Breach Notification
How we notify you about security incidents, timelines, and what to expect.
Breach Notification Policy
Effective Date: December 10, 2025
Last Updated: December 10, 2025
Version: 1.0
Introduction
This Breach Notification Policy describes how ManageN8N handles security incidents that may affect your data, including how and when we will notify you. We are committed to transparency and prompt communication in the event of a security breach.
Definitions
| Term | Definition |
|---|---|
| Security Incident | Any event that may compromise the security of our systems or your data |
| Data Breach | Unauthorized access to, disclosure of, or loss of personal data |
| Personal Data | Information that identifies or could identify an individual |
| Affected Users | Users whose data was or may have been compromised |
Our Commitment
- Act Quickly - Contain the breach and begin investigation immediately
- Be Transparent - Provide honest and complete information
- Notify Promptly - Contact affected users within required timeframes
- Assist Recovery - Help you take steps to protect yourself
- Learn and Improve - Implement measures to prevent future incidents
Notification Timeline
Confirmed Data Breach
| Stakeholder | Timeline | Method |
|---|---|---|
| Regulatory authorities (GDPR) | Within 72 hours | Official channels |
| Affected users | Without undue delay, max 30 days | |
| All users (significant breach) | Within 72 hours | Email + status page |
Security Incident (No Data Breach)
| Stakeholder | Timeline | Method |
|---|---|---|
| Affected users | As appropriate | |
| All users | Not required | Status page if service affected |
Delay Exceptions
Notification may be delayed if requested by law enforcement, if it would compromise ongoing security efforts, or if the law requires delayed notification. We will notify you as soon as the exception no longer applies.
What We Will Tell You
Initial Notification
When we notify you of a breach, we will include:
- What Happened
- Nature of the incident
- When it occurred
- When we discovered it
- What Data Was Affected
- Types of data involved
- Whether your data was specifically affected (if known)
- What We're Doing
- Steps taken to contain the breach
- Investigation status
- Measures to prevent recurrence
- What You Should Do
- Recommended protective actions
- How to check for suspicious activity
- Resources available to you
- How to Get Help
- Contact information
- FAQ or additional resources
Follow-Up Communications
We will provide updates when investigation reveals new information, when we implement additional protections, at resolution of the incident, and if recommendations change.
Notification Methods
Primary: Email
- Sent to your registered email address
- Subject line clearly indicates security notification
- Plain language, no marketing content
- Links to detailed information on our website
Secondary Methods
| Method | When Used |
|---|---|
| In-app notification | For active users |
| Status page | For service-affecting incidents |
| Website banner | For major incidents |
| Phone call | For high-impact enterprise customers |
| Postal mail | If email bounces, as required by law |
Ensuring You Receive Notifications
- Keep your email address current
- Add security@managen8n.com to your contacts
- Check spam/junk folders
- Enable in-app notifications
Data Types and Risk Levels
High Risk Data
Breach of this data triggers immediate notification:
- Passwords (even hashed)
- Payment card information
- TOTP secrets or backup codes
- API keys or access tokens
Medium Risk Data
Breach requires notification within 72 hours:
- Email addresses
- Names and profile information
- Instance configurations
- Audit logs with user activity
Lower Risk Data
Breach assessed case-by-case:
- Aggregated analytics
- Public template metadata
- System logs without PII
Your Responsibilities
After Receiving Notification
- Change Your Password
- On ManageN8N
- On any other service where you used the same password
- Enable/Verify 2FA
- Ensure two-factor authentication is enabled
- Generate new backup codes if recommended
- Review Account Activity
- Check recent login history
- Review any suspicious changes
- Monitor for Suspicious Activity
- Watch for phishing attempts
- Check other accounts for unauthorized access
- Rotate API Keys
- If API keys may have been exposed
- Update any integrations using those keys
Reporting Suspicious Activity
If you notice suspicious activity:
Email: security@managen8n.com
Subject: Suspicious Activity Report
Include: Your account email, description of activity, timestamps
Regulatory Compliance
GDPR (EU/EEA)
- Notification to supervisory authority within 72 hours
- Notification to affected users without undue delay
- Documentation of breach and response
CCPA (California)
- Notification of unauthorized access to unencrypted personal information
- Notification method as prescribed by California Civil Code
Other Jurisdictions
We comply with breach notification requirements in all jurisdictions where we operate, including UK (UK GDPR), Canada (PIPEDA), Australia (Notifiable Data Breaches scheme), and other applicable state/national laws.
What We Do Internally
Incident Response Process
- Detection
- Monitoring systems alert on anomalies
- User reports investigated promptly
- Containment
- Immediate steps to stop ongoing breach
- Preserve evidence for investigation
- Assessment
- Determine scope and impact
- Identify affected data and users
- Assess risk level
- Notification
- Prepare notification content
- Send to affected parties
- File regulatory notices if required
- Remediation
- Fix vulnerabilities
- Implement additional controls
- Update affected credentials
- Review
- Post-incident analysis
- Lessons learned
- Process improvements
Documentation
We document all breaches and security incidents, investigation findings, notification records, remediation actions, and post-incident reviews. Records retained for 5 years minimum.
Third-Party Breaches
Our Third-Party Providers
If a breach affects our service providers: we will notify you if your data was affected, provide information as we receive it, and may not be able to share all details immediately.
Your Third-Party Integrations
If a breach affects services you've connected to your n8n workflows: this is outside our visibility; monitor notifications from those services; we can assist with disconnecting compromised integrations.
Preventing Breaches
What We Do
- Encryption of sensitive data
- Regular security assessments
- Employee security training
- Monitoring and alerting
- Incident response planning
What You Can Do
- Use strong, unique passwords
- Enable two-factor authentication
- Keep your email address current
- Report suspicious activity promptly
- Follow security best practices
Contact
Security Incidents: security@managen8n.com
Privacy Inquiries: privacy@managen8n.com
General Support: support@managen8n.com
Related Policies
Revision History
| Version | Date | Changes |
|---|---|---|
| 1.0 | December 10, 2025 | Initial policy |