DOVE COMMUNICATIONS, INC.
Privacy Policy
Effective Date: February 1, 2026
Effective Date: February 1, 2026
Dove Communications, Inc. (“Dove,” “we,” “us,” or “our”) provides bundled communications, telecommunications, VoIP, SMS/text messaging, managed IT, managed services provider (“MSP”), cybersecurity, computer network, cloud, software-enabled, and AI-enabled services, as well as structured cabling, access control, alarm, video surveillance, monitoring, and related technology services throughout the United States.
This Privacy Policy explains how we collect, use, disclose, retain, and protect information when you:
• Visit our websites, portals, or online properties;
• Contact us as a prospect, customer, vendor, or business partner;
• Purchase or use our products or services;
• Interact with our support, monitoring, telecom, security, AI-enabled, cloud, or managed services;
• Serve as a customer contact, authorized user, administrator, employee, contractor, visitor, or occupant at a monitored or serviced location; or
• Otherwise communicate with us.
This Privacy Policy is intended to serve as a public-facing privacy notice and, where applicable, a notice at collection describing the categories of personal information we collect, the sources of that information, the purposes for which we use it, and the categories of third parties to whom we may disclose it. Various state privacy laws, including California and other comprehensive state privacy laws, may require businesses to provide consumers certain information at or before collection, describe available privacy rights, and make a fuller privacy policy available.
1. Scope and How This Policy Works
This Privacy Policy applies to information we collect in connection with our business operations, websites, customer relationships, and services.
It does not replace any contract, service order, monitoring agreement, telecom terms, service-specific terms, data processing addendum, or other agreement between Dove and a customer. If a customer agreement says we process certain information on that customer’s behalf, that agreement may control for those services.
In many situations, Dove acts in one of two roles:
• Business / controller role: for information we collect for our own operations, such as website visits, sales inquiries, billing, account management, contract administration, and business communications.
• Service provider / processor role: for information we process on behalf of customers in delivering managed IT, MSP, telecom, VoIP, SMS, monitoring, access control, alarm, surveillance, AI-enabled, cloud, cybersecurity, software, or related services.
If we process information on behalf of a customer, the customer may control certain decisions about notices, access, correction, deletion, retention, and lawful use. In those cases, you may need to direct your request to that customer first.
If a Data Processing Addendum applies, that Data Processing Addendum governs Dove’s processing of personal information on behalf of Client to the extent of any conflict with this Privacy Policy.
2. The Types of Information We Collect
The information we collect depends on your relationship with us and the services involved.
| Category | Examples |
| Identifiers and contact information | Name, company, title, service address, billing address, email, phone number, account username, customer ID, emergency contact information |
| Account and commercial information | Quote and order details, services purchased, subscriptions, licenses, service history, contract records, provisioning records, preferences, project details |
| Billing and payment information | Billing contacts, invoice details, payment status, payment method details, tax-related information, collections information |
| Device, network, and telemetry data | IP addresses, MAC addresses, device identifiers, browser details, network logs, endpoint information, health and monitoring data, vulnerability and patch-status information, configuration data, authentication and access logs, mobile device and application identifiers, cloud and tenant telemetry, and security telemetry |
| Support and ticket data | Trouble tickets, chat logs, emails, call notes, diagnostics, screenshots, attachments, service histories, escalation records, remote-session activity, device and user-submitted troubleshooting data, support call or screen recordings where enabled, and transcripts, summaries, or similar AI-assisted support artifacts |
| VoIP and call data | Phone numbers, call detail records, call routing details, timestamps, duration, registered location information, dispatchable location information, voicemail-related metadata, porting and provisioning records, call recording data where enabled, transcripts, and related telecom usage and provisioning records |
| SMS and messaging data | Sender and recipient numbers, timestamps, routing, delivery status, application-to-person messaging records, opt-in/opt-out information, campaign registration data, sender and brand registration details, and in some cases message content or attachments where processed for delivery, storage, support, compliance, or troubleshooting |
