Updated on 2024-05-16 GMT+08:00

Security Features

IVM complies with security regulations, adheres to service boundaries, and will never monetize customer data.

Access Control

IVM authenticates users' access to devices, media data, and alarm data, to prevent data and privacy breaches.

Encrypted Transmission

Signaling and media are encrypted for transmission between devices and IVM. Your accesses to IVM APIs adopt secure channels for requests and responses.

Encrypted Storage

Storage services (including image, media, and data storage) provided by IVM encrypt sensitive and private data before storage.

Data Deletion

After a user is deregistered, all data related to the user is deleted and cannot be restored.

If you stop using this service, any backup data for disaster recovery will be deleted within seven days.