Service & Maintenance

Security Vulnerability Reporting

We've designed our infrastructure and services for security, to protect our customers and their data. But if you discover a security vulnerability with any of our products, control panels, or other infrastructure, we want to know.

Reporting process

Security issues within our product offerings take a very high priority. We want to work with you to understand the scope of the vulnerability and ensure that we correct the problem fully.

1. Report a vulnerability by notifying us at This email address is being protected from spambots. You need JavaScript enabled to view it.. (If needed, you can encrypt your email using our public PGP key.) Please provide detailed information about the following:

  • The product, control panel, or infrastructure involved.
  • The steps required to reproduce the issue. Please provide scripts/requests, if possible.
  • The impact of the vulnerability and how it can be exploited.

Remember to use discretion when reporting issues and respect our customers’ and users’ data and privacy.

2. Once we receive your report, we will contact you to confirm we have received it. We may also contact you for additional information, as we investigate the issue.

3. Please do not post or share any information about a potential security vulnerability in any public setting until we have researched, responded to, and addressed the reported vulnerability and informed customers, if needed. Our products are complex, and reported security vulnerabilities will take time to investigate, address, and fix.

Security disclosure and notifications

For the protection of our customers, Security Engineering Inc. does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches, fixes, or releases are available. Security Engineering Inc. usually distributes security disclosures and notifications through blog posts and customer support portals.

 

Note: While we sincerely appreciate reports for vulnerabilities of all severity levels, this listing is reserved for people who have reported previously unknown vulnerabilities, which Security Engineering Inc. has determined to be of a high or critical severity, or in cases where there has been continued research or other contributions made by the person.

Having trouble with an account?

If you’re a Security Engineering Inc. customer and you’re having difficulty accessing your account, or if you believe your account has been accessed without your authorization, please Contact our support team.

Copyrights & Trademarks

Copyrights & Trademarks

Security Engineering Inc. retains copyright and/or applicable rights to all text and graphic images supplied on the Security Engineering Inc. websites.

All trademarks and service marks remain the sole property of their respective holders. You may print copies of the information on this site for your own personal use.

You may not distribute any text or graphics herein to others without the express written permission of Security Engineering Inc., "mirror" this information on your own site without permission from Security Engineering Inc., or modify or re-use in any way the text or graphics on this site.

Trademarks

Security Engineering Inc. trademarks, service marks, logos and domain names are either common-law trademarks/service marks or registered trademarks/service marks of Security Engineering Inc., or its subsidiaries, and are protected by trademark and other laws in the United States and other countries. 

Security Engineering Inc. trademarks and service marks signify Security Engineering Inc. high quality services and are valuable assets of the company. Use of Security Engineering Inc. trademarks is prohibited unless expressly authorized by Security Engineering Inc.. You are not permitted to use any trademarks displayed on the Websites, meta tags or any other “hidden text” utilizing trademarks of Security Engineering Inc. and its licensors, without prior written permission of Security Engineering Inc. or such third party who may own the trademark. Without the express prior written consent of Security Engineering Inc., no Security Engineering Inc. trademarks may be used in a manner that implies an affiliation with, approval by, endorsement of or sponsorship by Security Engineering Inc..

Logo Request

Security Engineering Inc. customers wishing to use the "Powered By Security Engineering Inc." logo or the "Powered By Security Engineering, Inc." logo must contact Security Engineering Inc. to request permission.

Security Engineering Inc. channel partners may use the channel partner tier logo as specified in their agreement with Security Engineering Inc. and according to specific guidelines and other partner program resources provided to channel partners.

Copyright

You may not use the Security Engineering Inc. websites, content on the websites or online mediums for any purpose or in any manner that infringes the rights of any third parties. Security Engineering Inc. encourages you to report any content on the Security Engineering Inc. websites that you believe infringes your copyright. If you would like to submit a Copyright Infringement Complaint, click here to contact us.

