Privacy Policy

1. Purpose and Commitment

Zenn Group LLC ("Company," "we," "us," or "our") is committed to protecting privacy, civil liberties, and sensitive information while delivering secure monitoring, video analytics, and license plate recognition services.

This Privacy Policy describes how we collect, use, store, disclose, and safeguard information in connection with:

  • Our web applications
  • Mobile applications
  • Cloud platform
  • Edge devices and sensors
  • Customer deployments
  • Support and operational services

Our Services are used by government agencies, commercial enterprises, infrastructure operators, and public organizations to support safety, security, operational awareness, and incident response.

2. Applicability and Roles

Depending on deployment:

  • Customers typically act as Data Controllers or System Owners
  • We act as a Service Provider / Data Processor / Contractor

Customers determine surveillance scope, retention, and operational use. Individuals with questions about monitoring at a site should contact the deploying organization.

3. Legal and Regulatory Alignment

We design our Services to support compliance with applicable laws and frameworks, including:

  • U.S. Privacy Act principles
  • State privacy laws (e.g., CCPA/CPRA where applicable)
  • Law enforcement and public safety regulations
  • Contractual obligations
  • International data transfer requirements
  • Government cybersecurity and privacy control baselines

4. Information We Collect

Customer and User Information

  • Names and business contact details
  • Organization affiliation
  • Account credentials
  • Roles and permissions
  • Support records
  • Billing and subscription data

Operational Monitoring Data

Our platform processes data from cameras and sensors, including:

  • Video recordings
  • Still images
  • Event clips
  • Environmental telemetry
  • Time and location metadata
  • Incident logs

License Plate Recognition Data

Where enabled:

  • License plate numbers
  • Plate images
  • Vehicle characteristics
  • Detection timestamps
  • Geolocation or camera location
  • Watchlist alerts

System and Security Logs

  • Access logs
  • Audit trails
  • Device identifiers
  • Network telemetry
  • Diagnostic data

Optional Location Data

  • Device location for operational functions (if enabled)

5. Purpose of Processing

We process information to:

  • Provide real-time monitoring and alerting
  • Enable incident investigation
  • Support public safety and security operations
  • Detect threats or anomalies
  • Maintain system integrity
  • Perform analytics requested by customers
  • Fulfill contractual obligations
  • Manage subscriptions
  • Provide technical support
  • Improve platform performance
  • Comply with legal obligations

6. Privacy by Design and Minimization

We implement privacy engineering practices including:

  • Data minimization
  • Configurable retention controls
  • Role-based access
  • Segmentation between tenants
  • Auditability
  • Encryption controls
  • Least privilege principles

Customers control deployment scope and operational policies.

7. Data Sharing and Disclosure

We may disclose information to:

  • Authorized customer personnel
  • Cloud and infrastructure providers
  • Sub processors under contractual controls
  • Integration partners approved by customers
  • Regulators or law enforcement where legally required
  • Auditors and oversight bodies
  • Successors in a merger or acquisition

We do not sell personal information.

8. Government and Law Enforcement Use

When deployed by public agencies:

  • Data may be used for investigations, public safety, regulatory enforcement, or emergency response
  • Use is governed by agency policies, legal authorities, and applicable oversight

9. Security Safeguards

We maintain administrative, technical, and physical safeguards including:

  • Encryption in transit and at rest
  • Identity and access management
  • Multi-factor authentication
  • Continuous monitoring
  • Vulnerability management
  • Logging and audit trails
  • Incident response procedures
  • Network segmentation
  • Secure development lifecycle practices

10. Protection Against Misuse and Bias

We implement measures to reduce risk of improper use, including:

  • Role-based access controls
  • Audit logging
  • Monitoring for anomalous access
  • Training expectations for authorized users
  • Documentation emphasizing lawful use

We prohibit use of our technology to target individuals or groups solely based on protected characteristics such as:

  • Race
  • Religion
  • National origin
  • Political beliefs
  • Protected speech

11. Data Retention

Retention is determined by:

  • Customer configuration
  • Contract requirements
  • Legal obligations
  • Investigative needs

Data may be deleted, archived, or anonymized based on policy.

12. International Data Transfers

Data may be processed in the United States and other jurisdictions where we or our service providers operate, subject to appropriate safeguards.

13. Individual Rights

Where applicable, individuals may have rights to:

  • Request access
  • Request correction
  • Request deletion
  • Object to processing
  • Request information about data use

Requests related to monitored sites should be directed to the customer operating the system.

14. Transparency and Notice

Customers are responsible for providing appropriate notice of surveillance (e.g., signage) and ensuring lawful deployment.

15. AI and Automated Processing

Where analytics or AI features are used:

  • Outputs are decision support tools.
  • Human review is expected for operational decisions.
  • Models are designed to reduce bias where feasible.

16. Incident Response and Breach Notification

We maintain incident response procedures and will notify customers consistent with contractual obligations and applicable law.

17. Sub Processors

We maintain a list of sub processors and apply contractual safeguards including confidentiality and security requirements.

18. Audits and Compliance

We may undergo security and privacy assessments, including:

  • Independent audits
  • Customer security reviews
  • Regulatory assessments

19. Children's Data

Services are not intended for children.

20. Changes to Policy

We may update this policy periodically. Updates will be posted with a revised effective date.

Contact Information

Email: info@zenngroup.com