Critical Infrastructure Ethics & Data Stewardship
Our commitment to authorization-only operations, data confidentiality, and regulatory compliance—because integrity isn't negotiable when working with critical infrastructure.
Effective Date: October 25, 2026
Our Core Values
Competence
Professional expertise you can trust
Consistency
Reliable standards, every project
Character
Integrity in all operations
Compassion
Respect for your mission-critical assets
1. Authorization-Only Operations
We fly and collect imagery at critical infrastructure (CI) sites only with prior written authorization from the facility owner/operator or their designated agent.
What this means: No speculative flights, no "drive-by" inspections, no unsolicited demonstrations. Your authorization comes first—always.
2. No Public CI Imagery or Metadata
We do not publish critical infrastructure photos, video, thermal imagery, flight logs, coordinates, or other metadata without explicit written consent. All deliverables are private to the owner/operator.
- No social media posts featuring your facilities
- No case studies without written approval
- No GPS coordinates in public-facing materials
- No equipment details that reveal facility configuration
Marketing Examples: Public examples used for marketing are simulated, de-identified, or created from our own controlled equipment—never from client facilities without explicit written consent.
3. Texas Government Code §423 Alignment
Texas law protects critical infrastructure from unauthorized imaging. We align our operations with Texas Government Code Chapter 423 requirements:
- §423.001 Definition: "Image" includes thermal and infrared data—not just visible-light photography.
- §423.003–.004 Compliance: We never capture or display CI imagery without owner consent. If we learn any image was captured or posted without authorization, we immediately cease use and delete it per statutory defenses.
- §423.0045 Operations: All operations over critical infrastructure (substations, transmission lines, solar farms, etc.) occur only under owner authorization and in full compliance with FAA Part 107 rules.
4. FAA Compliance
All operations are conducted under 14 CFR Part 107 (small UAS regulations) with full compliance to:
- Remote Identification (Remote ID) broadcast requirements
- Airspace authorization procedures (LAANC where applicable)
- Visual line-of-sight (VLOS) operations
- Daylight and weather minimums
- Certificate and registration currency
5. Data Handling & Retention
Storage & Security
- U.S.-based only: No offshore storage or processing
- Encrypted at rest and in transit: Industry-standard encryption protocols
- Access control: Least-privilege, project-only access
- Protected backups: Aged out on retention schedule
Retention & Sharing
- Default retention: 90 days after delivery
- Flexible: Longer/shorter retention upon request
- Destruction supported: Delete on owner request
- No third-party sharing without written authorization
Your data is your data. We treat every thermal image, GPS coordinate, and flight log as confidential client property—protected with the same standards you'd expect from your IT security team.
6. Reporting & Industry Alignment
Our deliverables follow industry-standard maintenance reporting formats and reflect utility sensitivity to facility information:
- NFPA 70B-style reporting: Ambient conditions, load context, ΔT-based severity classification, annotated radiometric images
- NERC CIP-014 awareness: Physical security posture considerations for transmission and generation facilities
- NERC CIP-011 alignment: Information protection standards for BES Cyber System Information (BCSI) and related operational data
We speak your language: Reports designed for utility compliance teams who understand why facility details matter and why data protection isn't optional.
7. Platform Transparency
Our aircraft support radiometric thermal capture suitable for maintenance diagnostics. We utilize enterprise-grade hardware to ensure secure data collection without compromising operational integrity.
8. Takedown & Incident Response
Takedown Protocol
If you have concerns about any imagery or data that may have been captured or published:
- Contact us immediately via our contact form
- We prioritize immediate removal
- Full investigation and response within 24 hours
Incident Response
If any nonconforming capture or disclosure is suspected:
- Immediate data quarantine
- Owner contact notification
- Deletion upon instruction or per §423 defenses
- Root cause analysis and corrective action
Your concerns are our priority. We respond immediately, transparently, and comprehensively to any data stewardship issue.
Integrity You Can Trust
These aren't just policies—they're promises. When you authorize Aerial Accuracy to inspect your critical infrastructure, you're partnering with a team that values competence, consistency, character, and compassion. Your facility's security, your data's confidentiality, and your trust are never taken for granted.
Contact: Submit contact form | Aerial Accuracy LLC | West Texas
This policy aligns with Texas Government Code §423, FAA Part 107 regulations, NERC CIP standards, and industry best practices for critical infrastructure data stewardship.
