bondu is designed for children and their families and we take our responsibility to protect privacy, safety, and security seriously. This page explains clearly and simply how we think about privacy and security, what data we collect, how we protect it, and the controls available to parents and caregivers.
This page is meant to be human‑readable. For full legal details, please review our Privacy Policy and Terms of Service.
Our Privacy & Safety Principles
We design bondu around the following core principles:
We build privacy and security into our product from the start, not as an afterthought. |
|
We only collect data that is necessary to operate and improve bondu. |
|
Parents and caregivers remain in control of their child’s experience and data. |
|
We use industry‑standard security practices to protect data across devices, apps, and systems. |
|
We aim to be clear about what we do and why. |
What Data We Collect
bondu collects limited data to provide its core functionality and support families. We do not sell personal data.
Depending on how you use bondu, this may include:
- Account information (such as parent email address)
- Purchase and subscription information
- Parent‑submitted information about a child (for personalization, when enabled)
- Customer support communications
- Device identifiers and basic diagnostic information
- Interaction metadata (for example, feature usage and performance)
- App and firmware version information
- We do not retain any voice recordings and we do not use voice to train models
- Conversation data is anonymized and processed according to strict security controls
Trust & Safety in Every Detail
How We Protect Your Data
We use multiple layers of technical and organizational safeguards, including:
- Encryption in transit and at rest
- Secure cloud infrastructure with restricted access controls
- Regular vulnerability scanning and penetration testing
- Secure firmware and software development practices
- Access to systems limited to authorized personnel
- Internal security training and policies
- Incident response and breach‑response procedures
- Secure device provisioning and authentication
- Protection against unauthorized access to devices
- Monitoring for abnormal behavior or misuse
Last updated: Mar 3, 2026