Privacy Statement

Security Engineering Inc. respects your privacy and is committed to maintaining the privacy and confidentiality of personal data we collect. The purpose of our Privacy Statement is to demonstrate our firm commitment to the privacy and protection of all persons who provide personal data to Security Engineering Inc. and its affiliates. This Privacy Statement describes the ways we collect information from and about you, and what we do with the information, so that you may decide whether or not to provide information to us.

By visiting Security Engineering Inc. websites or are otherwise providing your personal information to Security Engineering Inc. via any other means, you are accepting and consenting to the practices described in this Privacy Statement.

For purposes of this Privacy Statement, the term “visitor” includes visitors to our websites who are not yet customers, those who become customers, as well as those who do not become customers; whether you upload information to our websites, download it, or are merely visiting our websites. You can choose not to provide certain information when using our websites but then you might not be able to take advantage of many of its features.

 

1. WHAT DO WE COLLECT AND WHERE?

The information we collect may include your personal information, such as your name, contact information, financial account numbers, IP addresses, Live Chat Messages, Telephone conversations, product and service selections and orders or other things that identify you individually.

Generally, we may collect information about you in the following manners: 

  • you may provide your personal information to us via chat, email or other written correspondence, telephone calls, web based forms, or other means; 
  • we use automated technical means to collect information about all website visitors for example by use of cookies; 
  • via third party providers; and
  • Security Engineering Inc. affiliates located in the European Union may provide Security Engineering Inc. with personal information about their prospective or current customers.

 

Web Visit

You may visit our Websites in any of the following ways:

  • By using your browser to navigate to our Websites including (but not limited to) www.seceng.com.
  • By viewing an advertisement displayed on a third party website that is served content by our web server; 
  • By viewing an email that is served content by our or a third party web server.

When you visit our Website, our server logs your IP address (unique network addresses), the time and duration of your visit, and the time and duration of the pages on our website you view. If you arrive at our website by clicking a paid advertisement (including a paid search engine result) or a link in an email, then we will capture information that tracks your visit from that link. If you arrive at our Website by clicking a non-paid source, such as link in a non-paid search engine result or an unsponsored link on another website, we may capture information that tracks your visit from that source, to the extent we are able to do so. We may also capture information about your computer system, such as your browser type and operating system.

We will likely place a cookie on your hard drive during the web visit. A cookie is a unique alphanumeric identifier that we use to help us identify the number of unique visitors to our Website, whether or not those visitors are repeat visitors, and the source of the visits. Cookies cannot be executed as code or used to deliver a virus. Other servers cannot read them and personal information cannot be gathered from them. They are simply an identifier shared between you and us to allow us to improve the services we offer to you through our Website. If you do not wish cookies to be placed on your computer, then they can be disabled in your web browser. The option to do so is normally found in your browser's "security settings" section. However, please note, permanently disabling cookies in your browser may hinder your use of our Website as well as other websites and interactive services.

A web beacon, also known as a web bug, is a small graphic (usually 1 pixel x 1 pixel), that is embedded in a web advertisement, email, or page on our web site, but is invisible to you. When you view a page on our web site, an email or an advertisement your web browser will request the web beacon from a web server, which in turn will set a cookie in your web browser containing a unique identifier. This unique identifier will be linked to log information that is used to track your movements on our web site in order to determine the effectiveness of content and advertising campaigns.

We do not collect personal information about you as part of a web visit, but web visit information may be tied to other information (including personal information) we collect from you via chat, web forms, and the other means we describe in this Privacy Statement.

Our advertising agencies may also use web beacons and cookies to track your activity on our website originating from the advertisement. However, we will not provide your personal information to our advertising agencies. Our advertising agencies maintain their own privacy policies, and you should also review those.

 

Links to non-Security Engineering Inc. Websites

We may provide links to third-party websites for your convenience and information. The privacy practices of those sites may differ from Security Engineering Inc. practices and are not controlled by Security Engineering Inc. and covered by this Privacy Statement. We do not make any representations about third-party websites. We encourage you to review their privacy policies before submitting your personal data.

