Security & privacy
How we handle your data.
We’re a small team building a CRM for other small teams. You shouldn’t have to take our word for anything on this page — every claim below maps to something you can verify in the product, in the DPA, or by asking us directly.
Encryption at rest
Every contact field is encrypted at rest with AES-256-GCM. Each tenant has its own encryption key. A workspace’s data cannot be decrypted using another workspace’s key — not by us, not by an attacker who manages to read the database.
The keys are managed in a key-management service, not stored next to the data. If you cancel, your tenant key can be retired and the remaining ciphertext becomes unreadable.
Tenant isolation
Multi-tenant row-level isolation is enforced in the database, not in application code. Every query is scoped to your tenant ID at the Postgres layer. Cross-tenant reads are not a feature flag — they’re a database-level impossibility.
Audit logging
Every mutation is logged with the actor, the affected record, the previous and new values, and the timestamp. Workspace admins can export the full audit trail at any time. Logs are append-only.
Authentication
Platform admins authenticate with WebAuthn / passkeys — no shared passwords, no SMS-based 2FA. Workspace users sign in with email plus passkey or password; password accounts use Argon2id with per-user salts.
AI scope
Nexus, our AI assistant, has 60+ tools bound to your workspace schema. It cannot see other tenants. It cannot make outbound calls to external services on your behalf without an explicit, scoped integration. Prompts and outputs are processed via our model provider; payload content is not used to train third-party models.
Legal & compliance
GDPR-compliant. We have a Data Processing Addendum your legal contact can pull right now — read the DPA.
Right-to-be-forgotten requests are handled in-product: an admin can delete a contact and the audit log records the deletion. Data subject access requests are handled via [email protected].
See also: our Privacy Policy, Terms of Service, and list of subprocessors.
What we don’t have yet
We are not SOC 2 Type II or ISO 27001 certified.
Those certifications are on our roadmap, but we don’t imply we have them. If your procurement team requires either today, FlowGrid is not the right fit for you yet, and we won’t pretend otherwise.
We do not pursue HIPAA or BAA. FlowGrid is not built for healthcare workflows; if your use case requires PHI handling, we’re the wrong tool.
If you’re evaluating us anyway, the most useful things we can give you are: the DPA above, this page, a direct line to the team, and read access to the live product so your security reviewer can poke at it.
Got a question this page didn’t answer?
Email us. A real person on the team will reply — not a ticket queue.
[email protected]