BECAUSE WE WANT TO SET YOUR MIND AT EASE WITH THESE NEW-FANGLED TECH TOYS.
Our tech-centric, fast-paced world can sometimes seem like a crazy place. Social media, smartphones, and the next big breakthrough in convenience engineering make it easier and easier to put yourself out there for the world to see. We strive to keep our products out of the craziness.
As an industry leader in connected play, we consider your privacy to be of the utmost importance. We make sure to take proactive steps in protecting your personal information, as well as be transparent about our safety protocol.
SAFETY IS #1
We make sure to keep all products – past and future – up to our standard of safety. Here are some steps we take in our mission to safeguard your information.
Here are some steps we take to ensure we’re doing all we can where your toys are concerned.
We verify that we are only installing authentic software and firmware onto our products.
INTERNAL SECURITY REVIEW
Our team conducts a thorough security review of all products and apps.
SECURITY AUDITS AND PENETRATION TESTING
We use third parties to test for any weaknesses across apps, devices, and web services.
AUTOMATED SECURITY MONITORING
We implement automated monitoring for known vulnerabilities in our code where possible.
REVIEW STORED DATA
We periodically review the data we collect to make sure that we are only collecting what is necessary for your play experience.
Sphero has strong policies for our data storage, data is encrypted in transit and at rest where possible to ensure its safety.
Sphero takes compliance with the Children’s Online Privacy Protection Act (COPPA) very seriously and closely follows developments in children’s privacy and online safety.
PRODUCT SPECIFIC SECURITY INFORMATION CAN BE FOUND ON OUR SUPPORT PAGE.
SHARE YOUR CONCERNS
Vulnerabilities require vigilance. While we do everything we can on our end, we want to let our users know that we’re happy to address any findings out in the wild. Please reach out to us firstname.lastname@example.org with any security related issues you find. You could even earn a bounty if you follow our vulnerability disclosure guidelines.