Overview
Registered Agentics LLC ("Registered Agentics," "we," "us," or "our") operates registeredagentics.com and provides Wyoming LLC formation, registered agent services, and dedicated AI hardware infrastructure. This Privacy Policy describes how we collect, use, store, and protect information about you ("Client," "you," or "your") when you use our website or services.
We take a minimal-data philosophy. We collect only what is necessary to provide our services, protect your data with hardware-grade encryption at every layer, and never sell your personal or business information to third parties.
This policy applies to all service tiers: Developer, B2B, and Enterprise. Additional data processing terms for Enterprise clients may be set out in your individual service agreement or Data Processing Agreement (DPA).
Information We Collect
2.1 Information You Provide Directly
When you create an account, sign up, or engage with our services, we collect:
2.2 Information Collected Automatically
When you visit our website, we may automatically collect:
2.3 Client Workspace Data (B2B & Enterprise)
Data generated by or stored within your dedicated Mac Mini environment — including AI agent memory, agent outputs, API credentials entered via OpenClawd, task queues, workspace files, and logs — is your data. We treat it as Client Confidential and subject to the strict isolation and access controls described in Sections 4 and 7.
2.4 Information from Third Parties
We may receive limited information from third-party services you connect to your account (e.g., Stripe for payment confirmation, Wyoming Secretary of State for LLC status verification). We do not purchase data from data brokers.
How We Use Your Information
We use your information solely for the following purposes:
- —Forming and maintaining your Wyoming LLC with the Secretary of State;
- —Fulfilling our duties as your registered agent (accepting service of process, forwarding correspondence);
- —Provisioning, configuring, and maintaining your dedicated hardware environment (B2B/Enterprise);
- —Processing billing and subscription management through Stripe;
- —Communicating with you about your account, service updates, legal notices, and compliance reminders;
- —Providing customer support and responding to your inquiries;
- —Detecting and preventing fraud, abuse, and security incidents;
- —Complying with legal obligations, including valid court orders, subpoenas, or governmental requests;
- —Improving our services (using aggregated, anonymized data only — never individual client workspace data).
We do not sell, rent, or trade your personal information to any third party for marketing or advertising purposes. Period.
Client Data Isolation
4.1 One Machine, One Client
The foundational data protection guarantee of our B2B and Enterprise tiers is physical hardware isolation: each client operates on a dedicated Mac Mini with a dedicated encrypted external hard drive. No hardware, operating system, container runtime, network segment, or storage volume is shared between clients.
This is our core isolation guarantee. It is a contractual commitment and an architectural constraint — not merely a configuration setting that could be inadvertently overridden.
4.2 Data Containment Boundaries
Your client data lives within two encrypted volumes on your dedicated machine:
4.3 Network Isolation
Each machine is connected to the internet through a dedicated network segment. Docker containers running your AI agent are isolated in their own bridge network and cannot communicate with other clients' machines or containers. Administrative access to machines is exclusively through Tailscale VPN (WireGuard), never exposed to the public internet.
4.4 Agent Memory & IP
Your AI agent's memory store, task outputs, and generated content constitute your intellectual property (see Terms of Service, Section 7). These assets are contained within your encrypted workspace and are never read by, transmitted to, or accessible by other clients or by Registered Agentics personnel except as described in Section 7 of this policy.
Encryption & Security
5.1 Encryption at Rest
5.2 Encryption in Transit
5.3 Access Controls
Access to client machines follows a strict tiered model:
5.4 Credential Security
Encryption keys and credentials are stored in a team password manager with role-based access. No secrets are committed to version control or stored in plaintext in publicly-accessible locations. Operator SSH keys are rotated annually or immediately upon staff changes. Your API keys (entered into OpenClawd) are stored within your machine's encrypted environment and are never transmitted to or stored by Registered Agentics.
Third-Party Services
We use a limited set of third-party services to operate our business. Each is listed below with the data shared and the purpose:
We do not use advertising networks, social media trackers, or behavioral analytics platforms that share data with third parties for targeting purposes.
Your AI agent may connect to third-party AI APIs (Anthropic, OpenAI, Google, etc.) using API keys you provide. Those connections are made directly from your machine under your API key. Registered Agentics does not intermediate, log, or have access to the content of those API calls.
Operator Access to Client Data
Registered Agentics personnel do not access your workspace data (files, agent memory, outputs, or container contents) as a matter of routine operations. Operator access is strictly limited to the following circumstances:
- —Emergency hardware recovery: hardware failure, disk error, or data recovery at your explicit request;
- —Legal requirement: a valid court order, subpoena, or legally mandated government request. We will notify you of any such request to the extent permitted by law;
- —Billing verification: confirming service is operational at the infrastructure level (uptime checks do not involve reading workspace data).
Any operator access to your machine workspace will be logged with timestamp, operator ID, and reason. You will be notified within one (1) business day of any such access, unless prohibited by law.
