Privacy policy

Modified on Sat, 7 Sep at 7:39 PM

Overview

At Virtual Smart Home™, all of our software, products, and services are designed to the high standards of European privacy regulation. For everything we develop and offer, we follow two key principles:

  • Privacy by design: In our software, products, and services we only collect and process the data that are absolutely necessary. We do not ask you for any data that are not required for performing a certain task or for completing an operation. We only ask you for data when we need them and do not collect data proactively.
  • Privacy by default: If there are any privacy-related choices you can make, we always offer you the better choice from a privacy-perspective as the default. So you have to actively change a setting if you want to reduce the privacy standards.

Privacy policy

Our privacy policy provides details for each software, product, and service we offer. It elaborates, which data are collected and processed, which subcontractors we rely on, and which quality standards are applied.

For all of our subcontractors, we make sure that they are fully compliant with the high standards of European privacy regulation (GDPR) and that they also comply with state-of-the-art industry standards for information security (e.g., ISO 27001, ISO 27018, SOC 2). For all of our subcontracts, we have valid data processing agreements (DPAs).

For more details, please refer to our privacy policy.

Information security

Without high standards in information security, privacy is impossible. Therefore we make sure that our subcontractors comply with state-of-the-art industry standards for information security.

Our subcontractors are mainly our infrastructure provider that hosts the servers and datacenter infrastructure we need, Amazon for hosting the Alexa skills infrastructure, our support system, and our authorised reseller.

Smart home environments are particularly sensitive. For the software, products, and services we provide, we make sure, that the state-of-the-art information security standards are maintained. Among others, we regularly use the following external checks to make sure that we comply with these standards:

For details on information security, please refer to our privacy policy.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article