Security & Data Protection Policy

Last updated: April 2026

Overview

At Magentic AI, security is not a feature we add after deployment — it is a design constraint we enforce from the first discovery call. Every client engagement begins with an explicit security scoping exercise that defines data handling protocols, compliance requirements, access boundaries, and infrastructure architecture before a single line of code is written or a single workflow is deployed.

This document outlines how Magentic AI approaches security across all service lines: Custom AI Automation, Enterprise Platform Development, AI Voice Automation, AI Content Creation, AI Corporate Training, and AI Staffing Services.

1. Pre-Engagement Security Scoping

Before any engagement begins, Magentic conducts a structured Security & Compliance Discovery session with the client's designated stakeholders. This session produces a written Security Scope Document that becomes a binding annex to the Master Service Agreement.

The Security Scope Document defines:

No deployment proceeds without a signed Security Scope Document. This is non-negotiable across all service lines.

2. Data Sovereignty & Model Isolation

Your data never trains public models.

This is the foundational commitment of every Magentic engagement. Specifically:

3. Compliance Frameworks

Magentic AI designs engagements to be compliant with applicable regulatory frameworks. The following standards are scoped, implemented, and verified in partnership with certified, accredited third parties where formal certification is required.

SOC 2 Type II

SOC 2 Type II compliance is available for enterprise engagements that require it. Where SOC 2 is scoped, Magentic works with accredited third-party auditors to ensure that the infrastructure, access controls, and operational procedures supporting the deployment meet the Trust Services Criteria covering Security, Availability, Processing Integrity, Confidentiality, and Privacy. Clients requiring SOC 2 attestation will receive documentation from the auditing body as part of the engagement deliverables.

HIPAA

For healthcare and adjacent engagements involving Protected Health Information (PHI), Magentic designs all systems to HIPAA-compliant architecture standards. This includes end-to-end encryption of PHI in transit and at rest, strict access control and audit logging, Business Associate Agreements (BAAs) executed with all relevant subprocessors, and deployment within HIPAA-eligible infrastructure environments. HIPAA compliance is verified in partnership with certified healthcare IT compliance consultants who review architecture and sign off prior to go-live.

GDPR

For engagements involving personal data of EU residents, Magentic operates as a Data Processor under GDPR. Data Processing Agreements (DPAs) are executed at engagement start. All data processing activities are documented, lawful bases are established, and data subject rights (access, portability, erasure) are supported within the system architecture. Cross-border data transfers comply with applicable transfer mechanisms including Standard Contractual Clauses where required.

CCPA

For engagements involving California residents' personal data, Magentic implements the technical and contractual controls required under the California Consumer Privacy Act, including data subject request handling, opt-out mechanisms where applicable, and service provider agreements that restrict secondary use of personal information.

PCI-DSS

For voice automation or platform engagements that involve payment card data or payment processing workflows, Magentic scopes and implements PCI-DSS compliant architecture. This includes tokenization of card data, scoped network segmentation, and where necessary, engagement of a Qualified Security Assessor (QSA) to validate compliance.

TCPA

For outbound voice automation engagements, all dialing logic, consent management, and call recording workflows are designed in compliance with the Telephone Consumer Protection Act. Consent records are captured, stored, and auditable.

Important Clarification on Certifications: Formal certifications (SOC 2 Type II reports, HIPAA attestations, PCI QSA assessments) are scope-dependent. They require engagement with certified, independently accredited third-party bodies and are activated as part of the engagement design process when the client's regulatory obligations require them. Magentic does not self-certify compliance — we design to the standard and engage the appropriate accredited parties to validate it.

4. Infrastructure Security Standards

Regardless of deployment model, all Magentic-deployed systems meet the following baseline infrastructure security standards:

Encryption

Access Controls

Network Security

Logging & Audit Trails

Uptime & Reliability

5. Human-in-the-Loop Controls

Magentic does not deploy fully autonomous AI into high-stakes decision workflows without explicit client authorization and appropriate human review checkpoints.

During the Security Scoping phase, workflows are classified by risk level:

These classifications are documented in the workflow design specification and enforced in the system architecture, not merely recommended in training materials.

6. Vendor & Subprocessor Management

Magentic maintains a controlled list of approved subprocessors (third-party AI providers, cloud infrastructure vendors, and tooling platforms) used in client engagements. For each subprocessor:

Clients may request the list of subprocessors applicable to their engagement at any time. Where a client's compliance requirements restrict the use of specific subprocessors or geographies, this is documented and enforced in the Security Scope.

7. Security in AI Staffing Engagements

For AI Staffing engagements, where Magentic sources, vets, and places AI-native professionals into client teams, the following security practices apply:

8. Security in AI Training Engagements

For AI Corporate Training engagements, security education is integrated into the curriculum:

9. Incident Response

In the event of a security incident affecting a client's deployed systems:

Notification timelines are adjusted to meet regulatory requirements where applicable (for example, GDPR's 72-hour supervisory authority notification requirement).

10. Client Responsibilities

Security is a shared responsibility. Magentic fulfills its obligations as outlined in this document. Clients are responsible for:

Contact

For security inquiries, compliance documentation requests, or to discuss the security requirements of a prospective engagement, contact:

hello@gomagentic.com

This document reflects Magentic AI's standard security approach as of April 2026. Security scope for individual engagements is governed by the Security Scope Document executed as part of each Master Service Agreement. In the event of conflict between this document and a signed engagement agreement, the engagement agreement governs.