Security & Privacy

Built for trust and compliance

Dhi's architecture is designed to meet the security and privacy requirements of unions, regulators, and enterprise security teams.

Trust Signals

Security traffic needs concrete answers, not abstract reassurance.

These proof points stay visible as text so privacy, legal, and operations stakeholders can assess data movement, retention, encryption, and review paths before they ever open a call.

Privacy posture

On-prem by default

The page explicitly states what leaves the premises and what never leaves the premises so privacy reviews can happen from source text alone.

Data movement

Structured events only

Operators can review the event payload, retention posture, and clip-governance model before any live security meeting.

Encryption

TLS 1.3 + AES-256

The page answers how data is protected in transit and at rest rather than relying on vague trust language.

Stakeholder path

Security architecture review

Visitors can move from research into a security review without being forced through a generic demo ask.

Compliance signal

Audit-ready controls

The compliance section and metadata payload give legal, OT, and privacy teams concrete material to inspect.

Privacy by design

Dhi's edge-native architecture ensures that sensitive video data stays under your control

On-premises video retention

Raw video never leaves your premises by default. All inference happens at the edge, ensuring complete control over sensitive footage.

Privacy firewall

Only structured events and policy-approved clips are transmitted off-site. Configurable policies ensure compliance with internal and regulatory requirements.

End-to-end encryption

All data in transit uses TLS 1.3. Data at rest is encrypted using AES-256. Key management follows industry best practices.

Role-based access control

Granular permissions for viewing events, accessing clips, and configuring patterns. Full audit trails for all access and configuration changes.

Audit and compliance

Complete audit logs for all system access, configuration changes, and data exports. Designed to support FIPS and FedRAMP requirements.

Data governance

Configurable retention policies for events and clips. Automated data lifecycle management and secure deletion capabilities.

What leaves your premises

Dhi's privacy firewall ensures only approved data is transmitted

Transmitted

  • Structured safety events (timestamps, locations, pattern types)
  • Policy-approved video clips (configurable duration and retention)
  • Aggregated analytics and metrics (no PII)
  • System health and performance telemetry

Stays on-premises

  • Raw camera feeds and full-resolution video
  • Personally identifiable information (PII)
  • Biometric data and facial recognition
  • Historical video archives (unless explicitly exported)

Secure Metadata Workflow

JSON Payload v4.2

Dhi generates structured metadata events at the edge. Below is a sample operative payload showing how person-down alerts are formatted before being pushed to your VMS Alarm stack.

{
  "event_id": "evt_9x2kL01",
  "timestamp": "2026-03-30T10:14:22.451Z",
  "pattern": "PERSON_DOWN",
  "confidence": 0.984,
  "location": "Platform 4 - South Wing",
  "edge_node_id": "node_772",
  "metadata": {
    "latency_ms": 142,
    "vms_alarm_triggered": true,
    "privacy_masked": true
  }
}

Compliance and certifications

Dhi is designed to meet the requirements of regulated industries and government agencies

SOC 2 Type II (in progress)
GDPR compliant architecture
CCPA data handling
FIPS 140-2 ready
FedRAMP oriented design
ISO 27001 aligned

For detailed security documentation, compliance reports, or to discuss specific requirements, please contact our security team.