Legal
Security Measures
Effective date: 14 May 2026 · Last updated: 14 May 2026
This page describes AgentHeaven's baseline technical and organisational measures ("TOMs") for protecting customer data, session logs, credentials, and customer-specific memory/wiki content.
Scope: These measures apply to AgentHeaven-controlled systems, including VPS-hosted agents, custom logs, local file memory/vector stores, and self-hosted model deployments. Third-party providers listed on the Sub-processors page maintain their own security controls.
1. Hosting and Network Security
- Agents are hosted on VPS infrastructure controlled by AgentHeaven, currently using Hostinger and/or DigitalOcean.
- Production access is restricted to authorised operators on a need-to-know basis.
- Administrative access should use strong credentials, SSH keys where applicable, and provider-side account protection.
- Services are configured to expose only the ports and endpoints required for operation.
- Infrastructure regions are selected with EU/EEA hosting preferred for sensitive workloads where available.
2. Data Minimisation
- Source documents are processed transiently during agent sessions and are not stored by default.
- Session and activity logs are limited to what is needed for reliability, auditability, debugging, security, and support.
- Customer-specific memory/wiki content is kept only for the customer's own agent and is not reused across customers.
- Local vector/memory files are treated as customer data because they may encode business context or personal data.
3. Customer Isolation
- Customer configuration, credentials, logs, memory/wiki, and local vector data are logically separated per customer.
- Agents are configured to use only customer-authorised tools and sources.
- Agent outputs and memory are not used to improve another customer's agent or a shared training dataset.
4. Encryption
- In transit: Connections to the website, agent endpoints, third-party LLM providers, and connected tools use TLS.
- At rest: OAuth tokens, API keys, agent mailbox credentials, customer-specific memory/wiki, and operational data persisted on AgentHeaven-controlled VPS infrastructure are stored encrypted at rest, either through full-disk encryption on the underlying volume or through application-level encryption of the credential record, depending on the data category.
- Encryption keys are managed by AgentHeaven and are not shared with other customers.
5. Credentials and Tool Access
- Connected-tool access is limited to the permissions needed for the configured role.
- OAuth tokens, API keys, and agent mailbox credentials are treated as confidential operational secrets and are stored encrypted at rest as described in §4.
- Credentials are revoked or deleted on cancellation where technically possible and no longer needed.
- Customers remain responsible for source-system account hygiene, permission scopes, and revocation inside their own tools.
6. LLM Routing Controls
- Customers may use self-hosted open-source model routing where available, so prompts are processed on AgentHeaven-controlled infrastructure rather than sent to a third-party LLM provider.
- Where OpenAI or Anthropic routing is selected or needed, only the context required for the task should be sent.
- AgentHeaven does not authorise third-party LLM providers to use customer prompts, session context, or customer memory/wiki to train their models.
7. Logging and Monitoring
- AgentHeaven uses custom logs to record session identifiers, timestamps, tool calls, routing decisions, system events, errors, and security-relevant activity.
- Logs are used for support, reliability, security investigation, auditability, and dispute resolution.
- Logs are retained according to the Privacy Policy and may be retained longer for incident investigation or legal claims.
8. Personnel and Access
- Access to customer data is restricted to personnel who need it to deliver, support, secure, or troubleshoot the Service.
- Personnel with access to customer data are bound by confidentiality obligations.
- Operational access should be reviewed periodically and removed when no longer needed.
9. Incident Response
- Suspected incidents are triaged to determine affected systems, customers, data categories, severity, and containment steps.
- AgentHeaven may suspend an agent, revoke tool access, or disable routing if needed to contain abuse or a security incident.
- Customers will be notified without undue delay where an incident affects their personal data or operational data and notification is required by law or contract.
10. Deletion and Exit
- On cancellation, the agent is deactivated and customer credentials are revoked or deleted where technically possible.
- Customer memory/wiki and operational data are deleted after the post-cancellation retention/export window stated in the Privacy Policy, unless longer retention is required by law or agreed in writing.
- Source documents remain in the customer's connected systems unless a separate document-storage integration was explicitly agreed.
11. Customer Responsibilities
Security is shared. Customers are responsible for choosing appropriate connected tools, limiting permissions, keeping source data lawful and accurate, reviewing agent outputs, reporting suspicious behaviour promptly, and disabling access in their own systems when no longer needed.
12. Security Contact and Vulnerability Disclosure
Report suspected vulnerabilities, security incidents, or unsafe agent behaviour to info@agentheaven.ai with the subject line "Security". Please include reproduction steps, affected components, and any evidence available. We will acknowledge receipt promptly and coordinate remediation. We do not currently offer a paid bug-bounty programme, but we appreciate responsible disclosure and will credit researchers in our remediation notes on request.