EarthCam Trust and Security Center

Founded in 1996, EarthCam exists to encourage exploration, foster discovery and connect people through innovative live camera technology.
We've built the leading webcam technology platform to help our customers keep their projects safe and secure.
We embed that same safety and security mindset in our business by diligently maintaining a risk-based security and privacy program to protect our customer data.

Defending In Depth
Defending In Depth
Defending In Depth

Our corporate security program leverages:

  • Advanced Endpoint Protection to guard against evolving cyber threats on all devices
  • Strong access controls, including Two-factor authentication (2FA) and Single-Sign-On(SSO), to control access to sensitive systems with permissions strictly restricted based on role
  • A layered approach to securing our network by implementing robust security measures across our infrastructure that's divided by zones, environments, and services


Safeguarding Your Data
Safeguarding Your Data
Safeguarding Your Data

We are committed to protecting data confidentiality, integrity & availability by:

  • Hosting our systems in a secure server environment that is ISO 27001, PCI DSS Level 1, and SOC 1 & 2 & 3 compliant.
  • Using industry standard encryption protocols
  • Operating a comprehensive program to backup customer data multiple times per day


Securing Our Product
Securing Our Product
Securing Our Product

Our flagship Control Center 8 software offers our customers:

  • Secure authentication mechanisms including 2FA and SSO
  • Role based permissions to control access to projects and video data
  • Options to audit and log user activity
  • A resilient infrastructure with 99.9%+ uptime
  • An entire product portfolio that is fully NDAA and ITAR-compliant


Continuously Improving
Continuously Improving
Continuously Improving

The threat environment is dynamic and so is our security program. We continuously monitor and test our security controls and periodically have external experts verify our security posture. We also:

  • Regularly train staff on emerging threats and best security practices
  • Actively monitor the threat environment, assess our security controls, and update our policies