Privacy Policy
1. Purpose and Commitment
Zenn Group LLC ("Company," "we," "us," or "our") is committed to protecting privacy, civil liberties, and sensitive information while delivering secure monitoring, video analytics, and license plate recognition services.
This Privacy Policy describes how we collect, use, store, disclose, and safeguard information in connection with:
- Our web applications
- Mobile applications
- Cloud platform
- Edge devices and sensors
- Customer deployments
- Support and operational services
Our Services are used by government agencies, commercial enterprises, infrastructure operators, and public organizations to support safety, security, operational awareness, and incident response.
2. Applicability and Roles
Depending on deployment:
- Customers typically act as Data Controllers or System Owners
- We act as a Service Provider / Data Processor / Contractor
Customers determine surveillance scope, retention, and operational use. Individuals with questions about monitoring at a site should contact the deploying organization.
3. Legal and Regulatory Alignment
We design our Services to support compliance with applicable laws and frameworks, including:
- U.S. Privacy Act principles
- State privacy laws (e.g., CCPA/CPRA where applicable)
- Law enforcement and public safety regulations
- Contractual obligations
- International data transfer requirements
- Government cybersecurity and privacy control baselines
4. Information We Collect
Customer and User Information
- Names and business contact details
- Organization affiliation
- Account credentials
- Roles and permissions
- Support records
- Billing and subscription data
Operational Monitoring Data
Our platform processes data from cameras and sensors, including:
- Video recordings
- Still images
- Event clips
- Environmental telemetry
- Time and location metadata
- Incident logs
License Plate Recognition Data
Where enabled:
- License plate numbers
- Plate images
- Vehicle characteristics
- Detection timestamps
- Geolocation or camera location
- Watchlist alerts
System and Security Logs
- Access logs
- Audit trails
- Device identifiers
- Network telemetry
- Diagnostic data
Optional Location Data
- Device location for operational functions (if enabled)
5. Purpose of Processing
We process information to:
- Provide real-time monitoring and alerting
- Enable incident investigation
- Support public safety and security operations
- Detect threats or anomalies
- Maintain system integrity
- Perform analytics requested by customers
- Fulfill contractual obligations
- Manage subscriptions
- Provide technical support
- Improve platform performance
- Comply with legal obligations
6. Privacy by Design and Minimization
We implement privacy engineering practices including:
- Data minimization
- Configurable retention controls
- Role-based access
- Segmentation between tenants
- Auditability
- Encryption controls
- Least privilege principles
Customers control deployment scope and operational policies.
7. Data Sharing and Disclosure
We may disclose information to:
- Authorized customer personnel
- Cloud and infrastructure providers
- Sub processors under contractual controls
- Integration partners approved by customers
- Regulators or law enforcement where legally required
- Auditors and oversight bodies
- Successors in a merger or acquisition
We do not sell personal information.
8. Government and Law Enforcement Use
When deployed by public agencies:
- Data may be used for investigations, public safety, regulatory enforcement, or emergency response
- Use is governed by agency policies, legal authorities, and applicable oversight
9. Security Safeguards
We maintain administrative, technical, and physical safeguards including:
- Encryption in transit and at rest
- Identity and access management
- Multi-factor authentication
- Continuous monitoring
- Vulnerability management
- Logging and audit trails
- Incident response procedures
- Network segmentation
- Secure development lifecycle practices
10. Protection Against Misuse and Bias
We implement measures to reduce risk of improper use, including:
- Role-based access controls
- Audit logging
- Monitoring for anomalous access
- Training expectations for authorized users
- Documentation emphasizing lawful use
We prohibit use of our technology to target individuals or groups solely based on protected characteristics such as:
- Race
- Religion
- National origin
- Political beliefs
- Protected speech
11. Data Retention
Retention is determined by:
- Customer configuration
- Contract requirements
- Legal obligations
- Investigative needs
Data may be deleted, archived, or anonymized based on policy.
12. International Data Transfers
Data may be processed in the United States and other jurisdictions where we or our service providers operate, subject to appropriate safeguards.
13. Individual Rights
Where applicable, individuals may have rights to:
- Request access
- Request correction
- Request deletion
- Object to processing
- Request information about data use
Requests related to monitored sites should be directed to the customer operating the system.
14. Transparency and Notice
Customers are responsible for providing appropriate notice of surveillance (e.g., signage) and ensuring lawful deployment.
15. AI and Automated Processing
Where analytics or AI features are used:
- Outputs are decision support tools.
- Human review is expected for operational decisions.
- Models are designed to reduce bias where feasible.
16. Incident Response and Breach Notification
We maintain incident response procedures and will notify customers consistent with contractual obligations and applicable law.
17. Sub Processors
We maintain a list of sub processors and apply contractual safeguards including confidentiality and security requirements.
18. Audits and Compliance
We may undergo security and privacy assessments, including:
- Independent audits
- Customer security reviews
- Regulatory assessments
19. Children's Data
Services are not intended for children.
20. Changes to Policy
We may update this policy periodically. Updates will be posted with a revised effective date.
Contact Information
Email: info@zenngroup.com