| Emergency and location information | Service address, dispatchable location, registered location, caller location information, alarm location details, site contact data, emergency response instructions, and related E911 records |
| Alarm, access-control, security, and monitoring data | Alarm signals, event logs, arming/disarming activity, badge or credential data, door events, schedules, contact lists, response instructions, monitoring center records, central-station and dispatch workflow records, sensor data, intrusion or tamper events, environmental alerts, and responder workflow records |
| Video, image, audio, recording, and monitoring data | Camera footage, snapshots, clips, intercom audio, call recordings, support recordings, screen recordings, remote viewing content, archived recordings, exported media, monitoring review records, transcripts, and related metadata |
| Cloud, platform, software, and subscription data | Cloud account details, tenant IDs, subscription and license usage, authentication records, audit logs, storage usage, mobile app activity, vendor platform data, remote-management and remote-monitoring records, backup status, sync activity, and administrative event logs |
| AI inputs, outputs, automation, and analytics data | Prompts, clips, transcripts, summaries, classifications, alerts, recommendations, analytic outputs, event categorizations, search results, automation instructions, anomaly flags, model-generated content, and related confidence, ranking, or scoring outputs |
| Website and cookie data | Browser type, pages viewed, session data, referral URLs, cookies, pixels, analytics data, form submissions, chat interactions, and similar website or portal usage information |
| Business communications | Emails, letters, proposals, meeting notes, phone conversations, and other communications with our teams |
3. Where We Get Information
We collect information from a variety of sources, including:
• directly from you, such as when you contact us, request a quote, sign up for services, submit a form, pay an invoice, open a support ticket, or communicate with us;
• from our customers, such as when they identify authorized contacts, users, locations, administrators, responders, visitors, or monitored premises information;
• from your devices, networks, browsers, and systems, such as through logs, cookies, monitoring tools, platform integrations, or telecom systems;
• from service activity, such as call records, SMS or messaging activity, alarm events, access logs, recordings, support interactions, cloud platform usage, E911 records, AI-enabled processing activity, and monitoring events;
• from third parties, such as carriers, messaging aggregators, cloud providers, software vendors, manufacturers, monitoring centers, payment processors, distributors, integrators, referral partners, identity or fraud-prevention providers, and public sources;
• from emergency and regulatory interactions, such as emergency-calling records, dispatch information, permit-related communications, and lawful requests.
4. How We Use Information
We use information for legitimate business and service-delivery purposes, including to:
• Provide, activate, install, configure, support, maintain, monitor, and improve our products and services;
• Create, manage, and administer accounts, subscriptions, licenses, and projects;
• Process orders, invoices, payments, credits, and collections;
• Authenticate users and manage access, credentials, and permissions;
• Deliver telecom, VoIP, messaging, alarm, video, monitoring, cloud, managed IT, MSP, AI-enabled, and cybersecurity services;
• Support emergency calling, alarm response workflows, dispatch handling, and service continuity;
• Troubleshoot issues, investigate incidents, monitor performance, and provide customer support;
• Register messaging campaigns and sender information, manage SMS compliance workflows, and process opt-in/opt-out requests;
• Manage monitoring-center instructions, contact lists, response protocols, and event escalations;
• Process, host, store, transmit, analyze, and retrieve recordings, logs, alerts, and related service data;
• Generate analytics, automation, summaries, alerts, recommendations, classifications, or AI-assisted outputs;
• Communicate with customers, prospects, vendors, and service users;
• Protect our systems, networks, services, customers, and business from fraud, abuse, misuse, security incidents, or unlawful activity;
• Comply with legal, regulatory, contractual, and insurance-related obligations;
• Enforce our contracts, policies, and acceptable-use requirements;
• Carry out internal business operations such as auditing, reporting, forecasting, service planning, and business transfers.
We may also use de-identified or aggregated information for internal analytics, operations, service planning, and business improvement, provided we do not attempt to reidentify such information except as permitted by law.
