We are committed to being transparent about our practices so that you are always well informed when using our products and services.
You are the only one who has full control of your data, and we ensure you customize your privacy preferences in an easy, straightforward way.
We strictly comply with global privacy laws and regulations, and improve our practices to meet and exceed industry standards.
We take responsibility for building comprehensive systems and effective procedures to secure and protect your data.
We develop reliable, stable security infrastructure to detect and shield your data from threats, so your use of EZVIZ products and services always stays private and safe.
We design easy-to-use functions and privacy features, as well as flexible user settings, so you can customize your privacy preferences and manage your data with confidence.
Our security practices have been rigorously tested and certified by third-party agencies in the fields of information security, personal data protection and cloud security.
One of the most widely accepted, respected, and rigorous information security management standards in the world.
Demonstrates that EZVIZ is capable of providing a cloud environment that effectively implements information security controls for cloud computing.
Certifies high level of privacy protection controls for user personally identifiable information (PII) in the cloud.
A latest best practice with a truly international approach to privacy protection, urging compliance with international laws and regulations.
Provides guiding standards for building the most authoritative privacy management system recognized by the industry.
The international standard that enables organizations to apply the right IT service management procedures for reliable, efficient services.
Provides guiding principles on the effective, efficient, and acceptable use of data within the organization.
Proves EZVIZ’s stable service capability to provide mature and high-quality products and services continuously.
An enhanced edition to the ISO 27001 and one of the most powerful security assurance program for cloud computing.
An independent audit report that evaluates how the company safeguards data and the cloud with effective internal controls.
Last update in February 2024