Privacy, Secure Communications & Encryption

Privacy and COPPA Certification

Jiobit takes your and your child’s privacy and security very seriously

We’re committed to being open and honest about how we use data. To learn
more about our Privacy Policy, go to

Jiobit is compliant with COPPA (The Children's Online Privacy Protection Act), protecting the personal information of children under 13. Jiobit has been certified through the kidSafe+ certification program.


What is COPPA (Children's Online Privacy Protection Act)?

The act, effective April 21, 2000, applies to the online collection of personal information by persons or entities under U.S. jurisdiction about children under 13 years of age. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing of those under 13.


What is kidSAFE?

The kidSAFE Seal Program is an independent safety certification service and seal-of-approval program designed exclusively for children-friendly websites and technologies, including online game sites, educational services, virtual worlds, social networks, mobile apps, tablet devices, connected toys, and other similar online and interactive services.


Dealing with sensitive information means going above and beyond to keep it secure. While most of Jiobit’s security platform is built to keep the bad guys out, here are a few of the features that we have implemented that make your Jiobit, application, and associated services one of the most secure consumer electronics platforms in the world.

  • We encrypt your child’s data end-to-end using Transport Layer Security (TLS) and Advanced Encryption Standard (AES) Cipher Suites. That means nobody can see your child’s location but you and your designated Care Team. Additionally, your data is encrypted in our data center and on our servers.
  • Jiobit uses a security chip, just like a credit card, to enable trusted connections and prevent hacking. This means nobody else can clone it and claim to be that device. Each device has a unique identity/key that cannot be cloned.
  • Proprietary Bluetooth encryption makes sure no one can intercept the communications from a Jiobit and spoof your smartphone.
  • Cryptographically signed software makes sure that only software approved by Jiobit will run on the Jiobit device.

For more details on Jiobit’s security architecture, check out this blog post that goes into even greater detail and highlights more of our work in this space.

Updated 2 years ago

Privacy, Secure Communications & Encryption

Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.