Data Retention & Deletion
8.1 During Active Subscription
We retain your account information, LLC formation records, and billing history for the duration of your subscription plus seven (7) years, as required for business and tax record-keeping purposes. Client workspace data on your dedicated machine is retained for the duration of the active subscription.
8.2 Upon Cancellation or Termination
When your subscription ends, we follow this data lifecycle process:
- 1.Stop all AI agent processes on your machine.
- 2.Create a final encrypted backup snapshot of your entire workspace.
- 3.Provide a secure download link or offer to ship an encrypted drive to your address.
- 4.Upon your confirmation of receipt — or after 30 days (whichever comes first) — securely erase the internal SSD using macOS Secure Erase, reformat the external HDD with a new encryption key and erase all data, and delete all Restic backup repositories from offsite storage.
- 5.Purge your SSH keys and machine credentials from our password manager.
- 6.Provide written confirmation of deletion upon request.
8.3 Account Data Retention
Account-level data (name, email, LLC formation records, billing history, legal correspondence) is retained for 7 years from the date of last service, consistent with Wyoming business record-keeping requirements. You may request deletion of personal account data not subject to legal hold by contacting us at privacy@registeredagentics.com.
8.4 Machine Reassignment
Before any Mac Mini is reassigned to a new client, we perform a full DFU macOS restore from scratch, re-run all provisioning scripts, generate new machine SSH host keys, and verify clean state. No data from a previous client will remain on a reassigned machine.
Breach Notification
In the event of a confirmed security incident that results in unauthorized access to, disclosure of, or destruction of your personal data or client workspace data, Registered Agentics will:
- —Notify you within 72 hours of confirming the breach, via the email address on your account;
- —Provide details of: what data was affected, the approximate timeline of the incident, and what remediation steps have been or will be taken;
- —Immediately isolate the affected machine from the Tailscale network and block all external access;
- —Preserve a forensic disk image before any remediation, where possible;
- —Rotate all credentials that the affected machine had access to;
- —Not reuse the affected machine until it has been fully re-imaged and re-provisioned.
We will also comply with any applicable state breach notification laws, including the Wyoming Consumer Protection Act and, where triggered, the California Consumer Privacy Act. If you believe your data may have been compromised, contact us immediately at privacy@registeredagentics.com.
California Residents (CCPA / CPRA)
If you are a California resident, the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA), grants you the following rights with respect to your personal information:
Right to Know
You may request disclosure of the categories and specific pieces of personal information we have collected about you, the sources, our business purpose for collecting it, and the categories of third parties with whom it is shared.
Right to Delete
You may request deletion of personal information we hold about you, subject to certain exceptions (e.g., where retention is required to complete a transaction, comply with law, or detect security incidents).
Right to Correct
You may request correction of inaccurate personal information.
Right to Opt-Out of Sale/Sharing
We do not sell or share your personal information for cross-context behavioral advertising. No opt-out mechanism is required, but you may contact us to confirm this.
Right to Limit Use of Sensitive Personal Information
We collect certain sensitive business information for LLC formation. This data is used only for service provision and is not used for profiling or advertising.
Right to Non-Discrimination
We will not discriminate against you for exercising your CCPA rights.
To exercise any of these rights, submit a verifiable consumer request to privacy@registeredagentics.com. We will respond within 45 days of a verified request.
EU / UK Residents (GDPR & UK GDPR)
If you are located in the European Economic Area (EEA) or the United Kingdom, the General Data Protection Regulation (GDPR) or UK GDPR may apply to the processing of your personal data.
11.1 Legal Basis for Processing
11.2 Your GDPR Rights
You have the right to: access your personal data; correct inaccurate data; request erasure (where no legal basis exists to retain it); restrict or object to processing; data portability; and to lodge a complaint with your local supervisory authority.
11.3 International Transfers
Our infrastructure is based in the United States (Wyoming). If you are in the EEA or UK, your data will be transferred to and processed in the US. We implement appropriate safeguards for such transfers in accordance with applicable data protection law. Enterprise clients may request a Data Processing Agreement (DPA) by contacting us at privacy@registeredagentics.com.
Children's Privacy
Our services are not directed to individuals under the age of 18. We do not knowingly collect personal information from children. If you believe we have inadvertently collected information from a minor, please contact us at privacy@registeredagentics.com and we will delete it promptly.
Changes to This Policy
We may update this Privacy Policy from time to time. When we make material changes, we will notify active clients by email at least 30 days before the changes take effect and update the effective date at the top of this page. Non-material changes (e.g., typo fixes, clarifications that do not affect your rights) may be made without notice.
We encourage you to review this policy periodically. Your continued use of our services after the effective date of a revised policy constitutes your acceptance of the changes.
Contact & Privacy Requests
For any privacy-related questions, data access requests, correction requests, or deletion requests, contact our privacy team:
We respond to all verifiable privacy requests within 30 days. For CCPA requests, the response window is 45 days (extendable once with notice). For GDPR requests, the response window is one calendar month (extendable by two months for complex requests, with notice).