Waypoint TelemetryWaypoint Telemetry

Privacy & Security

Waypoint's system architecture prioritizes user privacy while maintaining accurate recreation activity monitoring capabilities.

Privacy-Preserving Architecture

The Waypoint system is designed from the ground up to preserve user privacy while collecting accurate recreation activity data.

No Facial Recognition

Waypoint's detection models identify activity types (hikers, bikers, etc.) without facial recognition or individual identification capabilities. The system cannot identify specific individuals.

Privacy Blur Applied Automatically

All images are processed through an AI privacy blur filter that obscures faces and identifying features. No original, unblurred photos are stored on the cloud—only the privacy-filtered versions are retained.

Automatic Image Deletion

Privacy-blurred images are automatically deleted after 30 days. Only aggregate count data and anonymized detection metadata are retained long-term.

Aggregate Data Only

Publicly shared data consists of aggregate counts and statistics. Individual detection events are not exposed outside secure processing systems.

Data Handling & Retention

Privacy-First Processing Pipeline

When motion is detected, images are captured and uploaded to the cloud for AI analysis. The VisionAI pipeline applies privacy-preserving techniques as the final processing step—ensuring no original photos are ever stored.

VisionAI Analysis Pipeline showing Object Class Detection, Directionality AI Detection, SNF Filter, and Privacy Blur steps

Data Retention Policy

Original (Unblurred) ImagesNever Stored
Privacy-Blurred Images30 days
Detection Metadata90 days
Aggregate StatisticsIndefinite

Example Privacy-Blurred Images

These are examples of the privacy-filtered images stored on the cloud. All faces and identifying features are automatically obscured. These images are retained for 30 days for quality assurance and model validation, then permanently deleted.

Example of privacy-blurred image showing person on frozen lake with face obscured
Example of privacy-blurred image showing hiker with backpack and face obscured

System Security

Data Encryption

  • End-to-end encryption for cellular transmission
  • TLS 1.3 for data in transit
  • AES-256 encryption at rest
  • Encrypted storage on camera hardware

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • Audit logging for all data access
  • Granular permission management

Network Security

  • VPN connectivity for camera networks
  • Firewall protection
  • Intrusion detection systems
  • Regular security audits

Physical Security

  • Lockable camera enclosures
  • Tamper detection alerts
  • Secure mounting hardware
  • Anti-theft cable systems

Privacy Compliance & Transparency

Public Space Monitoring

Waypoint cameras are deployed in public outdoor spaces where individuals have no reasonable expectation of privacy, similar to traditional trail counters and traffic monitoring systems.

Transparent Deployment with Public Information Tags

All Waypoint cameras are equipped with visible public information tags that clearly identify the camera's purpose, contact information, and privacy policies. These tags ensure complete transparency about data collection activities.

Waypoint camera mounted on tree with visible public information tag
Example deployment showing public information tag attached to camera enclosure

Partner Data Agreements

Deployments are conducted in partnership with land managers under formal data sharing agreements that specify data usage, retention, and access policies.

Privacy Comparison

FeatureWaypointTraditional Security Cameras
Facial RecognitionNoOften Yes
Privacy Blur FilterYes (Automatic)No
Original Image StorageNever StoredYes (Often Indefinite)
Individual IdentificationNoPossible
Auto Image DeletionYes (30 days)Rarely
Data PurposeAggregate StatisticsSecurity/Surveillance