Security Features
IVM complies with security regulations, adheres to service boundaries, and will never monetize customer data.
Access Control
IVM authenticates users' access to devices, media data, and alarm data, to prevent data and privacy breaches.
Encrypted Transmission
Signaling and media are encrypted for transmission between devices and IVM. Your accesses to IVM APIs adopt secure channels for requests and responses.
Encrypted Storage
Storage services (including image, media, and data storage) provided by IVM encrypt sensitive and private data before storage.
Data Deletion
After a user is deregistered, all data related to the user is deleted and cannot be restored.
If you stop using this service, any backup data for disaster recovery will be deleted within seven days.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot