Privacy & Trust

Privacy isn't just how we treat your data. It's how we treat each other's access to it.

Our AWS infrastructure has an explicit deny policy preventing any scOS employee—including administrators—from viewing your video streams or recordings. Live viewing connects you directly to your Intelligence Hub via WebRTC. Recorded footage in our cloud? Protected by IAM policies that block all playback APIs for staff. You control who sees it: create users under your account with their own login credentials to view streams and briefings. Your family. Your choice. Our staff? Architecturally locked out.

Account Owner
Partner
Child
Video
Streams
WebRTC E2E
scOS Staff

Your account: Video streams encrypted end-to-end via WebRTC.

E2E Encrypted

Need-to-know access — your family in, our staff locked out

Ready to protect your property at the boundary?

Configure Your System

From £19/month · Professional installation included

The Problems You Know Too Well

Traditional CCTV fails you when it matters most

Every employee at most companies can see your data

Traditional security companies give broad access to internal teams. Customer support can browse accounts. Engineers debug by viewing live cameras. Marketing analyzes usage patterns. Dozens or hundreds of employees have potential access to your footage—because limiting internal access is inconvenient.

You never know who's looked at your account

An employee views your footage to diagnose an issue. Or out of curiosity. Or showing a colleague something interesting. You'll never know. Most companies don't maintain detailed access logs or make them available to customers. Internal access is invisible, unaudited, unaccountable.

Curiosity breaches happen constantly

Employees at Ring were caught watching customer footage—bedrooms, bathrooms, private moments. They had technical access and used it. This isn't unique to Ring. Any architecture that provides broad employee access creates opportunity for abuse. The temptation exists. Eventually, someone looks.

Insider threats are the hardest to prevent

External hackers get headlines. Insider threats—employees with legitimate access who abuse it—are harder to detect and prevent. They already have credentials. They know systems. They understand how to cover tracks. Without strict access controls, insider risk is constant.

Privacy policies don't prevent access

Companies promise employees only access data when necessary. But policy isn't prevention. Employees sign agreements saying they won't look. But they can. And some do. Without technical controls limiting access, privacy relies on everyone behaving ethically all the time.

What if your home defended itself?

Not just watching. Not just recording. Actually stopping threats before they reach your door.

How It Works

Need-to-Know Access Control in action

Step 1

Role-Based Access Control Architecture

Every scOS team member has access permissions strictly limited to their role. Customer support sees account status and diagnostics—not footage. Engineers access anonymized system data—not customer identities. Development teams work with test data only. Technical architecture enforces these boundaries.

Step 2

Need-to-Know Principle for Data Access

Access is granted only when necessary for a specific, legitimate purpose. Customer support helping with a technical issue? They request temporary diagnostic access with your explicit approval. The access expires automatically. Every access requires justification, approval, and time limits.

Step 3

Infrastructure Denies Staff Access to Video

Live video streams connect directly between your app and Intelligence Hub via encrypted WebRTC—our servers never see unencrypted video. Recorded footage in our cloud is protected by AWS IAM policies that explicitly deny all scOS staff access to video playback APIs. Technical architecture enforces what policy alone cannot.

Step 4

Comprehensive Access Logging and Auditing

Every time anyone on the scOS team accesses any customer data—account information, diagnostics, system logs—it's logged with immutable timestamps. These audit logs are available for your review. You know exactly who accessed what, when, and why. Transparency through cryptographic audit trails.

Step 5

Regular Access Reviews and Revocation

Permissions are reviewed quarterly. Team members who change roles have access adjusted. Anyone leaving the company has access immediately revoked. Temporary access grants expire automatically. Access control isn't set once—it's continuously managed to minimize exposure.

AI Decision Examples

See how scOS thinks

Real scenarios showing how the AI distinguishes between threats and everyday activity.

Customer support agent receives call: 'My cameras aren't recording properly.' Agent needs to diagnose issue.

Action: Agent explains issue and requests permission to view system diagnostics—not footage. Customer approves via app, granting 24-hour access to technical logs only. Agent identifies configuration issue, resolves problem, access expires automatically. Full access log available to customer.

LOGGED

Engineering team developing new AI feature needs data for testing.

Action: Development environment uses synthetic test data and anonymized system telemetry—no real customer footage or identifiable information. New features are developed and tested without accessing actual customer data. Privacy by development practice.

LOGGED

Marketing team wants to analyze product usage patterns across customer base.

Action: Marketing receives anonymized aggregate statistics: number of alerts per day across all users, feature adoption rates, system uptime metrics. No individual customer data. No identifiable information. Useful insights without privacy compromise.

LOGGED

scOS employee attempts to access their neighbor's scOS account out of curiosity.

Action: System denies access—employee has no legitimate need-to-know. Attempted access is logged and automatically flagged for investigation. Employee is interviewed about access attempt, reminded of privacy policies, and receives formal warning. Serious violations result in termination.

ALERT SENT

Law enforcement requests scOS provide customer footage to aid investigation.

Action: scOS explains that our infrastructure architecture denies staff access to video. Live streams connect directly to customer apps via WebRTC. Recorded footage is protected by IAM policies blocking video playback APIs. Request must be served directly to property owner, who controls their data.

IGNORED

Customer requests detailed log of all scOS employee access to their account.

Action: System generates comprehensive access log showing every instance of scOS team access to customer's account: timestamp, employee ID, reason for access, what data was accessed, duration. Customer reviews log and confirms all access was legitimate support interactions they initiated.

LOGGED

These are simulated examples of how scOS AI analyses and responds to activity at your property.

Traditional CCTV vs scOS

See why intelligent security is the new standard.

FeatureTraditionalscOS
Employee access to footageSupport, engineering, often othersDenied by infrastructure—IAM policies block video access
Access justificationAssumed legitimate if employee has credentialsRequired for every access, logged permanently
Customer visibilityNo visibility into who accessed dataComplete audit log available on demand
Access durationPermanent until manually revokedTime-limited, expires automatically
Internal data usageBroad access for development, marketingAnonymized aggregates only, synthetic test data
Insider threat preventionPolicy-based: employees trusted not to abuseTechnical controls: access limited by architecture

Why Internal Access Control Matters

External security gets attention: encryption, firewalls, intrusion detection. But the most sensitive access isn't from hackers breaking in—it's from employees who already have keys.

Every security camera company employee with broad data access is a potential privacy breach. Not because most employees are malicious—most aren't. But because opportunity plus curiosity eventually equals compromise.

When companies give employees broad access to customer data, they're choosing operational convenience over privacy protection. It's easier to let support teams browse accounts freely. Faster to give engineers production data access for debugging. Simpler to provide marketing with raw usage analytics.

scOS chooses differently: need-to-know access control that restricts internal data access to what's essential for specific purposes. Privacy policy that governs our own team's behavior, not just how we protect your data from external threats.

The Insider Threat Reality

Insider threats aren't theoretical. They happen regularly at security camera companies—and most incidents never become public.

Ring employees watched customer cameras for entertainment. Multiple Ring employees were caught viewing customer footage—bedrooms, bathrooms, private spaces. They had technical access as part of their roles and used it inappropriately. Ring fired the employees and claimed to have improved controls. But the architecture that enabled it—broad employee access to customer footage—remains common across the industry.

Curiosity breaches are under-reported. For every incident that becomes public, many more go undetected. An employee views an account out of curiosity. Watches footage they shouldn't. Shares something interesting with colleagues. Unless someone specifically audits access logs looking for abuse, these breaches remain invisible. And most companies don't maintain detailed logs accessible to customers.

Technical access enables social engineering. Employees with broad access can be targeted by social engineering attacks. Someone claiming to be law enforcement requests footage. A caller pretending to be a customer asks for account access. Employees with technical ability to comply might do so under false pretenses—because the architecture allows it.

Departing employees retain knowledge. When employees leave, access is typically revoked. But they retain knowledge: how systems work, where data is stored, potential vulnerabilities. If access controls were loose while employed, that knowledge poses ongoing risk.

Third-party contractors complicate access. Many companies use contractors for support, development, operations. These third parties need access to provide services. Each additional entity with broad access multiplies risk. Companies might enforce internal access policies—but have limited control over contractor behavior.

How Need-to-Know Access Control Actually Works

scOS implements multiple layers of access restriction—technical, procedural, and cultural—to minimize internal privacy risk.

Role-based access control limits permissions by function. Every scOS team member has an assigned role with specific permissions. Customer support roles can view account status and create support tickets—not access footage. Engineering roles work with system telemetry and anonymized data—not customer identities. Marketing roles receive aggregate statistics only. Roles are technically enforced by system architecture.

Principle of least privilege governs all access. Team members receive minimum access necessary for their role. Need to analyze system performance? Access anonymized performance metrics—not customer details. Need to debug network issues? Access network logs—not footage streams. Least privilege isn't just policy—it's technical reality enforced by access control systems.

