Hardware-Centric Privacy Commitment

Updated: August 20, 2025

1. Total Control Over Your Data

3hom applies the same privacy-first principles from our hardware wallets to data handling. We collect only what is strictly necessary, allowing you to maintain full control of your personal information.

Information We Collect:

Information We Never Access:

2. Minimizing Data for Maximum Security

Our security philosophy prioritizes collecting the least data required rather than monitoring extensively, ensuring your privacy is safeguarded by design.

Data Handling Practices:

Protection Measures:

Trusted Partners:

3. Purpose-Limited Data Usage

All collected data serves clear and specific functions aimed at enhancing your experience with 3hom devices.

Operational Uses:

Security Uses:

Development Uses:

4. Controlled Data Sharing

Data is only shared with essential partners required to provide services, with strict transparency and oversight.

Service Partners:

Transparency Commitment:

5. Enterprise-Level Security Measures

Data security follows the same rigorous standards applied to our hardware products.

Encryption:

Access Control:

Physical Security:

6. Privacy-First Analytics

Analytics are implemented with privacy in mind to improve services without compromising user confidentiality.

Responsible Tracking:

Privacy Features:

User Control:

7. Purposeful Data Retention

Retention policies balance operational needs with your privacy rights.

Retention Periods:

Secure Deletion:

User Rights:

Privacy & Security Office

Headquarters:
3hom Security Vault
120 Berkeley Dr, Hamilton, OH 45013

Privacy Assistance:
Identity verification is required for all privacy-related requests to protect your information