At SIMART Technology, we take the security of our products very seriously. If you’re a SIMART Technology customer, and you use our connected products, here is all the information you need to know about SIMART Technology’s product security principles.
Frequently asked questions about SIMART Technology data security
We do everything in our control to make sure the data we have in our system is used for one purpose: making your life easier with SIMART Technology products. Below are some answers to commonly asked questions regarding the security of the data we have at SIMART Technology
How do we secure our connected products?
At SIMART Technology, we take a defense-in-depth approach to security, adding multiple layers of protection around our robots, cloud and apps from start to finish. We ensure that the development of our products follows industry-standard security best practices, and we are using technology-leading tools to assist our development and security teams during this process. When deployed to market, we work with our suppliers and partners to ensure that our products and our suppliers’ and partners’ supporting infrastructure (including physical infrastructure, cloud and mobile apps) are properly configured, monitored and continuous security improvement processes are in place.
How do we handle your data?
How is data secure while in transit?
All SIMART Technology connected products communicate with the SIMART Technology cloud service using robust encryption. Currently, we use encryption and Transport Layer Security. Data encryption is augmented through strong identity management. All SIMART Technology connected products have identities when they come out of the factory and those identities are validated upon each new cloud connection.
How is data stored at rest?
Within SIMART Technology’s cloud (built on top of AWS), customer data is stored encrypted. Customer data has multiple encryption keys which are rotated on a regular basis to reduce the risk of the data being compromised even in the event of a key exposure.
Within the mobile application, data storage follows the platform’s standards for application-secure data; any sensitive data that is used by the application is not stored on the mobile device, but is instead securely transported to SIMART Technology’s cloud for storage.
How do we keep our products up-to-date and secure?
In conjunction with our security-minded development processes, SIMART Technology ensures that we monitor and adhere to all supplier and industry alerts regarding security patches to systems and components used in our products. Additionally, we actively promote and sponsor private bug bounty programs and hacking events to collaborate with the broad security research community to assist SIMART Technology to responsibly address any vulnerabilities that may be discovered in our products.
How are the robots securely updated in the home?
When a robot requires an update, the robots are notified of the available update when they interact with the cloud and connect to a secure location to download a software update. The connection is authenticated to ensure it is the official SIMART Technology location. Each download is cryptographically signed to assure it is an official SIMART Technology update.
How do we secure the ‘SIMART Technology App?
The mobile SIMART Techonology application is built to the security standards as specified by the manufacturers of the operating systems and devices (Apple iOS, Android, Samsung, etc.), and include advanced obfuscation tools to limit reverse-engineering by malicious users. The mobile apps are sold only through qualified application stores from these same manufacturers, and users should only install the app from these sites.
How do we secure maps and map data?
SIMART Techonology considers maps of the home to be your sensitive, confidential information. Maps are protected following the industry standard guidelines to ensure the security of this data just like any other personal data. In addition to the standards mentioned above for encryption at-rest and in-flight, access to this data is tightly controlled, monitored and regularly audited. SIMART Techonology machines accessing this data have data-leak prevention software installed to ensure the data is tracked as it is accessed for use in customer support and robot improvement processes.
How secure is using an app not provided by SIMART Robot?
SIMART Techonology embraces innovation and lets third-party software interact with our products when that software presents the correct credentials. As a result, independent developers are able to create tools and accessories that may create an enhanced user experience for you. While the security of your data produced by your robot and stored in the SIMART Techonology cloud remain safe, SIMART Techonology recommends you to verify the third-party documents on how your data is handled.
What personal information do we collect?
In order to provide you with our services, we will ask you to provide the personal data necessary for such services. If you do not provide personal data, we cannot provide you with relevant products or services.
Information you voluntarily provide to us
Account Data: When you sign up for or log into an account with us, we collect your account number and contact information such as your email address, phone number, username and login. During your interaction with our products, we also collect the nickname, avatar, country code, language preference or time zone information from your account.
Feedback: When you use the feedback and suggestion functions in our products, we collect your e-mail address, mobile phone number, and feedback content to deal with your problems and equipment malfunctions in a timely manner.
