Home
About Dahua

Trust Center

Trust Centre

Secure And Trust

Open and Transparent

Open and Transparent

Dahua has always maintained an open and transparent attitude. We share openbottom best practices with customers and communicate with openbottom organizations in an active and open manner.

Under the leadership of the Cybersecurity Committee, we set up a cybersecurity and data protection team, with representatives and experts in data protection, network security, legal affairs, supply chain, R&D, marketing, delivery and service, etc. This dedicated team provides insights into the latest laws, regulations, and standards around the world, conducts internal audits and risk assessments, and formulates compliance policies based on the application scenarios of products and services.

We also have a Cybersecurity Research Institute to continuously develop and improve Dahua's privacy protection compliance system, security engineering framework, endogenous security and privacy technology framework, penetration attack and defense capability, incident resposne and ecosystem capability.

We fully respect and protect the information security and privacy of our customers, and strive to provide more secure and assured products and services.

Privacy Protection

Privacy Shield Principles
Privacy Shield Principles
Privacy Technologies and Features
Privacy Technologies and Features
Privacy Impact Assessment
Privacy Impact Assessment

Dahua PSIRT

Security Advisories
Security Advisories
Security Notice
Security Notice
Report a vulnerability
Report a vulnerability
How we deal with vulnerabilities
How we deal with vulnerabilities
Our responses to vulnerabilities
Our responses to vulnerabilities
Security Advisories
Security Advisories
Security Notice
Security Notice
Report a vulnerability
Report a vulnerability
How we deal with vulnerabilities
How we deal with vulnerabilities
Our responses to vulnerabilities
Our responses to vulnerabilities

Resources

2025-01-22
Dahua NIS2 White Paper On December 14 2022, European Union (EU) adopted an updated version of the NIS directive to replace the initial NIS directive that was established in 2016. The new NIS directive (“NIS2”) addresses the limitations of the initial NIS directive through establishing with stricter cybersecurity requirements, and expanding the scope of entities and sectors that fall within the scope of the new directive. Overall, the NIS2 Directive focuses on those organizations that are essential and important in the supply chain of critical infrastructure.
2023-10-18
How Can Dahua Products Help Users Comply with GDPR General Data Protection Regulation · A new set of rules designed to give EU citizens more control over their personal data. · Entered into effect on May 25th, 2018. Influence on video surveillance system The end users, solution operators and service providers (“Organization”) may be the main data controllers or data processors defined by GDPR. Therefore,GDPR compliance at large depends on how Organization use the product or service. The Organization concerned should carefully select products and services which are used to process personal data.
2024-05-31
Dahua Product Security White Paper v3.0 Without the prior written permission of Zhejiang Dahua Technology Co., Ltd. (hereinafter referred to as "Dahua"), no one may copy, transmit, distribute or store any content of this document in any form. The products described in this document may contain software copyrighted by Dahua and other third parties. No one shall copy, distribute, modify, extract, decompile, disassemble, decrypt, reverse engineer, lease, transfer, sublicense or otherwise infringe the copyright of the software in any form except with the permission of the relevant owner.
2020-03-18
Dahua Product Security White Paper V2.0 The continuous and in-depth development of AIoT needs to be established on the basis of responsible, open, professional, and systematic cyber security and privacy protection. Dahua has always regarded cyber security and privacy protection as one of the company's highest programs, and has continued to set up special funds to ensure that the research & development and delivery of product security, research on key security technologies, and construction of security incident response system are steadily promoted. Before releasing the products, all of them must pass rigorous testing conducted by the attack and defense laboratory. At present, Dahua has achieved fruitful results in security technology areas such as trusted computing, data encryption, privacy protection, and attack and defense testing, and has integrated applications in a full range of products. This product security white paper aims to provide users with a deeper understanding of the security capabilities of Dahua products through a comprehensive elaboration of Dahua product security framework construction, security baseline practices, security technology applications, and security usage recommendations.

News and Notices