As a platform that is entrusted with persevering an organization’s knowledge, communication, and data — we are committed to protecting the integrity of our users’ data for unauthorized access.
Our internal security protocols are designed to ensure:
- Preventing any kind of unauthorized access;
- Supporting continuous monitoring for potential vulnerabilities; and
- Embracing a robust, ongoing, proactive mechanism to stay on top of the latest security tools and threats.
All user data including conversations, team names, threads, invites, requests, notes, uploaded files, account information, and payment information are sent using SSL/HTTPS secure channels with industry-standard encryption.
We use Amazon Web Services (AWS) servers and Wasabi Hot Cloud Storage to host all user data. We make extensive use of their built-in firewalls to protect your data against unauthorized remote access.
All user data are stored and encrypted at rest.
Both AWS and Wasabi data centers undergo annual certifications to ensure they meet the highest standards of physical and virtual security. You can find more information on security practices for AWS at https://aws.amazon.com/security/ and Wasabi at https://wasabi.com/security/.
Further, all data imported or included from third-party cloud storage services (such as Dropbox, Google Drive, and One Drive, etc.) remain on those companies’ servers and are covered by their respective security policies and practices. We are not responsible for any data breach or loss with files accessed/imported from Dropbox, Onedrive, and Google Drive, etc.
Report a Vulnerability
If there is something which is bothering you or if you think you might have found something vulnerable within Flujo, please get in touch with our security team right away at firstname.lastname@example.org. We will do our best to fix them on priority.
Account Access & Confidentiality
We verify account access through both email/password-based authentication.
At Flujo, we understand the importance of your business data and information. We have strict control over internal personnel's access to your data and information. We are committed to ensuring that your data and information is not accessible to anyone who is not authorized by our Customers. Due to the nature of software service, some of our developers may need to access your data for troubleshooting and performing diagnosis. These developers are under strict supervision and cannot access your data unless deemed necessary and authorized by our Customers.
Flujo Admin Controls
For Flujo workspaces, we provide four different user roles with different levels of access: Owner, admin, member, and guest. You can learn more about these roles in this article.
Workspace owners can manage billing information as well as change roles and permissions for admins and members.