5. Sensitive or Higher-Risk Data
Depending on the services involved, we may process information that may be considered sensitive under some laws or contexts, such as:
• Precise or service-location information used for VoIP/E911, dispatch, alarm response, or similar emergency-related functions;
• Call records and communications metadata;
• Video or audio recordings;
• Access-control and entry records;
• Network, security, or incident-response logs;
• Credentials, identity-verification data, or security settings;
• AI-generated classifications or incident-related outputs.
Where we process this type of information, we generally do so to provide requested services, protect systems and people, meet legal or regulatory obligations, or as otherwise permitted by applicable law and contract.
6. Telecom, VoIP, SMS, and Emergency Services
If you use our telecom, VoIP, or messaging services, we may process account, call, number, routing, usage, registration, provisioning, porting, and location data needed to deliver, support, secure, authenticate, and bill for those services. That may include customer proprietary network information (“CPNI”) or similar telecom-related records. Where applicable, we use, disclose, and protect CPNI only as permitted or required by applicable federal law, including for service delivery, provisioning, billing, repair, maintenance, fraud prevention, authentication, emergency services, network operations, account administration, and other purposes authorized by law.
For E911 or emergency-calling functionality, we may collect, use, update, verify, and disclose service addresses, registered locations, dispatchable locations, callback information, and related records to carriers, emergency service providers, public safety answering points, database managers, and others involved in emergency services.
For SMS and messaging services, we may process opt-in and opt-out status, campaign registration details, sender and brand registration details, sender information, recipient information, delivery data, and, where applicable, message content or attachments for delivery, storage, support, compliance, fraud prevention, or troubleshooting. Customers remain responsible for their own campaign content, consent practices, disclosures, sender identification, opt-out handling, and lawful use of messaging services, including compliance with applicable texting, telemarketing, 10DLC, and carrier requirements.
7. Monitoring, Recording, Video, Audio, and Access Events
Our services may involve the transmission, review, storage, analysis, or disclosure of:
• Alarm signals and event data;
• Remote viewing activity;
• Camera footage, clips, still images, and audio;
• Intercom sessions;
• Call recordings or support recordings;
• Access-control and credential events;
• Monitoring-center notes and response logs.
Depending on the services purchased, recordings and monitoring data may be reviewed by Dove personnel, monitoring centers, cloud or software providers, manufacturers, integrators, customer-authorized users, or AI-enabled tools for service delivery, troubleshooting, response handling, security, training, quality assurance, incident review, transcription, summarization, analytics, automation, and legal compliance.
Important: customers are responsible for deciding whether and where to deploy cameras, microphones, monitoring, analytics, AI-enabled review tools, call recording, or similar features; for configuring those features appropriately; for providing required signs, workplace notices, privacy disclosures, and policy disclosures; and for obtaining any legally required consents or authorizations from employees, contractors, visitors, tenants, callers, or other affected persons under applicable federal, state, and local law, including laws that may require one-party, two-party, or all-party consent for certain recordings or monitoring practices.
8. AI-Related Processing
Some Dove offerings use or support artificial intelligence, machine learning, automation, analytics, transcription, summarization, classification, anomaly detection, monitoring enhancement, search, automated review, or similar capabilities.
If AI-enabled features are used, we may process prompts, text, audio, video, images, logs, event data, communications, recordings, or other inputs to generate outputs such as:
• Alerts,
• Classifications,
• Incident summaries,
• Recommendations,
• Transcripts,
• Risk indicators,
• Automation triggers,
• Search or analytic results.
AI-assisted outputs may be incomplete, inaccurate, delayed, inconsistent, biased, or inappropriate for a given use case. For that reason:
• AI outputs may be reviewed by human personnel;
• We may use third-party AI or cloud providers to support functionality;
• Customers remain responsible for reviewing outputs and making final operational, legal, employment, compliance, safety, and business decisions;
• Customers are responsible for confirming they have the right to submit content, data, recordings, communications, or other inputs used with AI-enabled services and for providing any required notices or obtaining any required consents related to those inputs;
We do not promise that AI features will detect, prevent, classify, summarize, or accurately report all events, and AI-assisted outputs should be reviewed appropriately for the relevant use case.
