Mues AI, operated by ProducterHQ OÜ, is committed to maintaining the highest standards of security and data protection for our agentic AI platform. This Security Policy outlines our comprehensive approach to protecting customer data, securing our infrastructure, and ensuring compliance with applicable regulations while delivering innovative AI-powered services that enable users to delegate tasks through natural language interaction.
Company: ProducterHQ OÜ
Registration Number: 16539847
Jurisdiction: Republic of Estonia
Address: Tiiu tn 12/322, Kesklinna linnaosa, 10135 Tallinn, Harju maakond, Estonia
Website: https://mues.ai/
Security at Mues AI is directed and maintained by our founding team, ensuring accountability at the highest organizational level. All team members undergo comprehensive security training during onboarding and participate in quarterly security awareness updates.
We maintain compliance with:
• General Data Protection Regulation (GDPR)
• Estonian Personal Data Protection Act
• Estonian Cybersecurity Act
• SOC 2 Type II (planned certification)
• ISO 27001 (planned certification)
• Primary Cloud Provider: Amazon Web Services (AWS Lightsail)
• Data Center Locations: European Union regions exclusively
• Primary Regions: eu-west-3 (Paris), eu-central-1 (Frankfurt)
• Compliance: AWS maintains SOC 2/3, ISO 27001, and GDPR compliance
Our infrastructure benefits from AWS's enterprise-grade physical security measures:
• Access Control: Multi-layered biometric and card-based access systems
• Monitoring: 24/7 security personnel and surveillance
• Environmental Controls: Climate control, fire suppression, and power redundancy
• Compliance: AWS facilities maintain ISO 27001 and SOC 2 certifications
• Architecture: Zero-trust network model with micro-segmentation
• Encryption: All network traffic encrypted using TLS 1.3
• Firewalls: Web Application Firewall (WAF) and Network Access Control Lists
• Monitoring: Real-time network traffic analysis and intrusion detection
We classify data into four categories:
• Public: Marketing materials, public documentation
• Internal: Business operations, non-sensitive communications
• Confidential: Customer data, conversation logs, usage analytics
• Restricted: Authentication credentials, encryption keys, financial data
Data at Rest:
• AES256 encryption for all stored data
• Database-level encryption with automated key management
• Object storage encryption using server-side encryption
• Regular encryption key rotation (quarterly)
Data in Transit:
• TLS 1.3 for all external communications
• Certificate pinning for mobile applications
• Perfect Forward Secrecy (PFS) implementation
• Rejection of connections using TLS below 1.2
Databases:
• Managed database services with automated backups
• Point-in-time recovery capabilities
• Database activity monitoring and logging
Object Storage:
• Secure object storage with versioning enabled
• Cross-region replication for disaster recovery
• Lifecycle policies for automated data management
• Access logging and monitoring
We utilize multiple AI service providers with appropriate security controls:
OpenAI:
• Enterprise-grade API access with dedicated capacity
• Data processing agreements compliant with GDPR
• Zero data retention for API calls
• Content filtering and safety measures
Anthropic:
• Constitutional AI with built-in safety measures
• Enterprise privacy controls
• Real-time content moderation
• Secure API integration
Google Gemini:
• Google Cloud AI with enterprise security
• Data residency controls within EU
• Advanced threat protection
• Compliance with Google's AI principles
Input Validation:
• Comprehensive input sanitization and validation
• Protection against prompt injection attacks
• Content filtering for malicious inputs
• Rate limiting and abuse detection
Output Monitoring:
• Real-time output analysis for harmful content
• Automated content filtering and moderation
• Human oversight for sensitive operations
• Audit trails for all AI interactions
Model Security:
• Secure model deployment and versioning
• Protection against model extraction attacks
• Regular security assessments of AI components
• Isolation of AI processing environments
Multi-Factor Authentication:
• Mandatory for all user accounts
• Support for TOTP, SMS, and hardware tokens
• Biometric authentication for mobile applications
• Session management with automatic timeout
Single Sign-On (SSO):
• OAuth 2.0 integration with Google and GitHub
• SAML 2.0 support for enterprise customers
• Just-in-time (JIT) user provisioning
• Centralized access management
Principle of Least Privilege:
• Role-based access control (RBAC)
• Time-limited administrative access
• Regular access reviews and certification
• Automated deprovisioning for terminated employees
Privileged Access Management:
