Policies

Overview of internal security and compliance policies underlying our program.

Policy Framework

Future AGI maintains a comprehensive set of internal security and compliance policies that form the foundation of our information security program. These policies are aligned with the requirements of SOC 2 Type II, ISO 27001, and industry best practices.

Internal Policies

The following policies govern how we protect customer data, manage risk, and operate securely:

PolicyPurpose
Acceptable UseDefines permitted and prohibited use of company systems and resources
Asset ManagementGoverns identification, classification, and lifecycle management of information assets
BackupEstablishes backup frequency, retention, encryption, and restoration testing requirements
Business ContinuityEnsures critical business functions can continue during and after a disruption
Change ManagementControls how changes to production systems are proposed, reviewed, approved, and deployed
Code of ConductSets expectations for professional behavior, ethics, and integrity
Data ClassificationDefines sensitivity levels and handling requirements for different categories of data
Data ProtectionGoverns the collection, processing, storage, and disposal of personal and customer data
Data RetentionSpecifies retention periods and secure deletion procedures for all data types
Disaster RecoveryDocuments recovery procedures, RPO/RTO targets, and failover architecture
EncryptionMandates encryption standards for data in transit and at rest
Incident ResponseDefines procedures for detecting, responding to, and recovering from security incidents
Information SecurityEstablishes the overarching information security program, roles, and responsibilities
PasswordSets requirements for password complexity, rotation, and secure storage
Physical SecurityAddresses physical access controls for office locations and any on-premises equipment
Responsible DisclosureProvides a channel for external researchers to report security vulnerabilities
Risk AssessmentDefines the methodology for identifying, evaluating, and treating information security risks
Secure Development Lifecycle (SDLC)Integrates security into every phase of software development
System Access ControlGoverns provisioning, review, and revocation of access to systems and data
Vendor ManagementEstablishes security requirements for evaluating and managing third-party vendors
Vulnerability ManagementDefines processes for identifying, triaging, and remediating vulnerabilities

Governance

  • All policies are reviewed and approved annually by the security team and executive leadership
  • Policy updates are tracked through version control with documented change history
  • Employees acknowledge and attest to applicable policies during onboarding and annually thereafter
  • Policy compliance is verified through internal audits and continuous monitoring

Availability

Copies of individual policies are available to customers and prospective customers on request under a non-disclosure agreement (NDA). Contact sales@futureagi.com for access.

Questions?

Reach out to our security team.

security@futureagi.com

Request documents

SOC 2 report, DPA, pen test summary.

Request documents →