Some third-party security, access-control, video, or AI-enabled platforms may offer biometric, facial-recognition, person-detection, license-plate recognition, or similar analytic features. Dove does not enable or configure such features for regulated use unless expressly stated in a Quote. Customers are responsible for determining whether such features are lawful for their use case and for providing all required notices and consents.
9. Cookies, Analytics, and Website Technologies
Our websites and portals may use cookies, pixels, session technologies, analytics tools, forms, chat tools, and similar technologies to:
• Keep the site functioning;
• Remember preferences;
• Understand traffic and engagement;
• Improve usability and performance;
• Protect against fraud or abuse;
• Respond to inquiries and route leads.
You may be able to control cookies through your browser or device settings. Disabling some cookies may affect site functionality.
10. How We Share Information
We may disclose information to the following categories of recipients when reasonably necessary for the purposes described in this Policy:
| Recipient Category | Why We May Share |
| Service providers and contractors | Hosting, billing, payment processing, support, storage, security, analytics, document management, communications, ticketing, and administrative services |
| Carriers and telecom providers | Call routing, number provisioning, porting, emergency-calling support, messaging delivery, compliance, fraud prevention |
| Monitoring centers and dispatch-related providers | Alarm monitoring, event review, escalation, call handling, dispatch workflows, response protocols |
| Cloud, software, and platform vendors | Cloud hosting, SaaS tools, account management, storage, access control, video services, AI processing, remote management |
| Manufacturers, distributors, and integrators | Warranty support, diagnostics, device registration, licensing, fulfillment, recalls, product lifecycle management |
| Professional advisors | Lawyers, auditors, insurers, financing sources, and consultants |
| Emergency responders and public authorities | E911, police, fire, EMS, public safety answering points, permit agencies, and other authorities involved in response or compliance |
| Government, legal, and regulatory parties | To comply with law, subpoenas, court orders, enforcement matters, or to protect rights, property, and safety |
| Business transfer counterparties | A buyer, investor, lender, merger party, or successor in connection with a financing, sale, acquisition, or reorganization |
| Customers and authorized users | To provide services, reports, recordings, logs, support activity, and account management functions |
We may also disclose information:
• With your direction or consent;
• When necessary to investigate fraud, abuse, misuse, or security incidents;
• To enforce our agreements and policies;
• To establish, exercise, or defend legal claims.
11. Sale, Sharing, and Targeted Advertising
We do not sell personal information for money.
We also do not currently use personal information in a manner we intend to be a “sale” or “sharing” for cross-context behavioral advertising under California law. If that changes, we will update this Privacy Policy and provide any rights and notices required by law.
We do not knowingly sell or share personal information of individuals under 16.
12. 10DLC / SMS Privacy and Consent Expectations
If you use our messaging or campaign-related services:
• Customers are responsible for obtaining the necessary opt-ins, notices, and permissions for messages they send;
• Customers are responsible for honoring opt-out requests and maintaining compliant messaging practices;
• We may use or disclose messaging-related data for delivery, campaign registration, troubleshooting, fraud prevention, carrier compliance, and abuse prevention;
• Carriers, aggregators, and service providers may impose their own compliance, filtering, throughput, or suspension rules.
If you communicate directly with Dove by SMS, we may use your mobile number and related messaging data to respond, support service delivery, send transactional, service, support, account-related, or, where you separately consent, marketing messages, and maintain records of your communications. Consent to receive marketing messages from Dove, where applicable, is not a condition of purchase.
