Trust Center

Security & Compliance

Built for teams that need clear answers before deploying autonomous AI workflows in production.

Last updated: February 26, 2026

What data is sent to AI providers?

Prompts, conversation context, and attached files required to execute your task.

Who receives that data?

Selected third-party providers such as Anthropic, OpenAI, Google (Gemini), and Brave Search when features require them.

Is data sold or used for your own model training?

No. Computer Agents does not sell customer data and does not use customer prompts/content to train its own models.

How is workload execution isolated?

Each agent runs in an isolated cloud container with scoped access boundaries and operational limits.

Data sharing overview

Data categoryShared withPurposeWhen
Prompt + thread contextSelected AI model providerGenerate responses and execute tasksWhen you run agent tasks
Attached files/imagesSelected AI model providerFile-aware analysis and generationWhen attached to task execution
Search queriesSearch providers (for web skills)Retrieve current web informationWhen search/research skills are used
Billing metadataPayment processor(s)Subscription and invoicing operationsWhen billing events occur

Security controls

  • TLS encryption in transit and encryption at rest
  • API key authentication and scoped resource access
  • Containerized execution isolation per environment
  • Audit and operational logging for investigation
  • Budget and rate controls to prevent runaway usage
  • Documented data deletion and retention workflows

Retention & deletion

Thread content and workspace files persist until deleted by the user or account owner. Operational and audit logs are retained for defined periods for security and reliability analysis.

Account deletion workflows are documented publicly and include deletion of user data from primary systems with backup purging on retention schedules.

Read data deletion policy

Incident response

Security events are monitored continuously. On confirmed incidents affecting customer data, response includes containment, investigation, remediation, and user communication as required by applicable law.

Report a security issue

Compliance documentation

For legal and procurement reviews, use the documents below.