 

Personal information received from the EU and/or Swizerland

  • When Security Engineering Inc. is a data controller – Safe Harbor compliance

Security Engineering Inc. complies with the U.S.-EU Safe Harbor Framework and the U.S.-Swiss Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries and Switzerland.  Security Engineering Inc. has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement, with respect to the personal data we collect from EU and/or Swiss data subjects or receive from our affiliates located in the EU and/or Switzerland, such as information regarding service requests, service orders, handling orders, delivering services and processing payments.

  • When Security Engineering Inc. is a data processor

Security Engineering Inc. obligations with respect to personal data for which Security Engineering Inc. is solely a data processor, such as personal data that Security Engineering Inc. customers store or transfer using Security Engineering Inc. technology hosting services, are defined in its agreements with its customers and are not included in this Privacy Statement. In those circumstances Security Engineering Inc. receives personal data from the EU as an agent of the customer merely for processing and is not required to apply Safe Harbor principles to that information. The customer will remain responsible for the personal data that it collects and processes and for the compliance with applicable data protection laws.

 

Sensitive Information

We will not intentionally collect or maintain, and do not want you to provide, any information regarding your medical or health condition, race or ethnic origin, political opinions, religious or philosophical beliefs or other sensitive information.

 

Children’s Online Privacy Protection

Our services are not designed for or directed to children under the age of 13, and we will not intentionally collect or maintain information about anyone under the age of 13.

 

2. WHAT DO WE USE THIS INFORMATION FOR?

Personal Information

We may use your information to process your service requests, handle orders, deliver products and services, process payments, communicate with you about orders, provide access to secure areas of the Website, recommend merchandise and services that might be of interest to you, to personalize your visit to our Website, and to enable us to review develop and continually improve the products services and offers we provide online. We also use this information to prevent or detect fraud or abuses of our Website and to enable third parties to carry out technical, logistical or other functions on our behalf.

 

Contact Information

We use visitor information to send information about our company to visitors and to get in touch with them when necessary. We also use the information we collect to improve the content of our websites and as training aides for our employees. Visitors are given the choice at the point when we request their information.

 

Financial Information and payment card details

We may ask visitors to enter credit card or account information in order to process orders for services placed with Security Engineering Inc. or its affiliates. Financial information provided via our website or via the Security Engineering Inc. Control Panel® portal is transferred over a secure connection. We collect this information on a transaction-by-transaction basis and will not authorize the release of the information with anyone not directly involved in processing the transaction. This information may be encrypted and stored for logging purposes in accordance with applicable regulatory requirements.

Credit card numbers are used only for processing payments and are not used for any other purposes. When we use third party service providers for credit card processing services we will enter into a written agreement with such third party ensuring appropriate security and confidentiality measures are in place in safeguarding your personal data.

We use web visit information to measure interest in and develop our web pages and marketing plans, customize the content you view on your web visits based on your activity on past visits, and administer our Website.

  • We use the visitors’ IP address to help diagnose problems with our servers, and to administer our Websites. 
  • We use cookies to help us recognize visitors as unique visitors (just a number) when they return to our websites For example, if there are 1,000 visits to our    website on a certain day, we can use cookies to discover how many of those visits were made via the same browser (same visitor). We may also use the cookie to discover whether a certain visitor has visited our site more than once, and the source for each visit. We also use cookies to: allow us to tailor content or advertisements to match your preferred interest; avoid showing visitors the same advertisements repeatedly; compile anonymous, aggregated statistics that allow us to understand how users use our site and to help us improve the structure of our Website (we cannot identify visitors personally in this way); count the number of anonymous users of our sites.
  • We use web beacons to count the number of times that our advertisements and web-based email content are viewed. We combine web beacon information with cookies to track activity on our website originating from advertisements and web-based email content.

We use information you provide to us via telephone calls, chat, email, web forms and other communications to correspond with you about services you may be interested in purchasing. If you elect to purchase a service online using a web form, we will use the information to establish your account. Information you submit in writing, such as chat, email, and web form information is archived and may be tied to information that we collect about your web visits.  Your telephone call may be recorded for training purposes and we may enter information you provide via telephone into our systems to use for the purposes described in this paragraph.

