimizationData Minimization
In order to provide you with our services, we only collect personal necessary information as little as possible. In order to further protect your privacy, we will process data locally on your device as much as possible to reduce the amount of personal information we upload to the server.
Data Minimization
Clear PurposeClear Purpose
We will only collect your personal information for a reasonable and legal purpose when necessary. We will not use the collected data for any purpose that you have not agreed to, and will not further process it.
Clear Purpose
In order to protect users' privacy, we will use encryption throughout the generation, transmission and storage of users' privacy data to ensure that users' privacy data is protected safely.
In order to ensure that our safety practices reach the highest level of quality and depth, AiDot maintains various certifications and annual audits. At the same time, a professional evaluation team is invited to supervise the process of product design, research and development, testing and release to ensure that the product strictly complies with all privacy-related agreements.
We have clearly defined the responsibilities of each department and individual in the process of data collection, use, storage, sharing, disclosure, transmission and destruction. Adopt reasonable processes to ensure the traceability of data throughout its life cycle.
Global Data Centers
As of April 2023, AiDot has a total of 4 data centers worldwide, located in Central Europe (Frankfurt), Western Europe (Ireland), Western United States (Oregon), and Eastern United States (northern Virginia).
Global Data Centers
All-round Safety Protection
As a smart Internet of Things solution provider, it is AiDot's important responsibility to protect users' equipment, services and privacy information. The company has adopted a variety of security measures to provide comprehensive security protection for users and equipment.
Security Controls
Data Access Controls
Data Privacy Controls
Infrastructure Security
Security Controls
AiDot's "full stack" security philosophy employs a wide range of leading edge security measures focused on user authentication, transmission, and intrusion prevention. These security measures include:
Devices authenticated with a unique key pair
Encrypted LAN Mode communication between mobile application and device
Data encryption - HTTPS encrypted with TLS, UDP channel with AES-128 encryption
Layered access control to prevent breaches of one device compromising the whole system
Penetration tests by 3rd party vendor
Data Access Controls
Connected products and the data they generate will typically be accessed by a variety of different individuals, including friends or family, customer support teams, product operation teams, business analysts, and more. To ensure the right people have access to the appropriate data, AiDot provides a wide range of access controls. These controls include:
The role-based access (RBAC) framework and hierarchical access control mechanism are adopted to define the user-defined roles and access rights of equipment and user data (for all ODM organizations and external parties). Prevent the damage of one equipment from endangering the whole system
Secure sharing of devices among family members or guests
End-user can opt-in to share their device data with partner services, such as energy management or replenishment services
Tracking of data access for auditing and compliance purposes
Data Privacy Controls
Maintaining the privacy of consumer data is a growing concern world-wide. AiDot supports our customers in their commitment to enable the highest level of privacy standards for their market with a strong set of privacy tools. These include:
Role Based Access (RBAC) framework to define custom roles and access permissions for device and user data (for both the ODM organization and external parties)
Data ownership tied to registered owner of the device with role-based access for ODM staff
GDPR-ready Dashboard UI to protect access to personally identifiable information (PII)
Infrastructure Security
Securing customer data and their virtualized devices from malicious attacks or theft is a major focus of the AiDot security team. We deploy a number of leading edge security measures across the various cloud infrastructure providers that our platform runs on (e.g., AWS, Azure). These measures include:
Services deployed within a VPC, with service and databases installed in different subnets
Compute instances not directly accessible from the internet and run intrusion detection systems
GFirewalls to protect services at the network level
DDoS filters and web application firewalls employed
Proof of Privacy Security
In order to ensure that the quality, security and privacy of the enterprise management and enterprise products are at the forefront of the world, AiDot has completed a series of enterprise system certification and product compliance certification.
Quality Management Systems ISO 9001
Quality Management Systems ISO 9001
Information Security Management ISO 27001
Information Security Management ISO 27001
Cloud Security ISO 27017
Cloud Security ISO 27017
Cloud Privacy ISO 27018
Cloud Privacy ISO 27018
GDPR Privacy Protection Compliant
GDPR Privacy Protection Compliant
CCPA Privacy Protection Compliant
CCPA Privacy Protection Compliant
ioXt  Manufacturer Certified
ioXt Manufacturer Certified
TUV Rhine Security Privacy Certification
TUV Rhine Security Privacy Certification
Google Mobile Application Security Assessment
Google Mobile Application Security Assessment
Some Common Privacy Security Issues
1. When does the AiDot camera record or store my video?
When the AiDot camera device detects motion, people or abnormal behavior, it records and stores video locally. If you subscribe to our cloud storage service, your video will be safely stored in the cloud and can be deleted at any time. When your video storage exceeds your planned storage period, our server will automatically and permanently delete your video.
2. How can I access and view my recordings?
You can access, view, download and delete stored videos through the AiDot application.
3. How secure are my recordings?
We are committed to protecting your personal data security. Your video is stored locally and AES encrypted via AiDot device. You need to log in to your account using the AiDot application to view videos. If you use cloud storage, data will be encrypted and stored between the device and AWS (Amazon Web Services). In addition, your data is protected by TLS (Transport Layer Security) and SRTP (Secure Real Time Transport Protocol). AWS also encrypts the video stored in AWS to provide additional data protection.
4. Does AiDot share video recordings with third parties, such as law enforcement?
When using local storage, AiDot cannot access the user's video record. If the user chooses our cloud storage service, AiDot will not share the user's video content without the user's written consent, even if it needs to comply with effective legal orders.
5. Can AiDot team members activate and view my live stream?
No. AiDot team members cannot activate and view live streams from your AiDot devices.

Privacy and Security Issue

If you think you have found AiDot security problems in any of our services or devices, we welcome you to email or submit a report to the Amazon Vulnerability Research Program by visiting

Privacy Notice

Take a more detailed look at our privacy notice by clicking here.