Technical & Organizational Measures

GDPR Article 32 technical and organizational measures implemented by Future AGI.

Overview

In accordance with Article 32 of the GDPR, Future AGI implements appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing. These measures are reviewed at least annually and updated to reflect changes in the threat landscape and regulatory requirements.

1. Confidentiality

Physical Access Control

  • All infrastructure is hosted in AWS data centers that are SOC 2 Type II, ISO 27001, and SOC 1 certified
  • AWS data centers employ multi-layered physical security including biometric access, 24/7 security staff, video surveillance, and mantrap entry systems
  • Future AGI does not operate its own data centers or on-premises infrastructure

Logical Access Control

  • Access to production systems requires VPN connectivity with multi-factor authentication
  • All server access is authenticated via SSH key-based authentication; password-based access is disabled
  • The principle of least privilege is enforced across all systems — personnel are granted only the minimum access required for their role
  • All access events are logged and monitored

Authorization

  • Role-Based Access Control (RBAC) is implemented across the platform for both internal personnel and customer organizations
  • Access permissions are reviewed on a quarterly basis by engineering and security leadership
  • Privileged access requires management approval and is subject to additional monitoring
  • Service accounts use scoped credentials with automatic rotation

Separation Control

  • Logical tenant isolation ensures that customer data is segregated at the application and database levels
  • Each customer’s data is stored in logically separated database schemas with enforced access boundaries
  • Cross-tenant data access is architecturally prevented through application-layer controls and query-level filtering
  • Development, staging, and production environments are fully separated

2. Integrity

Transfer Control

  • All data in transit is encrypted using TLS 1.2 or higher
  • API requests are authenticated using scoped API keys with HMAC-based request signing
  • Internal service-to-service communication uses mutual TLS (mTLS)
  • Webhook deliveries support signature verification to ensure payload integrity

Input Control

  • Comprehensive audit logging captures all data modifications, access events, and administrative actions
  • Audit logs are immutable — once written, they cannot be modified or deleted
  • Logs are retained for a minimum of 12 months
  • Log integrity is verified through cryptographic checksums

3. Availability and Resilience

Availability Control

  • Infrastructure is deployed across multiple Availability Zones (Multi-AZ) for redundancy
  • Auto-scaling ensures that compute resources adjust dynamically to handle traffic spikes
  • The platform is architected for a 99.9% uptime SLA
  • Health checks and automated failover minimize downtime in the event of component failure

Recoverability

  • Daily backups of all critical data stores are performed automatically
  • Backups are retained for 30 days and stored in a separate AWS region from production data
  • Disaster recovery procedures are documented and tested through annual recovery exercises
  • Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are defined and monitored for each critical service

4. Regular Review

Data Protection Management

  • A Data Protection Officer (DPO) has been appointed and is responsible for overseeing compliance
  • Data protection policies and procedures are reviewed on an annual basis
  • Records of processing activities are maintained in accordance with GDPR Article 30

Incident Response Management

  • A documented Incident Response Plan (IRP) defines roles, responsibilities, escalation paths, and communication procedures
  • Annual tabletop exercises are conducted to test and refine the incident response process
  • Post-incident reviews are performed after every security event, with findings incorporated into process improvements

Data Protection by Design

  • Privacy Impact Assessments (PIAs) are conducted for all new features, integrations, and processing activities that involve personal data
  • Security and privacy requirements are incorporated into the software development lifecycle from the design phase
  • Code reviews include checks for data protection compliance

Sub-Processor Management

  • All sub-processors undergo security and privacy due diligence before engagement
  • Data Processing Agreements are executed with all sub-processors
  • Sub-processor security posture is reviewed periodically
  • A current list of sub-processors is maintained and published on the Subprocessors page

5. Organization and Staff

  • All employees and contractors are required to sign confidentiality agreements before accessing any systems or data
  • Security awareness training is provided to all personnel upon onboarding and refreshed annually
  • Training covers topics including phishing, social engineering, data handling, incident reporting, and secure development practices
  • Background checks are conducted for all employees in accordance with applicable law and proportionate to the sensitivity of the role
  • Access to customer data is limited to personnel with a documented business need

Questions?

Reach out to our security team.

security@futureagi.com

Request documents

SOC 2 report, DPA, pen test summary.

Request documents →