Trust Center

At Milesight, security and transparency are at the core of everything we do. Our Trust Center provides clear,
up-to-date information about our policies and practices in compliance, security, privacy, and
vulnerability management.

  • Compliance
  • Security
  • Privacy
  • Vulnerability Management
  • Home
  • Milesight
  • Company
  • Trust-Center

Compliance

iso27001

ISO 27001

ISO 27001 is the leading international standard for information security management systems (ISMS), helping organizations protect data through risk management and security controls.

iso9001

ISO 9001

ISO 9001 is an international standard for quality management systems, helping organizations ensure consistent product and service quality while improving customer satisfaction.

gdpr

GDPR

The General Data Protection Regulation (GDPR) is a comprehensive data privacy and security law enacted by the European Union.

nis2

NIS2

NIS2 is the EU's enhanced cybersecurity directive, expanding the scope of critical sectors and imposing stricter security and incident reporting requirements to improve resilience against cyber threats.

ndaa

NDAA

Milesight CCTV products generally comply to NDAA (National Defense Authorization Act), an act restricting the use of components from designated countries to protect U.S. national security and supply chain integrity.

Milesight NDAA-compliant Product List >
psti

PSTI

The PSTI Act sets UK cybersecurity standards for connected devices and telecom infrastructure to protect against vulnerabilities. PSTI-compliant Milesight products include AI Network Cameras, AI Network Video Recorders, Video Management Software (Milesight VMS).

PSTI Statement >

Security

Security Policies & Practices

We maintain a comprehensive security framework that integrates:

  • Enterprise-grade technical controls
  • Clearly defined accountability measures
  • A pervasive security culture

Our multi-layered approach ensures protection across all systems and data assets, while our security-aware workforce serves as a vital additional layer of defense through continuous training and vigilance.

Security Organization

Milesight has established a dedicated Cyber Security Group to oversees cybersecurity issues and privacy protection policies across the company. This group operates under the Department of Information and is responsible for establishing comprehensive security policies, monitoring emerging threats, and implementing proactive defense measures across the organization. Through this centralized governance structure, Milesight maintains robust organizational security while promoting company-wide cybersecurity awareness.

Cultural Integraton

We complement formal oversight structures with a security culture that permeates every level of company operations. This begins with rigorous new-hire vetting, where candidates undergo thorough background checks covering education, employment history, and criminal records. Upon joining, employees receive comprehensive onboarding that emphasizes security policies, sign confidentiality agreements, and complete mandatory training on topics such as GDPR and secure data handling. Extra mandatory security trainings are required for technical staff, covering secure coding, threat mitigation, defensive systems and more.

Privacy

icon data privacy

Data Privacy

We implement rigorous data protection measures aligned with privacy-by-design principles.

  • Minimal & Consensual Data Handling: Collect only essential information with explicit user authorization
  • End-to-End Protection: Enforce encryption for both stored data and transmissions
  • Access Discipline: Implement strict role-based controls with mandatory authentication
  • User Sovereignty: Guarantee data ownership through self-service deletion tools and clear retention policies
  • Continuous Vigilance: Conduct regular vulnerability assessments
icon privacy protection

Privacy Protection in Video Surveillance

Our surveillance solutions offer configurable privacy features to meet different compliance needs: select models support manual privacy masking to obscure designated areas in video feeds, while our software's Smart Analysis includes a Face Privacy Mode that - when enabled - allows users to blur detected faces in live or recorded footage. These features provide adaptable privacy safeguards while preserving essential video analytics functionality.

icon identity blind people sensing

Identity-blind
People Sensing

For the people counting products, Milesight uses Time-of-Flight (ToF) and other anonymity technologies such as IR break beam, thermopile, and radar to ensure personal privacy by capturing only depth data with no facial or identifiable details while maintaining accurate occupancy analytics.

Security Vulnerability Management

We have implemented structured vulnerability response processes to systematically identify, assess, and mitigate potential risks, complemented by security notices and vulnerability advisories for emerging threats. To help us maintain robust protections, we welcome responsible vulnerability disclosures.

Get in Touch about
Your Needs

  • End User
  • Installer
  • Reseller
  • System Integrator
  • Distributor
  • Consultant
  • Managed Service Provider
  • Video Surveillance
  • Intelligent Traffic
  • IoT LoRaWAN® Series
  • 5G & Cellular Products
  • Environmental Sensing
  • Software & Platform
  • X Infinity
Verify Code

If you are interested in Milesight, please leave us a message.

Verify Code

Contact Us

Contact Us

Verify Code

Contact Us to Get More Information