At the same time, according to different application products and services, we collect relevant and necessary personal information to provide you with products and services.
Information collected based on additional features provided
We will collect and use your personal information in the following additional services provided to you in order to provide you with more convenient and better products and/or services and to improve your experience. Failure to provide this information will not affect your use of the [Simart App] core services, but you will not receive the user experience these additional services bring to you. These additional services include:
1) Additional services based on location information:
When you enable the positioning function of your mobile device through system authorization and use location-based services, we will collect and use your location information so that you can use the [Pampering App] feature to configure the network with your smart device. When you use certain of our products or services (such as weather services), we collect real-time precise or imprecise geolocation information about you based on your consent. To stop us from collecting your location information, you can turn off the location service on your mobile device’s system.
2) Additional services based on cameras/cameras:
You can use this function to scan the code after activating the camera/camera permission to add your purchased equipment, take video and other functions. Please only use the camera/camera by scanning codes, shooting etc, even if you have agreed to open the camera/camera permission. Know that we will receive information when you actively use it.
3) Additional services for photo/video access and upload based on photo album (image library/video library):
You can use this function to upload your photos/images/videos after enabling photo album permission to perform functions such as changing avatar, reporting device usage issues and providing evidence. We will not identify this information when you use functions such as your avatar, but when you report device usage issues, we will use the photos/images you upload to find your issue.
4) Additional services related to microphone-based audio technology:
After enabling the microphone permission, you will be able to shoot videos, wake up voice assistants, etc. You can use the microphone to implement audio functions. In these functions, we will collect your voice information to determine your command needs. Please note that even if you have agreed to turn on the microphone permission, we will only receive audio information through the microphone when you actively click the microphone icon in the application or record a video.
5) Additional services based on storage permissions:
We apply to you for this permission to ensure stable operation of the client. After enabling us to read/write your device storage, we will read and write images, files, crash log information and other necessary information from your device storage to provide you information broadcast or save crash log information locally.
6) The application provides additional services based on address book information, SMS, caller information, calendar, etc. other additional services such as:
You understand and agree that the above additional services require you to enable your location (geo), camera (camera), photo album (picture library), microphone (audio), address book, calendar, and/or phone status on your device. Access rights to carry out the collection and use of information covered by these rights. You can check the status of the above permissions item by item in your device settings and you can choose whether to turn these permissions on or off at any time.
Information we collect automatically
Device information: When you interact with our products, we automatically collect device information, Device information, to enable you to use our services normally, to maintain the normal operation of our services, to improve and optimize our service experience, and to protect your account security. model, operating system, device hardware serial number (referring to a set of strings programmed into the device by the device manufacturer as a unique device identifier), Android ID, login IP address, wireless connection information, operating system type and version, application version number, push notification identifier, log files, and mobile network information.
Usage Data: During your interactions with our Sites and Services, we automatically collect Usage Data regarding visits, clicks, downloads, sent/received messages and other uses of our Sites and Services.
Log information: When you use our application, your IP address, language used, operating system version, access date or time, etc. System and exception logs will be loaded.
Please note that individual device information and service log information cannot identify a specific natural person. If we combine such non-personal information with other information or use it in conjunction with personal information to identify a specific natural person, such non-personal information will be considered personal information unless authorized by you. Where required by law and regulation, we will anonymize such information and hide identity information.
Location information: When you enable the positioning function of your mobile device through system authorization and use location-based services, we will collect and use your location information so that you can use the Please enter application name to configure the network. smart device. When you use certain of our products or services (for example, please enter the product name), we collect real-time precise or imprecise geolocation information about you, based on your consent. To stop us from collecting your location information, you can turn off the location service on your mobile device’s system.
Future products and security
The landscape of security threats is ever evolving, as is the security at SIMART Techonology. SIMART Techonology continuously trains, researches, and exercises processes that improve the maturity of the company’s overall ability to identify, react to, isolate and resolve security issues within our company and our products as quickly as possible.
Any additional questions, please email us at email@example.com.