Infrastructure architecture denies staff access to video. Live video streams connect directly between your app and Intelligence Hub via WebRTC—our servers never see unencrypted streams. For recorded footage stored in AWS Kinesis Video Streams, IAM policies explicitly deny all scOS staff (including administrators) access to video playback APIs like GetMedia, GetHLSStreamingSessionURL, and GetClip. Staff can see metadata—that recordings exist, timestamps, storage usage—but cannot view video content. Technical enforcement, not just policy.

Temporary access requires explicit grants. When customer support genuinely needs access for troubleshooting, they request a time-limited access grant from the customer. The customer approves via app, specifying what data and for how long. Access expires automatically—24 hours for diagnostics, 1 hour for live assistance. Every grant is logged permanently.

Development uses synthetic data exclusively. Engineers developing new features work in development environments populated with synthetic test data—generated footage, simulated events, artificial usage patterns. New capabilities are built and tested without ever accessing real customer data. Only after thorough testing in synthetic environments do features deploy to production—and even then, they process encrypted data.

Audit logs are immutable and comprehensive. Every data access by any team member is logged: timestamp, employee ID, reason for access, what data was accessed, access duration. These logs use cryptographic timestamping and cannot be altered or deleted—even by administrators. You can request your access log at any time to see exactly who accessed your account and why.

The Psychology of Privacy-Respecting Employment

Building privacy into internal operations isn't just technical—it's cultural.

We hire people who value privacy. scOS recruitment prioritizes candidates who understand and respect privacy principles. During interviews, we discuss real scenarios: Would you access a neighbor's account out of curiosity? If you saw something alarming in customer footage during legitimate support, how would you handle it? We want team members who instinctively protect customer privacy.

Privacy training is continuous. All team members complete privacy training during onboarding and annually thereafter. Training covers not just policies, but the reasoning: why privacy matters, how breaches harm customers, the psychological impact of surveillance, real-world examples of privacy violations. Understanding why creates stronger commitment than just knowing rules.

Access violations are terminable offenses. Attempting to access customer data without legitimate need-to-know is grounds for immediate termination. No warnings. No second chances. This isn't harsh—it's respecting that customer privacy is fundamental. One violation compromises trust that took years to build.

We celebrate privacy protection. Team members who identify privacy risks, suggest access restrictions, or improve privacy controls are recognized and rewarded. Privacy isn't a constraint on productivity—it's a core value we actively reinforce.

Transparency extends internally. Team members know their own access is logged and auditable. This isn't surveillance of employees—it's accountability. When everyone knows their actions are transparent and logged, behavior improves naturally.

Access Control in Practice: Real Scenarios

How need-to-know access control works for common situations:

Customer support troubleshooting. Customer contacts support with a camera connectivity issue. Support agent asks questions to diagnose—network configuration, camera placement, recent changes. Agent identifies likely cause without viewing footage. If diagnostic data access is needed, agent requests temporary grant from customer via app. Customer approves, specifying 24-hour access to system logs only—not recordings. Agent resolves issue using diagnostics, access expires. Complete interaction logged for customer review.

System maintenance and updates. Engineering team deploys system update affecting Intelligence Hub software. Engineers access anonymized telemetry showing update success rates, performance impact, error rates across fleet. No customer identities. No footage. No account details. Just aggregate system health metrics. If individual hub exhibits issues, customer is notified and support reaches out—not engineers proactively accessing accounts.

Feature development and testing. Product team develops new activity pattern recognition capability. Development environment uses synthetic footage—AI-generated video of people moving, cars arriving, typical home activities. Feature is trained and tested on synthetic data achieving target accuracy. Only then does it deploy to production hubs—where it processes footage locally on your Intelligence Hub without data leaving your property. Development cycle completed without accessing any real customer footage.

Marketing analytics and reporting. Marketing wants to understand feature adoption and usage patterns. Data team provides anonymized aggregate statistics: X percent of customers use geofencing, Y average alerts per day across user base, Z percent enable voluntary AI training. Useful for product decisions without individual customer exposure. Marketing knows what features are popular—not which specific customers use them.

Security incident response. Security team detects unusual access pattern suggesting potential breach. Investigation reviews access logs, network traffic, system behaviors—all anonymized and aggregate. If incident potentially affected specific customers, they're notified with details: what happened, what data might have been exposed, what actions were taken. Transparency even during security incidents.