13. Customer Responsibility for Notices and Consents
Because Dove often provides services in business, workplace, mixed-use, and monitored-premises environments across multiple states, customers are responsible for their own compliance decisions regarding notices, disclosures, authorizations, and consents applicable to their personnel, users, callers, visitors, and other affected persons, including with respect to differing federal, state, and local requirements, and including with respect to:
• Employee and workplace privacy notices;
• Camera, audio, and call-recording signage or notices;
• Visitor and premises notices;
• Biometric, surveillance, access-control, AI-monitoring, or automated-analytics disclosures;
• Tenant, guest, or contractor notices;
• SMS, telemarketing, and campaign consents;
• Any other legally required notice, authorization, or policy.
Where we process information on a customer’s behalf, we rely on that customer to determine whether collection, recording, monitoring, AI-enabled processing, messaging, and related use are appropriate and lawful for its environment, and whether any additional notice, consent, authorization, signage, or policy is required under applicable federal, state, or local law.
14. Retention
We retain information for as long as reasonably necessary for the purposes described in this Policy, including to:
• Provide and support services;
• Maintain records of transactions and communications;
• Meet legal, tax, accounting, contractual, insurance, and regulatory requirements;
• Resolve disputes;
• Enforce agreements;
• Investigate incidents and protect systems.
Retention periods vary depending on the type of information and the service involved. For example, support records, billing records, account records, recordings, logs, monitoring events, cloud-stored content, and telecom records may be retained for different periods depending on business needs, customer agreements, applicable law, platform settings, and system capabilities.
If a customer controls the retention settings for a service, customer instructions and platform limitations may determine how long certain data remains available. We do not guarantee that deleted, expired, overwritten, or vendor-removed data will remain recoverable.
Recording, video, image, audio, access-control, alarm, and monitoring-event retention may depend on the applicable platform, device configuration, subscription level, storage allocation, customer settings, overwrite rules, internet connectivity, vendor policies, and the applicable Quote.
15. Security
We use commercially reasonable administrative, technical, and physical safeguards designed to protect information appropriate to the nature of the information and the services involved.
However:
• No method of transmission, storage, monitoring, cloud computing, telecom routing, or electronic security is completely secure;
• Service interruptions, carrier issues, software defects, credential compromise, misconfiguration, vendor incidents, malicious activity, and human error can affect confidentiality, integrity, and availability;
• We cannot guarantee absolute security or prevent every unauthorized act, misuse, outage, interception, breach, or data loss.
Customers are responsible for maintaining appropriate security measures in their own environments, devices, credentials, networks, policies, and physical premises.
16. Nationwide and Cross-State Processing
Dove is based in California and serves customers across the United States. Information may be processed, stored, or accessed in California and other states where we, our customers, our carriers, our monitoring centers, our cloud providers, our software vendors, or our service providers operate. Because privacy, recording, monitoring, biometric, employment, telecom, consumer-protection, and state comprehensive privacy-law requirements can vary by state, our handling of information may also depend on the services involved, the role we play, and the law that applies in the relevant jurisdiction.
By using our services or providing information, you understand that information may be transferred across state lines and processed in multiple jurisdictions as reasonably necessary to provide services and operate our business.
17. California Privacy Rights
If you are a California resident, California law may provide rights regarding personal information, subject to exceptions and the role in which we process data. Depending on the circumstances, these may include the right to:
• Know the categories of personal information we collected;
• Know the categories of sources from which personal information was collected;
• Know the business or commercial purposes for collecting, using, or disclosing personal information;
• Know the categories of third parties to whom personal information was disclosed;
• Request access to specific pieces of personal information;
• Request deletion of certain personal information;
• Request correction of inaccurate personal information;
• Limit the use or disclosure of certain sensitive personal information, where applicable;
• Opt out of sale or sharing, if applicable;
• Not be discriminated against for exercising applicable privacy rights.
Where required by applicable law, this Privacy Policy is intended to provide notice at collection and describe our privacy practices and applicable privacy rights.
How to Submit a Privacy Request
To submit a privacy request, please contact us using the contact details at the end of this Policy. We may need to verify your identity and authority before responding. Authorized agents may submit requests where permitted by law.