• Secure bastion hosts for infrastructure access
• Session recording and monitoring
• Break-glass procedures for emergency access
• Multi-person authorization for critical operations
Development Practices:
• Secure coding standards and guidelines
• Static Application Security Testing (SAST)
• Dynamic Application Security Testing (DAST)
• Dependency scanning and vulnerability management
Environment Separation:
• Isolated development, staging, and production environments
• Data masking in non-production environments
• Separate encryption keys per environment
• Controlled promotion processes
Script Integration:
• Secure JavaScript SDK with Content Security Policy (CSP)
• Subresource Integrity (SRI) for script validation
• Cross-Origin Resource Sharing (CORS) controls
• Regular security updates and patching
API Security:
• OAuth 2.0 with PKCE for API authentication
• Rate limiting and throttling
• Input validation and output encoding
• API gateway with security policies
Real-Time Monitoring:
• Security Information and Event Management (SIEM)
• Automated threat detection and alerting
• User behavior analytics (UBA)
• Infrastructure monitoring and alerting
Logging and Auditing:
• Comprehensive audit logs for all system activities
• Centralized log management and analysis
• Log integrity protection and retention
• Regular log review and analysis
Response Team:
• Dedicated incident response team
• 24/7 security operations center (SOC)
• Escalation procedures and communication plans
• Regular incident response training and drills
Response Procedures:
• Incident classification and prioritization
• Containment and eradication procedures
• Recovery and post-incident analysis
• Regulatory notification requirements
Infrastructure Redundancy:
• Multi-Availability Zone deployment
• Auto-scaling and load balancing
• Database clustering and replication
• Content delivery network (CDN) integration
Service Continuity:
• 99.9% uptime service level agreement
• Automated failover procedures
• Regular maintenance windows with advance notice
• Performance monitoring and optimization
Backup Strategy:
• Automated daily backups with retention policies
• Cross-region backup replication
• Point-in-time recovery capabilities
• Regular backup testing and validation
Disaster Recovery:
• Recovery Time Objective (RTO): 4 hours
• Recovery Point Objective (RPO): 1 hour
• Documented recovery procedures
• Annual disaster recovery testing
Due Diligence:
• Security assessments for all vendors
• Contractual security requirements
• Regular vendor security reviews
• Incident notification procedures
Key Vendors:
• Stripe: PCI DSS compliant payment processing
• AWS: SOC 2/3 and ISO 27001 certified infrastructure
• AI Providers: Enterprise-grade security and privacy controls
All third-party processors are bound by:
• GDPR-compliant data processing agreements
• Standard contractual clauses for international transfers
• Security and confidentiality obligations
• Incident notification requirements
Regulatory Compliance:
• GDPR compliance with documented procedures
• Estonian data protection law compliance
• EU-US Data Privacy Framework participation
• Regular compliance audits and assessments
Planned Certifications:
• SOC 2 Type II: Q4 2025
• ISO 27001: Q2 2026
• ISO 27017: Q4 2026 (Cloud Security)
• ISO 27018: Q4 2026 (Cloud Privacy)
Security Awareness:
• Mandatory security training for all employees
• Quarterly security updates and refreshers
• Phishing simulation and testing
• Incident response training
Role-Specific Training:
• Secure development training for engineers
• Privacy training for customer-facing staff
• Compliance training for management
• AI ethics and safety training
Security Best Practices:
• Security documentation and guidelines
• Best practices for AI agent usage
• Regular security webinars and updates
• Incident notification and response guidance
Security Team:
• Email: security@mues.ai
• Response Time: 24 hours for security inquiries
• Emergency: security-emergency@mues.ai
Vulnerability Disclosure:
• Responsible disclosure program
• Email: security@mues.ai
• Acknowledgment within 24 hours
• Regular updates on remediation progress
This Security Policy is reviewed annually and updated as necessary to reflect changes in our security posture, regulatory requirements, and industry best practices. Users will be notified of material changes through email and in-app notifications.
Next Review Date: July 2026
This Security Policy demonstrates Mues AI's commitment to protecting customer data and maintaining the highest security standards while delivering innovative agentic AI services. For questions about this policy or our security practices, please contact security@mues.ai.
Software Interaction Company
to create a world where software adapts to humans, not humans to software.