DeepSeek AGI Security Policy

Last Updated: [26/Apr/2025]

1. Commitment to Security “ (“DeepSeek AGI,” “we,” “us,” or “our”) is committed to protecting the security and integrity of our systems and the data entrusted to us by users of our website [https://deepseekagi.org/] and associated Services. We implement and maintain reasonable administrative, technical, and physical security measures designed to protect personal information from unauthorized access, use, disclosure, alteration, or destruction.  

2. Data Protection Measures We employ a variety of security technologies and procedures to help protect your information, including:

  • Encryption: We use industry-standard encryption protocols (such as TLS/SSL) to protect data transmitted between your browser and our servers. Sensitive data stored at rest is also encrypted where appropriate. Given our base in China, encryption methods may align with applicable local regulations like the Commercial Encryption Regulations where required.   
  • Access Control: Access to personal information and sensitive systems is restricted based on the principle of least privilege. Only authorized personnel with a legitimate business need are granted access, often requiring multi-factor authentication (MFA).   
  • Network Security: We utilize firewalls, intrusion detection/prevention systems, and other network security measures to protect against unauthorized access and attacks. We employ practices like DDoS mitigation and potentially Web Application Firewalls (WAFs).   
  • Secure Development Practices: Our software development lifecycle incorporates security principles, including regular code reviews and vulnerability scanning, referencing standards like OWASP Top Ten.   
  • Data Minimization: We strive to collect and retain only the personal information necessary for the purposes outlined in our Privacy Policy.   
  • Regular Audits and Monitoring: We conduct regular security assessments, vulnerability scans, and monitor our systems for suspicious activity.   

3. Secure Payment Processing (If Applicable) If we offer paid services requiring payment information, we utilize third-party payment processors that comply with Payment Card Industry Data Security Standard (PCI-DSS) requirements. We do not directly store your full credit card numbers on our servers.   

4. Data Breach Notification Procedures In the event of a data breach involving personal information, we have procedures in place to assess the incident, mitigate harm, and notify affected individuals and relevant regulatory authorities as required by applicable law (e.g., PIPL, GDPR, CCPA). Notification timelines and content will adhere to specific legal requirements (e.g., GDPR’s 72-hour notification to authorities where feasible).   

5. User Security Responsibilities Your security is also crucial. You agree to:

  • Protect Your Credentials: Keep your account password confidential and secure. Do not share your password with others. Use strong, unique passwords.   
  • Enable Multi-Factor Authentication (MFA): Utilize MFA if offered for your account for an added layer of security.   
  • Secure Your Devices: Ensure the devices you use to access our Services have up-to-date operating systems, browsers, and security software.
  • Report Suspicious Activity: Notify us immediately at “ if you suspect any unauthorized access to or use of your account or any other security breach.
  • Use Services Responsibly: Adhere to the Acceptable Use guidelines outlined in our Terms of Use.

6. Staff Training and Awareness Our employees and contractors with access to sensitive data receive training on data protection principles, security protocols, and their responsibilities in safeguarding information.   

7. Vendor Management We require third-party vendors who handle personal information on our behalf to maintain appropriate security measures and comply with relevant data protection laws and contractual obligations.   

8. Policy Updates We may update this Security Policy periodically. We will post any changes on this page and update the “Last Updated” date.

9. Contact Us If you have questions about our security practices, please contact `info@deepseekagi.org`.

Jitendra Kumar Kumawat

Jitendra Kumar Kumawat

Full Stack Developer | AI Researcher | Prompt Engineer

View Profile

AI Prompt Engineer

Transform your ideas into perfect prompts

🚀 Welcome to AI Prompt Engineer!

I'll help you create highly effective prompts for any AI model.

How it works: Just describe what you want to achieve in simple terms, and I'll craft a detailed, optimized prompt for your chosen AI.

Try something like: "write a marketing email" or "analyze data trends"