Logitech Circle 2 Privacy Report

Although the Logitech Circle 2 logs information about its users, it makes up for it with strong data encryption. Despite being no longer in production, the camera also receives automatic, regular updates to protect itself from the latest exploits.
Encryption
In Transit | Yes |
---|---|
At rest? | Yes |
All network communications and capabilities? | Yes |
Security Updates
Automatic, regular software/ firmware updates? | Yes |
---|---|
Product available to use during updates? | Yes |
Passwords
Mandatory password? | Yes |
---|---|
Two-Factor authentication? | No |
Multi-Factor authentication? | No |
Vulnerability Management
Point of contact for reporting vulnerabilities?Fill out a ticket
Bug bounty program? | Yes |
---|
Privacy Policy
Link | https://nest.com/legal/privacy-statement-for-nest-products-and-services/ |
---|---|
Specific to device? | Yes |
Readable? | Yes |
What data they log | Name and contact information, email address, postal address, phone number, passwords, hints, information used for authentication, age, gender, country, preferred language, payment data, product use data, device data, support data, interests and favorites, contacts and relationships, location data, and content of files. |
What data they don’t log | n/a |
Can you delete your data? | Yes |
Third-party sharing policies | Shares information with third parties. |
Surveillance
Log camera device/ app footage | Yes |
---|---|
Log microphone device/ app | Yes |
Location tracking device/ app | Yes |
Parental Controls
Are there parental controls? | No |
---|
Company History
Any security breaches/ surveillance issues in past? | No |
---|---|
Did they do anything to fix it? | n/a |
Additional Security Features
Anything like privacy shutters, privacy zones, etc.? | No |
---|