Skip to content

Security & Trust

Last updated: 2026-05-07

We’re building Agenteam5 with security baked in from day one. This page lists exactly what we do today — not aspirational, not future state.

What we have today

Encryption

Authentication & authorisation

Operational controls

Data minimisation

Sub-processors

The full list of sub-processors lives in the Privacy Policy. Each is named, scoped, and linked to their privacy notice.

Compliance roadmap

Agenteam5 is currently a small product. We are not yet certified against SOC 2, ISO 27001, or HIPAA. We follow the spirit of those frameworks (least privilege, encryption, vendor due diligence, incident response) and will pursue formal certification as customer demand justifies the audit cost. If a SOC 2 report is a hard requirement for your use of Agenteam5, please contact us — we can share our security questionnaire and discuss timelines.

We comply with GDPR (EU/EEA), UK GDPR, and CCPA/CPRA (California). Data Processing Addenda are available on request.

Responsible disclosure

Found a vulnerability? Please report it to security@agenteam5.com (or hello@agenteam5.comif the security alias isn’t set up yet) before disclosing publicly. Include a clear repro and the version/commit you tested. We will:

We do not currently run a paid bug bounty program. We will not take legal action against good-faith researchers who follow this policy and avoid harming users or data.

Incident response

If a security incident affects your data we will notify you by email without undue delay, in line with GDPR (within 72 hours of becoming aware of a personal data breach where required) and applicable breach-notification laws. Our notification will describe what happened, what data was affected, what we’re doing about it, and what you can do.

Status

Live system status, planned maintenance, and incident history will be available at status.agenteam5.com once published.