Compliance and External Audit

Need-to-know access control isn't just internal policy—it's externally verified.

UK GDPR compliance requires access controls. Data protection regulations mandate that personal data access is limited to those with legitimate need. scOS access control architecture satisfies these requirements technically, not just procedurally. Regulators can audit our systems and verify that access controls are enforced by architecture.

ISO 27001 certification validates practices. scOS pursues ISO 27001 information security certification, which requires documented access control procedures, regular audits, and technical enforcement. External auditors verify that stated policies match actual practices.

Customer audit rights are contractual. scOS terms include customer right to request detailed access logs and periodic access control audits. You can verify that our privacy promises are technically enforced, not just marketing language.

Penetration testing includes insider scenarios. Regular security testing includes simulated insider threats: can a support agent access footage they shouldn't? Can engineers retrieve customer identities from anonymized data? These tests verify controls remain effective as systems evolve.

Balancing Privacy with Operational Needs

Need-to-know access creates operational challenges. We accept them because privacy is non-negotiable.

Support is more complex. When customer support cannot freely browse accounts, troubleshooting takes longer. Agents must request access, wait for customer approval, work within time limits. This is less convenient for us and sometimes slower for customers. But it's the right trade-off—privacy over convenience.

Development requires synthetic data infrastructure. Creating realistic test data that doesn't compromise privacy requires significant investment. Synthetic footage generation, simulated event patterns, artificial usage models—this infrastructure is expensive and complex. But it enables development without privacy compromise.

Analytics provide less granular insight. Marketing and product teams receive anonymized aggregates instead of individual customer data. This makes some analyses impossible. We cannot identify specific customers behaving in interesting ways and ask them for feedback. We work with broader patterns. This limits some product development approaches—but protects privacy absolutely.

Incident response is constrained. When investigating security incidents, our access to customer data is limited even during emergencies. This might slow incident response in some scenarios. But unlimited access during emergencies becomes unlimited access always—because defining emergency is subjective. We choose privacy even when it constrains our response capabilities.

These trade-offs are real. We're transparent about them. But customer privacy is more important than our operational convenience.

Future Evolution of Access Control

As scOS grows, access control must scale without compromising privacy.

Automated access review systems. As team size grows, manual access reviews become impractical. We're developing automated systems that continuously monitor access patterns, flag anomalies, identify over-privileged accounts, and recommend permission adjustments. Privacy protection that scales.

Zero-knowledge support tools. Advanced support capabilities that work with encrypted data without decrypting it. Diagnostic tools that analyze system behavior without viewing content. Troubleshooting guides that help customers self-resolve issues without contacting support. Support effectiveness without privacy compromise.

Privacy-preserving analytics. Techniques like differential privacy and federated learning that enable useful analytics while making individual customer data recovery impossible. Understanding product usage at scale without exposing any individual customer.

Blockchain audit trails. Immutable, publicly verifiable access logs using blockchain technology. Every customer data access recorded permanently in distributed ledger. Absolute transparency and accountability for internal data access.

Integration With Other Privacy Features

Need-to-know access control works alongside other scOS privacy capabilities.

Combined with Encrypted Storage, internal access controls become even stronger—video data is encrypted with AWS KMS and staff access to video playback APIs is denied by IAM policies.

Paired with Transparent Operation, you have both technical access restrictions and complete visibility into what access actually occurs through audit logs.

Integrated with GDPR Compliance, access controls satisfy regulatory requirements while exceeding minimum standards.

Connected to No Data Selling, limited internal access means staff cannot extract video data for commercial purposes—IAM policies deny access to video playback APIs regardless of business decisions.

Privacy That Extends Inside the Company

Most security companies protect your data from external threats while giving internal teams broad access. scOS protects your data from everyone—including us.

Need-to-know access control means scOS team members access only data essential for their specific role. Customer support doesn't browse accounts. Engineers don't access footage. Marketing doesn't see individual usage. Privacy policy that governs our own behavior.

Because true privacy isn't just keeping hackers out. It's keeping everyone out—except you.

See all scOS features to understand how Need-to-Know Access Control works alongside other privacy-focused capabilities to create security that actually respects your privacy.

Sleep soundly knowing your home defends itself.

Add the scOS Intelligence Hub to your existing cameras and unlock capabilities that used to be impossible.

Get Started

From £19/month · Professional installation included · No contract

from£19/mo
Get Started