ABOUT THE TEAM

MEET THE TEAM

1. Introduction

SEC.AGI (“we,” “our,” or “us”) is designed with privacy as a foundational principle. Our products are built to protect physical assets while minimizing data collection, external dependencies, and unnecessary exposure.
This Privacy Policy explains how information is handled when you use SEC.AGI hardware, software, and related services.

2. Core Privacy Principles

SEC.AGI operates on the following principles:

  • Data minimization: We collect only what is strictly necessary.

  • On-device intelligence: Core security decisions occur locally on the device.

  • No passive surveillance: SEC.AGI does not monitor users beyond its intended security function.

  • User control: You retain authority over your data and device behavior.


3. Information We Do Not Collect

SEC.AGI does not collect:

  • Continuous location data

  • Audio or video recordings

  • Personal files or contents of secured assets

  • Behavioral data unrelated to security events

  • Biometric data (unless explicitly enabled in future optional features)

The device does not stream raw data to external servers by default.

4. Information That May Be Processed

Depending on usage, SEC.AGI may process the following locally on the device:

  • Tamper or access attempt signals

  • Authentication attempts (e.g., PIN entry success or failure)

  • Device health and status indicators

  • Security event timestamps

This information is primarily used to enable core security functionality and is not shared externally unless explicitly required.

5. Mobile App & Companion Software

If you use a companion mobile application or interface:

  • The app may store encrypted device identifiers

  • Security alerts may be transmitted to your device

  • Limited diagnostic data may be used to improve reliability

All communication between SEC.AGI and companion software is encrypted.
We do not sell, rent, or trade user data.

6. Cloud & Network Usage

SEC.AGI is designed to function without constant cloud connectivity.
If optional cloud-based features are enabled in the future:

  • They will be clearly disclosed

  • They will require explicit user consent

  • They will follow strict encryption and access controls


7. Data Retention


  • Security event data is retained only as long as necessary for functionality.

  • Users may clear or reset device data at any time.

  • Certain irreversible security actions (e.g., cryptographic wipe) permanently destroy stored data by design.


8. Third-Party Services

SEC.AGI does not integrate third-party tracking, advertising, or analytics services.
Any future integrations will be optional and disclosed transparently.

9. Security Measures

We employ industry-standard security practices, including:

  • Hardware-level isolation

  • Encrypted storage and communication

  • Secure boot and firmware integrity checks

  • Tamper-resistant design

However, no system is entirely immune to risk, and users should use SEC.AGI as part of a broader security strategy.

10. Children’s Privacy

SEC.AGI products are not intended for use by children under the age of 13. We do not knowingly collect personal data from children.

11. Changes to This Policy

We may update this Privacy Policy as the product evolves. Any material changes will be communicated clearly through official channels.
Continued use of SEC.AGI after updates constitutes acceptance of the revised policy.

12. Contact

For privacy-related questions or concerns:
Email: privacy@sec.agi

Website: sec.agi

Pre-order Now

PRE-ORDER

A self-contained security intelligence that turns any object into a protected system — detecting tampering, assessing intent, and responding before access is compromised.

© SEC.AGI. All Rights Reserved 2026

Pre-order Now

PRE-ORDER

A self-contained security intelligence that turns any object into a protected system — detecting tampering, assessing intent, and responding before access is compromised.

© SEC.AGI. All Rights Reserved 2026

Pre-order Now

PRE-ORDER

A self-contained security intelligence that turns any object into a protected system — detecting tampering, assessing intent, and responding before access is compromised.

© SEC.AGI. All Rights Reserved 2026