Privacy Policy

Your video footage never leaves your premises. We only process anonymous numerical data about occupancy - nothing more.

Last updated: September 2025

Your Video Never Leaves Your Premises
100% on-site processing with zero video transmission

No video footage ever leaves your business grounds. Period.

Our edge AI devices process all video streams locally on your premises using advanced computer vision. The cameras analyze traffic patterns in real-time and convert this visual information into simple numerical data - occupancy counts, dwell times, and traffic flow metrics.

Only these anonymous numbers are transmitted from your venue - never images, never video, never any visual data. We literally cannot see your venue, your customers, or your operations. Your existing security systems remain completely isolated and unaffected.

Your Data Stays Private
We do not sell or share your information

We do not sell, rent, or share your information with third parties for commercial purposes. Any data you choose to integrate from point-of-sale systems or other business tools remains confidential and is used solely to provide you with occupancy insights.

All integrations are optional and under your complete control. You decide what data to share and can revoke access at any time through your dashboard.

Anonymous Occupancy Metrics Only
Just numbers - no faces, no tracking, no identification

Our on-premise AI converts video into pure numerical data: "15 people in dining area," "3-minute average wait time," "70% table occupancy." That's it. No facial recognition, no demographic profiling, no individual tracking.

We cannot and do not identify who visits your venue. Every person is simply counted as an anonymous unit in occupancy calculations. The AI sees people only as anonymous objects for counting - nothing more.

Enterprise-Grade Security
OWASP compliant with industry-standard encryption

All sensitive information is protected using industry-standard encryption both in transit and at rest. Our platform implements OWASP compliance standards with multi-layered security protocols.

Every request to our servers is authenticated and validated through secure API keys and OAuth protocols. We conduct regular security audits and maintain SOC 2 compliance standards to ensure your data remains protected.

Questions About Privacy?
We believe transparency is essential for trust

If you have any questions about our privacy practices or would like to discuss your specific security requirements, our team is here to help.