Overview
Welcome to CamGuard, an advanced security application designed to detect hidden cameras and analyze network vulnerabilities. This Privacy Policy explains how we collect, use, protect, and handle your information when you use our mobile application and related services.
Our Commitment
We are committed to protecting your privacy and ensuring the security of your personal information. This policy outlines our practices and your rights regarding data protection.
CamGuard provides sophisticated security features including:
- WiFi Network Scanning: Analysis of connected network devices and potential security vulnerabilities
- Hidden Camera Detection: AI-powered visual analysis to identify concealed surveillance devices
- Image Analysis: Advanced machine learning algorithms to detect suspicious objects in uploaded images
- Real-time Security Monitoring: Continuous monitoring of your network environment
Information We Collect
Personal Information
We collect the following personal information when you use CamGuard:
- Account Information: Email address, display name, profile picture (if provided)
- Authentication Data: Login credentials, authentication tokens, and session information
- Device Information: Device type, operating system version, app version, unique device identifiers
- Usage Analytics: App usage patterns, feature interactions, crash reports, and performance metrics
Technical Data
To provide our security services, we may collect technical information including:
- Network Information: WiFi network names (SSIDs), network security protocols, connected device metadata
- Scan Results: Device discovery data, network topology information, security assessment results
- Location Data: Approximate location (if permitted) to enhance network security analysis
- Camera Access: Camera permissions for visual scanning functionality (images are processed locally when possible)
Sensitive Data Notice
We understand that network scanning and image analysis involve sensitive information. We implement strict data minimization principles and process only the data necessary to provide our security services.
Network Scanning & Analysis
CamGuard's network scanning feature helps identify potential security vulnerabilities and hidden surveillance devices on your WiFi network.
What We Scan
- Connected Devices: Identification of devices connected to your network
- Device Types: Classification of devices (cameras, IoT devices, computers, mobile devices)
- Network Ports: Analysis of open ports and services that may indicate surveillance equipment
- Security Protocols: Assessment of network encryption and security configurations
Data Processing
Local Processing Priority
Network scanning is primarily performed locally on your device. Only anonymized metadata and security assessment results are transmitted to our servers for analysis and improvement of our detection algorithms.
Retention Period
Network scan results are stored locally on your device and automatically deleted after 30 days. Anonymized security statistics may be retained longer for research and algorithm improvement purposes.
Image Analysis & Processing
Our advanced image analysis feature uses AI and machine learning to detect hidden cameras and suspicious objects in photos you upload or capture.
How Image Analysis Works
- Local Analysis: Initial processing is performed on your device using on-device AI models
- Cloud Enhancement: For complex detection, encrypted images may be sent to our secure cloud infrastructure
- AI Detection: Advanced machine learning algorithms analyze visual patterns, reflections, and anomalies
- Result Generation: Detailed reports highlighting potential surveillance devices
Image Data Handling
Privacy-First Approach
- Images are encrypted during transmission and processing
- No images are stored permanently on our servers
- Processing data is automatically deleted within 24 hours
- You can opt for local-only processing in app settings
AI Model Training
To improve our detection accuracy, we may use anonymized and aggregated analysis results to train our AI models. No personal information or identifiable image content is used in this process.
Hidden Camera Detection
CamGuard employs multiple detection methods to identify concealed surveillance devices in your environment.
Detection Methods
- Network-Based Detection: Identification of camera devices connected to your network
- Visual Analysis: AI-powered detection of camera lenses, reflections, and typical hiding spots
- Infrared Detection: Analysis of infrared signatures that may indicate active cameras
- Pattern Recognition: Detection of surveillance device characteristics and behaviors
Detection Data
Camera detection results include:
- Device location and orientation estimates
- Confidence levels and detection reasoning
- Recommendations for verification and security measures
- Historical detection patterns for trend analysis
Detection Limitations
While our detection algorithms are highly advanced, no system is 100% accurate. CamGuard should be used as part of a comprehensive security assessment, not as the sole security measure.
How We Use Your Data
We use the collected information for the following purposes:
Primary Services
- Security Analysis: Performing network scans and vulnerability assessments
- Camera Detection: Identifying and analyzing potential surveillance devices
- Result Generation: Creating detailed security reports and recommendations
- Real-time Monitoring: Providing continuous security monitoring services
Service Improvement
- Algorithm Enhancement: Improving detection accuracy and reducing false positives
- Performance Optimization: Enhancing app speed and reliability
- Feature Development: Developing new security features based on user needs
- Quality Assurance: Monitoring service quality and identifying issues
Communication
- Security Alerts: Notifying you of potential security threats
- Service Updates: Informing you about new features and improvements
- Support Services: Providing customer support and technical assistance
- Legal Compliance: Meeting regulatory requirements and legal obligations
Data Storage & Security
Storage Infrastructure
Your data is stored using industry-leading security practices:
- Encryption: All data is encrypted in transit and at rest using AES-256 encryption
- Secure Servers: Data is hosted on secure, SOC 2 compliant cloud infrastructure
- Access Controls: Strict access controls limit data access to authorized personnel only
- Backup Systems: Regular encrypted backups ensure data integrity and availability
Data Retention
Retention Periods
- Account Data: Retained until account deletion
- Scan Results: 90 days (locally stored for 30 days)
- Image Processing Data: 24 hours maximum
- Analytics Data: 2 years (anonymized)
- Support Data: 3 years or until issue resolution
Geographic Storage
Data is primarily stored in secure data centers located in the United States and European Union, with appropriate data transfer safeguards in place for international users.
