Here at Jiobit, we’re in the business of peace of mind. That means your personal data has never been sold or traded—regardless of who wears the Jiobit. This includes any future integrations with our parent company Life 360.
We also believe in full transparency, which is why we are happy to detail everything we’re doing to encrypt your personal data and protect Jiobit devices from unauthorized access. This includes:
- Compliant to California Senate Bill 327 for your privacy
- Jiobit TrustChip to store encryption keys
- Secure Software to prevent malware or data theft
- Data Encryption of location data and any data stored on our servers
- Intrusion Resistant Hardware to defend against hackers
- Penetration Testing so we’re ready for any data breach attempt
- Smartphone Data Protection to maintain device security
- 3rd-Party User Authentication to protect your passwords
Keep reading to learn more about how we’re keeping your data safe.
Compliant to California Senate Bill 327
The California bill for “Information privacy: connected devices” took effect on January 1, 2020. It requires all Internet of Things (IoT) devices sold in the state to be equipped with “reasonable security.”
Jiobit contains a dedicated security chip similar to those used in “chip” credit cards. This is used to store encryption keys that identify your Jiobit to our servers to protect your sensitive data.
Secure Software to Prevent Malware or Data Theft
The Jiobit device and smartphone apps refuse to download or run software that is not “approved” by Jiobit’s digital signature. This process also uses the Jiobit TrustChip to authenticate the software, keeping malware away from your private information.
Jiobit location data is transmitted by the Jiobit and encrypted using AES-128 and AES-256 encryption. When your data is stored on our servers, it is also encrypted as well, which can only be decrypted by your personal authentication or by a small number of authorized customer support employees should you need help.
Intrusion Resistant Hardware
Jiobit circuit boards employ proprietary tamper-resistant features to deter the most sophisticated hardware hackers so that rogue software cannot be placed on the device.
Penetration (“pen”) Testing
Jiobit’s software and data are tested regularly by professional penetration testers who validate the integrity of our system by attempting to find weaknesses.
Smartphone Data Protection
Smartphone apps should never store user passwords on the phone. It should store a user-specific token, which is encrypted and secured by a smartphone Keystore system. That token is periodically renewed to make it more secure.
Additionally, we ensure our apps will not run on “rooted” or “jailbroken” phones in order to maintain a secure environment. Android “rooting” allows the user to obtain system administrator privileges, while “jailbreaking” allows iPhone users to remove certain software restrictions in the operating system.
3rd Party User Authentication
Jiobit uses trusted 3rd party identity platforms for user authentication, which will store a secure token that is periodically renewed by the cloud and does not retain any user/name passwords.