Limits on Rights Requests
In some cases, we may deny or limit a request where permitted by law, including where:
• We cannot verify identity or authority;
• We must retain the information to complete a transaction or provide a requested service;
• We process the information on behalf of a customer and the request should be directed to that customer;
• A legal exception applies.
18. Other State Privacy Rights
Residents of other states may also have privacy rights under applicable state law, including, where applicable, comprehensive consumer privacy laws now in effect or later enacted in jurisdictions such as Colorado, Virginia, Connecticut, Utah, Texas, Oregon, Montana, Delaware, Iowa, Nebraska, New Hampshire, New Jersey, Tennessee, Minnesota, Maryland, Indiana, Kentucky, and other jurisdictions. Depending on the law and circumstances, those rights may include rights to access, delete, correct, or obtain a copy of certain personal information, to appeal certain privacy-request decisions, or to opt out of certain profiling, targeted advertising, or sales activities where applicable.
Because our services are often business-to-business, service-provider, or customer-directed in nature, rights may vary depending on:
• The state where you reside;
• Whether the law applies to the data at issue;
• Whether Dove acts as a business/controller or as a processor/service provider;
• The type of service involved.
To make a request, please use the contact information below. We will review requests under the law that applies to the request.
19. Telecom Privacy and Customer Records
If you use Dove’s telecom or interconnected VoIP services, federal law may require us to protect certain telecom-related customer records, including customer proprietary network information. Where CPNI rules apply, we may use or disclose that information only as permitted or required by law, including to provide the services, respond to emergencies, protect against fraud, authenticate account-related requests, market service offerings where permitted, and maintain, provision, port, bill, repair, or secure the network and services.
Where applicable, we may also use or disclose telecom-related records and related service information as permitted by law to provide, support, secure, bill, provision, maintain, and improve the services, to respond to emergencies, to prevent fraud, and to comply with legal obligations.
20. Children’s Privacy
Our websites and services are generally directed to businesses and adults, not to children under 13. We do not knowingly collect personal information online from children under 13 in a manner that would require parental notice and consent under the Children’s Online Privacy Protection Act, unless expressly disclosed for a specific service and handled in compliance with applicable law. We do not knowingly collect personal information online from children under 13 in a manner that would require parental consent under applicable children’s privacy laws.
If you believe a child under 13 has provided personal information to us inappropriately, please contact us so we can review and take appropriate action.
21. Third-Party Sites, Apps, and Platforms
Our websites, portals, mobile tools, cloud services, or customer solutions may link to or interoperate with third-party websites, applications, manufacturers, carriers, monitoring centers, or software platforms. Their privacy practices are governed by their own terms and policies, not this Privacy Policy.
We are not responsible for third-party privacy practices except as required by law.
22. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in:
• Our services;
• Our vendors or platforms;
• Legal, regulatory, or industry requirements;
• Security practices;
• Business operations.
When we update this Privacy Policy, we will post the revised version with a new effective date. If required by law, we will provide additional notice.
23. Contact Us
If you have questions about this Privacy Policy or want to submit a privacy request, please contact:
Dove Communications, Inc. California Contractor License #715876 Website: dovecommunications.com Email: service@dovecommunications.com
If you are submitting a privacy request, please include enough information for us to identify you and understand your request, such as your name, relationship to Dove, state of residence, and the nature of your request.
24. Supplemental Notes for Customers Using Dove Services
For customers using Dove’s business services, the following additional principles apply:
• This Privacy Policy is a public-facing notice and does not expand Dove’s contractual obligations;
• Customers remain responsible for configuring services appropriately for their own environments and legal obligations;
• Service-specific agreements may include additional rules for telecom, SMS, monitoring, recordings, AI, MSP, cloud, and cybersecurity services;
• If Dove processes data on a customer’s behalf, the customer may need to provide the operative privacy notice to its workforce, users, callers, visitors, and premises occupants.
