Legal & Compliance

Privacy Policy

Document hash: a8a490e75caf2f24...

Privacy Policy

PerimeterEye, Inc.Effective Date: 05/15/2026Last Updated: 05/15/2026

1. Introduction

This Privacy Policy explains how PerimeterEye (“PerimeterEye,” “Company,” “we,” “our,” or “us”) collects, uses, stores, shares, and protects information collected through our AI-powered security platform, including our website, mobile applications, cloud platform, hardware devices, monitoring systems, and related services (collectively, the “Services”).

By accessing or using the Services, you acknowledge that you have read and understood this Privacy Policy.

2. Information We Collect

We may collect the following categories of information:

A. Account & Customer Information

Name

Email address

Phone number

Billing address

Shipping address

Payment information

Account credentials

Business/company information

Installation location details

B. Device & System Information

IP addresses

Device identifiers

Browser information

Mobile device information

Operating system details

Application usage logs

Camera/device serial numbers

Kiosk identifiers

Firmware versions

Local network diagnostics

C. Security & Monitoring Data

Video footage

Audio recordings

Motion events

AI-generated alerts

Event history

Snapshot images

Threat classifications

Spotlight tracking metadata

Object/person detection metadata

License plate recognition data (if enabled)

Delivery event metadata

Environmental and motion telemetry

D. AI & Analytics Data

AI-generated event summaries

Threat analysis outputs

Behavioral analysis metadata

System performance telemetry

Diagnostic logs

Model feedback data

Escalation history

User interaction analytics

E. Payment & Financial Data

Payment processing information is handled by third-party payment processors. We do not directly store complete payment card numbers.

3. How We Use Information

We may use collected information to:

Provide and operate the Services

Process payments and subscriptions

Deliver AI monitoring functionality

Improve detection accuracy

Train and refine AI systems

Provide customer support

Diagnose hardware/software issues

Prevent fraud or abuse

Enforce agreements and policies

Comply with legal obligations

Respond to emergencies

Conduct internal analytics

Develop future products and features

4. Video, Audio & AI Analytics Disclosures

PerimeterEye utilizes advanced AI-assisted monitoring technologies.

Our systems may process:

Video footage

Audio recordings

Motion analytics

Object detection

Facial attributes

Vehicle characteristics

Behavioral analysis

Threat classification

Delivery verification workflows

AI systems may automatically:

Detect humans, animals, vehicles, and objects

Generate threat assessments

Track movement patterns

Trigger automated alerts

Analyze behavioral indicators

Generate event summaries

Recommend escalation actions

AI-generated outputs may contain inaccuracies, false positives, or incomplete assessments. Users remain responsible for reviewing critical security decisions.

5. Biometric & Facial Recognition Disclosure

Certain current or future features may involve biometric technologies, including:

Facial detection

Facial comparison

Facial recognition

Identity matching

Behavioral profiling

Gait or appearance analysis

Where required by applicable law, PerimeterEye will obtain necessary consents before enabling biometric processing features.

Biometric-related data may be:

Processed locally on edge devices

Processed in cloud environments

Retained temporarily for verification workflows

Deleted in accordance with retention policies

Users may disable certain biometric-related features where available.

6. Data Storage & Cloud Infrastructure

PerimeterEye may store or process information using:

Local edge processing devices

Cloud servers

Third-party infrastructure providers

Distributed content delivery systems

Backup and disaster recovery systems

Cloud storage regions may include:

United States

Canada

European Union

Other jurisdictions where our providers operate infrastructure

Data may be transferred across borders where legally permitted.

7. Third-Party Processors & Vendors

We may use third-party providers for:

Cloud hosting

AI processing

Payment processing

Customer support

Data analytics

Device provisioning

Email delivery

Push notifications

Monitoring infrastructure

Security auditing

Third-party processors may include providers such as:

Amazon Web Services (AWS)

Stripe

OpenAI

Google Cloud / Gemini

Other subcontractors, vendors, or infrastructure partners

These providers may process information on our behalf subject to contractual protections.

8. Anonymized & Aggregated Analytics

We may use anonymized, aggregated, de-identified, or non-personally identifiable data for:

AI model improvement

Product development

Security research

Detection tuning

Benchmarking

Operational analytics

Marketing analytics

System optimization

Where feasible, personally identifying elements will be removed prior to analysis.

9. Optional Data Sharing for Product Improvement

Users may optionally opt into programs that allow PerimeterEye to access:

Flagged events

Selected camera footage

AI escalation events

Diagnostic recordings

Support-related logs

This information may be used to:

Improve AI detection accuracy

Reduce false positives

Enhance product performance

Train future AI models

Improve customer support

Participation is voluntary and may be revoked where supported.

10. Data Retention Policies

We retain information for varying periods depending on:

User settings

Subscription tier

Legal requirements

Operational necessity

Security investigations

Backup policies

Examples may include:

Video recordings

Event history

AI analytics logs

Billing records

Customer support records

Certain data may persist in backups, archived systems, or legal hold environments for additional periods.

11. Retention & Deletion Requests

Users may request:

Access to their data

Correction of inaccurate information

Export of certain data

Deletion of eligible information

Deletion requests may be submitted through:

Account settings

Customer support

Privacy contact channels

We may deny deletion requests where retention is necessary for:

Legal compliance

Security investigations

Fraud prevention

Contract enforcement

Backup integrity

Legitimate business purposes

12. User Rights

Depending on jurisdiction, users may have rights including:

Access rights

Correction rights

Deletion rights

Portability rights

Restriction rights

Objection rights

Consent withdrawal rights

Additional state, national, or international privacy rights may apply.

13. Law Enforcement & Emergency Disclosure Rights

PerimeterEye may preserve, disclose, or provide information where we believe disclosure is necessary to:

Comply with law

Respond to subpoenas or legal process

Protect safety or property

Investigate threats or illegal activity

Prevent fraud or abuse

Assist emergency responders

Enforce agreements or policies

We may disclose information without prior notice where legally permitted or where urgent safety concerns exist.

14. Law Enforcement Response Procedures

PerimeterEye may:

Review legal requests for validity

Require appropriate legal process

Preserve relevant records

Cooperate with emergency requests

Challenge overbroad requests where appropriate

Emergency disclosures may occur where we reasonably believe there is imminent risk of death, injury, or serious harm.

15. Security Measures

We implement administrative, technical, and physical safeguards including:

Encryption

Access controls

Network monitoring

Authentication systems

Audit logging

Segmented infrastructure

Secure cloud environments

However, no system is completely secure, and we cannot guarantee absolute security.

16. Children’s Privacy

The Services are not directed toward children under 13 years old. We do not knowingly collect personal information from children without legally required consent.

17. International Users

Users accessing the Services from outside the United States acknowledge that information may be transferred to and processed in jurisdictions with different privacy laws.

18. Changes to This Privacy Policy

We may update this Privacy Policy periodically. Updated versions become effective upon posting. Continued use of the Services after updates constitutes acceptance of the revised policy.

19. Contact Information

For privacy-related inquiries, contact:

PerimeterEye, LLC.Email: [email protected]