Security

Security & Privacy

Our commitment to protecting your data and infrastructure

Our Security Principles

Privacy and security are at the core of everything we do

On-Premise

On-Premise First

We prioritize on-premise solutions that keep your data under your control, on your hardware, within your network.

No Data Access

Zero Data Access

We don't have access to your AI workloads or security footage. Your data stays completely private.

Encryption

Security by Design

Systems designed with security best practices, encryption, and network isolation from the ground up.

Professional

Professional Standards

Licensed, insured, and committed to industry best practices for all installations and services.

Data Privacy Commitment

At Bent Solutions, we believe your data belongs to you—and only you. Our business model is built on providing infrastructure and services, not on collecting, analyzing, or monetizing your data.

Bent AI Solutions: Complete Data Privacy

When you deploy an on-premise AI server from Bent AI Solutions:

  • Your data never leaves your premises: All AI processing happens locally on your hardware
  • No cloud dependencies: No data is transmitted to external servers or cloud services
  • You control access: Only your authorized users can access the system
  • No telemetry or tracking: We don't collect usage data or monitor your AI workloads
  • Full ownership: You own the hardware and all data it processes

Bent Low Voltage Solutions: On-Premises Security

Our security system installations prioritize local data storage and privacy:

  • Local NVR storage: Security footage stored on your premises, not in the cloud
  • Private network design: Systems operate on isolated networks for maximum security
  • No mandatory cloud services: Cloud access is optional and under your control
  • Encrypted communications: All system communications use industry-standard encryption
  • Access control: Only authorized personnel can access security systems

Website and Business Security

Website Security

  • HTTPS encryption: All website traffic is encrypted in transit
  • Secure forms: Contact forms use secure submission methods
  • No tracking scripts: We minimize third-party tracking and analytics
  • Regular updates: Website security is regularly reviewed and updated

Business Operations Security

  • Secure communications: Email and communications use encryption
  • Access controls: Strict access controls for customer information
  • Employee training: Team members trained on security best practices
  • Vendor security: Third-party vendors vetted for security practices

Installation Security Practices

Bent AI Solutions Installations

  • Secure default configurations with strong passwords
  • Network isolation and firewall configuration
  • Encrypted storage options available
  • Security hardening of operating systems
  • Documentation of security settings and best practices

Bent Low Voltage Solutions Installations

  • Secure camera and NVR configuration
  • Network segmentation for security systems
  • Strong authentication requirements
  • Encrypted video streams where supported
  • Physical security considerations for equipment

Compliance and Standards

While we don't claim specific compliance certifications, our practices align with industry standards:

  • Data privacy principles consistent with GDPR and CCPA
  • Security practices based on NIST frameworks
  • Electrical work compliant with NEC and local codes
  • Licensed and insured for all electrical contracting work

Vulnerability Reporting

If you discover a security vulnerability in our website or services, please report it responsibly:

  • Email: Naz@bent.solutions with subject "Security Vulnerability"
  • Provide detailed information about the vulnerability
  • Allow reasonable time for us to address the issue before public disclosure
  • We appreciate responsible disclosure and will acknowledge your contribution

Questions About Security?

We're happy to discuss our security practices in detail. If you have specific security requirements or questions, please contact us.


Privacy Policy | Terms of Service | Contact Us