top of page

Privacy Policy

TERMS OF SERVICE

Hovering Horizons L.L.C.

Operating Brand: Sure Sight

Effective Date: 02/23/2026

Last Updated: 02/23/2026

 

1. Acceptance of Terms

These Terms of Service (“Terms”) govern your access to and use of the website, products, hardware, software, and services (collectively, the “Services”) provided by Hovering Horizons L.L.C., a Texas limited liability company (“Company,” “we,” “us,” or “our”), operating under the brand Sure Sight.

By accessing or using our Services, you agree to be bound by these Terms.

 

2. Description of Services

Sure Sight develops and provides:

  • Door-mounted projection security systems

  • Embedded vision hardware

  • Software and firmware solutions

  • Related cloud or support services (if applicable)

We reserve the right to modify or discontinue Services at any time.

 

3. Eligibility

You must be at least 18 years old to use our Services.

By using our Services, you represent that you have the legal capacity to enter into this agreement.

 

4. Account Responsibilities

If you create an account:

  • You are responsible for maintaining confidentiality of login credentials.

  • You are responsible for activities under your account.

  • You must provide accurate information.

We reserve the right to suspend accounts for misuse or security risks.

 

5. User Responsibilities

You agree not to:

  • Use the Services for unlawful surveillance.

  • Violate privacy laws or record individuals illegally.

  • Reverse engineer or attempt to extract proprietary source code.

  • Interfere with system integrity or security.

  • Use the Services in violation of local, state, or federal law.

You are solely responsible for compliance with surveillance and recording laws in your jurisdiction.

 

6. Ownership & Intellectual Property

All intellectual property rights in the Services, including:

  • Hardware designs

  • Firmware

  • Software

  • Trademarks

  • Patents

  • Trade secrets

are owned by Hovering Horizons L.L.C. or its licensors.

No rights are granted except as expressly provided in these Terms.

 

7. User Data & Content

Users retain ownership of their data, including:

  • Video recordings

  • Configuration settings

  • Device-generated content

We do not claim ownership of user-generated content.

Our handling of personal data is governed by our Privacy Policy.

 

8. Payments (If Applicable)

If you purchase products or services:

  • You agree to pay all applicable fees.

  • Payment processing is handled by third-party providers.

  • Taxes are the responsibility of the purchaser unless otherwise stated.

We reserve the right to adjust pricing with notice.

 

9. Warranty Disclaimer

THE SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE.”

We disclaim all warranties, express or implied, including:

  • Merchantability

  • Fitness for a particular purpose

  • Non-infringement

We do not guarantee uninterrupted or error-free operation.

 

10. Limitation of Liability

To the maximum extent permitted by law:

Hovering Horizons L.L.C. shall not be liable for:

  • Indirect or consequential damages

  • Lost profits

  • Loss of data

  • Property damage

  • Personal injury

Our total liability shall not exceed the amount paid for the product or service in the preceding 12 months.

 

11. Indemnification

You agree to indemnify and hold harmless Hovering Horizons L.L.C. from claims arising out of:

  • Misuse of Services

  • Violation of law

  • Violation of third-party rights

 

12. Termination

We may suspend or terminate access if you violate these Terms.

Upon termination:

  • Your right to use the Services ends immediately.

  • Certain provisions survive termination (IP, liability, indemnification).

 

13. Governing Law

These Terms are governed by the laws of the State of Texas, without regard to conflict of law principles.

Disputes shall be resolved in Texas courts unless otherwise agreed.

 

14. Changes to Terms

We may update these Terms periodically. Continued use constitutes acceptance of revised Terms.

 

Sure Sight

Privacy & Data Handling Whitepaper

Prepared by Hovering Horizons L.L.C.

 

Executive Summary

Sure Sight is designed around privacy-by-design principles and user data sovereignty.

We do not monetize surveillance data.

We do not sell personal information.

Users retain ownership and control of their video content.

This document outlines how data is collected, processed, stored, and secured.