 

3. DISCLOSURE OF PERSONAL INFORMATION

Personal information we gather is for internal use only and will not authorize the release of this information to anyone outside Security Engineering Inc. (except to third party service providers to Security Engineering Inc. who perform functions on our behalf but in such event personal information will only be shared to the extent reasonably necessary to perform their functions and they will not be authorized to use it for any other function), unless you have consented to such disclosure.

Should you breach our terms and conditions or website terms, or if we are under a duty to disclose or share your personal data in order to comply with any legal obligation, we may disclose your information to a relevant authority. This may include exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction. In particular, we may release the information we collect to third parties when we believe it is appropriate to comply with the law, to enforce our legal rights, to protect the rights and safety of others, or to assist with industry efforts to control fraud, spam or other undesirable conduct.

We may release the information we collect to third parties, where the information is provided to enable such third party to provide services to us, provided that the third party has agreed to use at least the same level of privacy protections described in this Privacy Statement, and is permitted to use the information only for the purpose of providing services to us.

 

4. OPTING OUT OF COMMUNICATIONS

Security Engineering Inc. gives you an opportunity to chose to opt-out of personal data being disclosed to third parties for a purpose incompatible with the purpose for which it was originally collected (except for meeting applicable legal requirements or permitting third party service providers who perform functions on our behalf as described in section 3 of this Privacy Statement), including your opting out of receiving future marketing mailings.  We will not use your contact information to correspond with you about our services if you ask us not to.  Please send your request to This email address is being protected from spambots. You need JavaScript enabled to view it.. Please note that it may take up to ten days to remove your contact information from our marketing communications lists, so you may receive correspondence from us for a short time after you make your request.

 

5. SECURITY OF YOUR INFORMATION

Security Engineering Inc. is committed to industry best practices approaches concerning security measures to prevent the loss, misuse and alteration of the information in our possession. We use various security measures to protect the information we collect, as appropriate to the type of information, including encryption, firewalls, and access controls. We store information you provide to us on a computer system located in a controlled facility with a limited access. Visitor textual information is encrypted during transmission, our company databases are accessible only by Security Engineering Inc. employees, contractors and agents on a need to know basis and who have entered into and are bound by a confidentiality and nondisclosure agreement with Security Engineering Inc..

 

6. DATA INTEGRITY

Personal data we collect is relevant for the purposes for which it is to be used. Security Engineering Inc. takes reasonable steps to ensure that data is reliable for its intended use, accurate, complete, and current.

 

7. RIGHT TO ACCESS YOUR PERSONAL INFORMATION

If you believe that any personal information we have about you is incorrect, or is, has been, or might be used inappropriately, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it., and we will take steps to correct or delete the information, or restrict its use, as appropriate.

 

8. VERIFICATION

Security Engineering Inc. utilizes the self-assessment approach to assure its compliance with its Privacy Statement. Security Engineering Inc. regularly verifies that the privacy statement is accurate, comprehensive, prominently displayed, completely implemented and in conformity with the Safe Harbor Principles and conducts its self-assessment on an annual basis to ensure that all relevant privacy practices are being followed. Appropriate employee training is in place and internal procedures for periodically conducting objective reviews of compliance are in place. A statement verifying this self-assessment is signed by a corporate officer or other authorized representative at least once a year. 

 

9. INQUIRIES OR COMPLAINTS

If you have a question or complaint about this Privacy Statement or our information collection practices, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.. We will investigate the matter and are committed to resolve any privacy concerns that you may have.

 

10. CHANGES

Our business changes constantly and our Privacy Statement may also change from time to time. You should check our website frequently to see recent changes, however, we will never materially change our policies and practices to make them less protective of personal information collected in the past without your prior consent. This Privacy Policy was last updated on November 2, 2017.

Situational Awareness & Mass Notification

Situational Awareness & Mass Notification

Status Solutions

The SARA situational awareness system with real-time, automated alerts will help protect your people, property, and business.


situational-awareness-system Integrated alarm management and automatic mass notification SARA is an automated alerting engine that integrates stand-alone alarm and communication systems for centralized monitoring, alerting and reporting. Such unification ensures that critical data is delivered to the right people so they can address an unfolding situation in the right way. Inefficient, stand-alone alarms are converted into real-time, detailed notifications to key individuals, select groups/response teams or entire populations via the designated communication end points. SARA’s modes and actions automatically set alerting/mass notification in motion when a triggering event occurs, according to your protocols and escalation paths. Your existing networks, sensors and devices work together, without silos, to improve communication and information flow. Such interoperability also means that legacy systems don’t have to be ripped out and replaced.