Data Sharing & Disclosure
We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following limited circumstances:
Service Providers
- Cloud Infrastructure: Secure hosting and data processing services
- Analytics Platforms: Anonymized usage analytics and performance monitoring
- AI Services: Machine learning and image analysis processing
- Communication Services: Email delivery and push notification services
Legal Requirements
We may disclose your information when required by law or to:
- Comply with legal processes, court orders, or governmental requests
- Protect and defend our rights and property
- Investigate potential violations of our terms of service
- Protect the safety of users and the public
Legal Disclosure Notice
In the event of a legal request for data, we will notify affected users unless prohibited by law or court order. We challenge overly broad requests and provide only the minimum data required by law.
Security Measures
We implement comprehensive security measures to protect your data:
Technical Safeguards
- End-to-End Encryption: All sensitive data is encrypted during transmission and storage
- Multi-Factor Authentication: Additional security layers for account access
- Regular Security Audits: Continuous monitoring and assessment of security systems
- Penetration Testing: Regular testing to identify and address vulnerabilities
- Incident Response: Comprehensive procedures for security incident management
Organizational Safeguards
- Employee Training: Regular security awareness and privacy training
- Access Controls: Role-based access to data and systems
- Background Checks: Thorough vetting of personnel with data access
- Data Minimization: Collection and retention of only necessary data
Security Certifications
Our infrastructure meets industry security standards including SOC 2 Type II, ISO 27001, and follows OWASP security guidelines for mobile applications.
Your Privacy Rights
You have several rights regarding your personal data:
Access and Control
- Access: Request a copy of your personal data
- Correction: Update or correct inaccurate information
- Deletion: Request deletion of your personal data
- Portability: Receive your data in a machine-readable format
- Restriction: Limit how we process your data
Consent Management
- Withdrawal: Withdraw consent for data processing at any time
- Opt-out: Unsubscribe from marketing communications
- Settings: Control data sharing and processing preferences in-app
How to Exercise Your Rights
Contact Methods
To exercise your privacy rights, contact us at info@whotechs.com or use the in-app privacy settings. We will respond to your request within 30 days.
Regional Rights
EU Residents (GDPR): Additional rights including objection to processing and complaint filing with supervisory authorities.
California Residents (CCPA): Rights to know, delete, and opt-out of sale of personal information.
Other Jurisdictions: Rights as provided under applicable local privacy laws.
Third-Party Services
CamGuard integrates with various third-party services to provide enhanced functionality:
Authentication Services
- Google Sign-In: Google account authentication (governed by Google's privacy policy)
- Apple Sign-In: Apple ID authentication (governed by Apple's privacy policy)
- Firebase Auth: Authentication infrastructure and user management
Analytics and Performance
- Firebase Analytics: App usage analytics and crash reporting
- Performance Monitoring: App performance and error tracking
- A/B Testing: Feature testing and optimization services
AI and Machine Learning
- Cloud Vision API: Image analysis and object detection
- Custom AI Models: Specialized camera detection algorithms
- TensorFlow Lite: On-device machine learning processing
Third-Party Policies
Third-party services have their own privacy policies and terms of service. We recommend reviewing these policies to understand how your data is handled by these services.
Policy Updates
We may update this Privacy Policy from time to time to reflect changes in our practices, technology, or legal requirements.
Notification of Changes
- Material Changes: 30-day advance notice via email and in-app notification
- Minor Updates: Notice through app updates and website posting
- Legal Changes: Immediate notice for legally required modifications
Continued Use
Continued use of CamGuard after policy updates constitutes acceptance of the new terms. If you disagree with changes, you may discontinue use and request data deletion.
Version History
Previous versions of our Privacy Policy are available upon request. We maintain a complete history of policy changes for transparency.
Contact Information
For questions, concerns, or requests regarding this Privacy Policy or your personal data, please contact us:
Get in Touch
Our privacy team is here to help with any questions or concerns about your data protection.
Response Times
- Privacy Requests: Within 30 days of receipt
- Security Concerns: Within 48 hours
- General Inquiries: Within 5 business days
- Urgent Matters: Within 24 hours
This Privacy Policy is effective as of January 2025 and governs your use of CamGuard mobile application and related services.