Resident Help Center

Categories

How vulnerable are my devices to security breaches?   

You are here:

We follow strict data security protocols to ensure that your personal information is never compromised. All our devices are designed to handle data as safely as possible, with maximum security against breaches.

What we are currently doing to combat potential security breaches 

  1. We funnel our device communications through the latest Zigbee 3.0 protocol. This protocol includes data encryption and data access limitations (confined to a small local area radius). 
  2. Our cloud service was built and deployed over Amazon Web Service (AWS), a powerful platform that supports many Fortune 500 companies. We go beyond industry-standard data storage security protocols to protect your information. Read more about AWS’s security measures here.    
  3. We also follow encryption protocols (e.g., AES-128, RSA-1024, etc.) in all our cloud data communications, ensuring the highest level of security for all data transmissions between devices and the cloud.