SARA’s Positioning System (SPS) The SARA automated alerting engine powers local mobile duress. When a pendant (a.k.a. panic button) is activated, alerts immediately go to the appropriate on- and off-site responders, according to preprogrammed alerting protocols and escalation paths. In addition to delivering real-time alerts produced by mobile pendant presses, SARA also provides approximate location data, a capability that enhances local mobile duress with a level of accuracy not available from traditional RF-based systems. Not only does SPS improve response times and overall quality of service, it also allows valuable equipment to be tracked for life safety, security and operational efficiency.

Applications for SPS SARA with SPS for vector mapping provides local mobile duress in a variety of environments including: Senior living communities – mobile duress for residents and asset tracking Hospitals – mobile duress for clinicians/staff and asset tracking K-12 schools – mobile duress for teachers, administrators and students with special needs Courthouses and other criminal or civil justice settings – mobile duress for judges, lawyers, jurors and guards Hotels/resorts – mobile duress for room attendants, other lone workers and VIPs, Manufacturing facilities, etc…

IP Intercom & Critical Communication

IP Intercom & Critical Communication

By developing revolutionary IP-based Intercom and PA solutions, we deliver clear, intelligible audio in highly noisy environments over standard power over Ethernet connections. We provide audio solutions that seamlessly integrate into other commonly used technologies so a virtual presence can be achieved.

compact-elegant-indoor-ip-intercom

PULSE

PULSE by Vingtor-Stentofon is a cost efficient solution for your small to medium sized communication requirements. The system allows for as few as two stations and is scalable according to your needs.
We provide communication solutions suited to the exact requirements of any type of project, whether it is the local super market, a casino or a large corporate campus. Our technology helps you to provide more efficient security services. High quality, crystal-clear voice communication makes all the difference during an emergency.

ip-intercom-pulse
ip-intercom-turbine
ip-emergency-stanchions

Infant Protection & Patient Wandering

Infant Protection & Patient Wandering

Accutech

Cuddles Infant Protection System

Protecting newborn patients from the threat of abduction has become a high priority in all well run hospitals and birthing centers. Providing high quality infant protection in a hospital environment is easier and more affordable than ever with Cuddles Infant Protection system from Accutech. Cuddles is an (RFID) electronic security system designed specifically to maintain the safety of infants in obstetric and pediatric departments. A small, tamper-proof infant protection tag is placed on the infant immediately after birth attached to our soft bracelet – a self-adjusting band, unique to Cuddles, made with an ultra-soft polyester blend that doesn’t cut or chafe the skin, and won’t fall off due to movement or changes in weight. If a situation develops where there is an unauthorized movement of the baby toward a monitored area, sensors will immediately warn hospital staff and automatically lock the door. Cuddles integrates easily with other security and access control systems your facility may already have in place–protecting investments you have already made.

Accutech’s Cuddles infant protection system aids the general safety and security of infants entrusted to your facility. Easy-to-use hardware and software work seamlessly, enabling nurses to spend less time managing a “system” and more time focusing on what matters most—caring for their infant patients.

Soft Bracelet

Accutech Soft Band

The Cuddles infant protection system Soft Bracelet is a light-weight, self-adjusting band that fits snugly and comfortably around the ankle or wrist. Made of an ultra-soft polyester blend, the bracelet won’t cut or chafe the skin, and won’t fall off due to movement or changes in weight.

In the event of removal or cutting, the Soft Bracelet immediately activates an alarm—preventing abductions and ensuring the continued safety and security of the infant wearing it.

We use cookies to improve our website. Cookies used for the essential operation of this site have already been set. For more information visit our Cookie policy. I accept cookies from this site.Agree