 

1. Data Philosophy

Sure Sight operates on three principles:

  1. Data Minimization – Collect only what is necessary.

  2. User Ownership – Customers retain control of footage and device data.

  3. Security by Default – Encryption and access controls are standard.

 

2. Data Categories

A. Personal Information

  • Name

  • Email

  • Contact details

  • Account credentials

B. Device Data

  • Device ID

  • Firmware version

  • Diagnostic logs

  • Performance metrics

C. Video Data

  • Captured by user-controlled devices

  • Stored locally unless cloud storage is enabled

  • Not accessed without explicit authorization

 

3. Video Data Governance

  • Video footage belongs to the user.

  • Footage is not analyzed for advertising purposes.

  • No facial recognition monetization.

  • No third-party data brokerage.

If cloud storage is offered:

  • Data is encrypted in transit and at rest.

  • Access is role-based and audited.

 

4. Data Storage Architecture

Depending on configuration:

  • Local storage (default architecture)

  • Optional encrypted cloud storage

  • Segregated customer environments

  • No shared multi-tenant data exposure

 

5. Encryption Standards

  • TLS encryption for data in transit

  • AES-256 (or equivalent) for data at rest

  • Secure key management practices

 

6. Access Controls

  • Role-based internal access

  • Multi-factor authentication for administrative access

  • Access logging and monitoring

 

7. Third-Party Processors

We may engage providers for:

  • Cloud infrastructure

  • Payment processing

  • Analytics

All processors are contractually required to maintain confidentiality and security standards.

 

8. Regulatory Compliance Readiness

Sure Sight is structured to align with:

  • U.S. privacy laws

  • Texas data protection requirements

  • CCPA/CPRA

  • GDPR principles

  • Data minimization frameworks

 

9. Incident Response

In the event of a data incident:

  • Immediate containment procedures

  • Internal investigation

  • Notification in accordance with applicable law

  • Security remediation measures

 

10. Investor Assurance

Sure Sight’s architecture is designed to:

  • Reduce regulatory risk

  • Avoid surveillance monetization exposure

  • Minimize data liability footprint

  • Support scalable compliance frameworks

Hovering Horizons L.L.C. views privacy protection as a competitive advantage and core brand pillar.

Sure Sight

Data Security Architecture Overview

 

System Overview

Sure Sight is a door-mounted projection security system integrating:

  • Embedded camera modules

  • On-device processing

  • Optional network connectivity

  • User-controlled storage

Architecture prioritizes local processing and minimized cloud dependency.

 

1. Core Architecture Model

Edge-First Processing

  • Computer vision runs on-device.

  • Video analysis does not require cloud transmission by default.

  • Reduced attack surface and data exposure.

 

2. Data Flow Summary

  1. Camera captures image.

  2. Processing occurs on local embedded system.

  3. Projection renders interior display.

  4. Storage (local or encrypted cloud if enabled).

No automatic third-party streaming.

 

3. Encryption Framework

  • TLS for network communications

  • Encrypted storage volumes

  • Secure boot and firmware validation (where supported)

  • Cryptographic key isolation

 

4. Access Control Model

  • Role-based administrative access

  • Strong authentication protocols

  • Least-privilege internal access

  • Audit logs for administrative actions

 

5. Security Layers

  • Hardware layer protections

  • Firmware integrity validation

  • Application-level authentication

  • Network-level encryption

  • Cloud infrastructure isolation (if applicable)

 

6. Threat Mitigation Strategy

Designed to mitigate:

  • Unauthorized remote access

  • Credential compromise

  • Firmware tampering

  • Data interception

  • Insider access abuse

 

7. Scalability & Compliance Readiness

Architecture supports:

  • SOC 2 pathway readiness

  • Enterprise deployment

  • API-based integration

  • Secure OTA firmware updates

 

8. Competitive Security Positioning

Sure Sight differentiates by:

  • Edge-based vision processing

  • Non-monetization of surveillance data

  • User data sovereignty model

  • Reduced centralized data risk

Hovering Horizons L.L.C.

Texas, United States

Email:trinity_m_ison@hotmail.com

Website: https://www.securesightguard.com/

bottom of page