What its like Data privacy and security in Unleash Live?

We believe in providing transparency with regard to how your data is managed,  more details can be found in our privacy policy found on our website.

Guiding Principles

  • Our customers own the data streamed and stored on the Unleash live platform and provide Unleash live access to improve our service
  • Our customers own the analyzed data derived from running A.I. models on Unleash live
  • Our customers own the A.I. models they build and deploy on the platform
  • A.I. developers own the IP to the models they’ve built and deployed on Unleash live
  • Unleash live does not identify individuals

Data Storage

Unleash live is built on the Industry-leading performance, scalability, availability, and durability of Amazon’s AWS service similar to some of the biggest firms on the Internet, such as Verizon, Netflix, Expedia, and Airbnb.

Data is stored on Amazon S3, highly secure and scalable with millisecond latency for data access. S3 is optimized for performance and agility to store ingested video and imagery with high levels of durability which means data is available when needed and protected against failures, errors, and threats.

Data is located in Australia and can be mirrored in your local region to comply with local regulations. If your business is an existing AWS customer, Unleash live can also store the data on your enterprise cloud account.  Get in touch to find out more.

Data Privacy & Ownership

Privacy and trust are of our utmost concern. All our enterprise customers own their data but merely provide Unleash live access to improve the service.

For an additional layer of privacy, data is also stored and classified into two categories: customer content and account information.

Data Security

Unleash live adheres and complies with security standards provided by AWS.

  • TLS v1.2 Encryption
  • Streaming sessions with secret tokens

In conclusion, Unleash live prioritizes data privacy and security to safeguard user information. Here are some key aspects of data privacy and security in Unleash live:

  1. Data Encryption: Unleash Live employs strong encryption techniques, such as TLS v1.2 (Transport Layer Security), to protect data during transmission. This ensures that sensitive information remains secure and inaccessible to unauthorized parties.

  2. Access Control: The platform implements strict access control measures, allowing only authorized individuals to access and manage data. User authentication mechanisms, such as username/password combinations, help ensure that only authorized users can access the platform and its features.

  3. Secure Storage: Unleash Live stores data in secure environments, utilizing industry-standard security practices to protect against unauthorized access. Robust security measures, such as firewalls, intrusion detection systems, and regular security audits, help maintain the integrity and confidentiality of stored data.

  4. Compliance with Regulations: Unleash Live adheres to relevant data privacy regulations, such as GDPR (General Data Protection Regulation) or CCPA (California Consumer Privacy Act), depending on the jurisdiction. Compliance with these regulations helps ensure that user data is collected, stored, and processed in a lawful and transparent manner.

  5. Data Minimization: Unleash Live follows the principle of data minimization, collecting only the necessary data required to provide its services. By limiting the collection and retention of personal information, the platform minimizes the potential risk associated with data breaches or unauthorized access.

  6. Regular Audits and Security Updates: Unleash Live conducts regular security audits and assessments to identify and address potential vulnerabilities. The platform also keeps up with security updates and patches to mitigate emerging threats and ensure ongoing data protection.

It's important to note that while Unleash live takes significant measures to protect data privacy and security, users should also follow best practices, such as using strong and unique passwords, keeping their access credentials confidential, and being cautious with sharing sensitive information.

If you have any further questions, just get in touch to find out more.