Security

Last Updated: June 08, 2025

1. Introduction

At EyeOnKid ("we," "us," or "our"), the security of your data and the devices we monitor is our top priority. EyeOnKid provides monitoring services for Android, iOS, Windows, and macOS devices, allowing users to track activities such as location, web browsing, app usage, SMS, contacts, and more. This Security page outlines the measures we take to protect your data and ensure the safety of our Service, as well as your responsibilities in maintaining security.

2. Data Encryption

We use industry-standard encryption to protect your data at all stages:

  • Data in Transit: All data transmitted between your device, the monitored device, and our servers (e.g., location data, screenshots, SMS logs) is encrypted using HTTPS with TLS 1.3, ensuring secure communication over the internet.
  • Data at Rest: Data stored on our servers, including monitored data and account information, is encrypted using AES-256 encryption to prevent unauthorized access.
  • Sensitive Credentials: For iOS monitoring, Apple ID credentials provided by users are encrypted and securely stored, accessible only to authorized processes.

3. Access Controls and Authentication

We implement strict access controls to ensure that only authorized individuals can access your data:

  • User Authentication: Access to your EyeOnKid dashboard requires strong passwords. We encourage users to enable two-factor authentication (2FA) for added security.
  • Role-Based Access: Our internal systems use role-based access controls (RBAC) to limit data access to authorized personnel only, based on the principle of least privilege.
  • Session Management: User sessions are protected with secure cookies and automatic logout after a period of inactivity to prevent unauthorized access.

4. Security of Monitored Devices

EyeOnKid is designed to operate securely on monitored devices:

  • Stealth Mode: On supported platforms (e.g., Android), EyeOnKid can operate in stealth mode, hiding its presence to prevent tampering by the monitored user. However, you must ensure this feature complies with local laws regarding consent.
  • Minimal Permissions: We request only the permissions necessary for monitoring (e.g., location, SMS, contacts). On iOS, we rely on iCloud backups rather than direct device access to minimize security risks.
  • Anti-Tampering Measures: Our app includes mechanisms to detect and report attempts to uninstall or disable it on monitored devices.

5. Vulnerability Management

We proactively manage security vulnerabilities to protect our Service:

  • Regular Audits: We conduct regular security audits and penetration testing to identify and address vulnerabilities in our systems.
  • Software Updates: We release timely updates to the EyeOnKid app to patch security vulnerabilities and improve functionality. Users are encouraged to keep the app updated.
  • Bug Bounty Program: We operate a bug bounty program, inviting security researchers to report vulnerabilities in exchange for rewards, ensuring continuous improvement of our security posture.

6. Incident Response and Breach Notification

In the unlikely event of a security incident, we have a robust incident response plan:

  • Detection and Containment: We use monitoring tools to detect potential security incidents and take immediate steps to contain them.
  • Notification: If a data breach occurs that may impact your personal data, we will notify affected users and relevant authorities (e.g., under GDPR, within 72 hours) as required by law.
  • Resolution: We will investigate the incident, mitigate any damage, and implement measures to prevent future occurrences.

7. User Responsibilities

While we take extensive measures to secure your data, you also play a critical role in maintaining security:

  • Strong Passwords: Use a strong, unique password for your EyeOnKid account and enable 2FA where available.
  • Secure Devices: Ensure that your devices (and monitored devices) are protected with up-to-date antivirus software and operating system updates.
  • Legal Compliance: Use EyeOnKid in compliance with local laws, including obtaining necessary consent for monitoring (e.g., from employees or adults).
  • Monitor Account Activity: Regularly review your account for suspicious activity and report any concerns to us immediately.

8. Contact Us

If you have any questions or concerns about our security practices, or if you suspect a security issue, please contact us at: