Data & Privacy

Your data is yours. Here's exactly where it lives, who can access it, and what happens when you leave.

Where your data lives

Every agent's data is physically and logically isolated from every other customer.

Dedicated encrypted server

Your agent runs on its own virtual private server. Data is never commingled with other customers.

AES-256 encryption at rest

Storage volumes use LUKS2 with AES-256-XTS. Encryption keys are stored separately from data.

Geographic choice

Agent infrastructure can be provisioned in multiple global regions. Contact us for specific region requirements.

Control plane separation

The control plane (billing, provisioning) runs separately from your agent. No shared database.

What we can and cannot see

We can see

Server health metrics (CPU, memory, disk usage)
Uptime and availability status
Resource consumption trends
Error rates and crash logs (no conversation content)
AI model usage and token counts

We cannot see

Your agent's conversations with contacts
Documents, files, or data your agent accesses
Tool execution outputs or browsing history
Content of emails sent or received by your agent
Your contacts' personal information

Data retention and deletion

When you cancel, everything is destroyed. No data is retained.

Server destruction

Your dedicated VPS is completely destroyed — not just stopped, but deleted from the provider.

DNS records removed

All DNS entries and tunnel configurations associated with your agent are deleted.

Encrypted data wiped

The encrypted storage volume is destroyed. With the encryption keys deleted, the data is permanently unrecoverable.

Database records cleaned

All tenant records, configuration, and metadata are purged from the control plane database.

Compliance posture

Data Processing Agreement

Our DPA covers data controller/processor responsibilities, sub-processor management, and data subject rights.

Read our DPA

Data minimization

We collect only what is necessary to operate the service. No analytics tracking on your agent's conversations.

Incident response

Documented incident response framework with 8 scenario runbooks, escalation procedures, and postmortem templates.

Regional availability

Agent infrastructure available in multiple regions including US, EU, and Asia-Pacific.

See also: Terms of Service | Privacy Policy | Data Processing Agreement

Ready to hire your first AI employee?

Production-ready in 5 minutes. All 7 security layers included on every plan.