Information Security at Flow
Flow has implemented sound internal policies structured per the following guiding principles: (i) Flow strives to protect the confidentiality, integrity, and availability of its information assets and those of its customers/clients and users; (ii) Flow will comply with applicable privacy and data protection laws; (iii) Flow will balance the need for business efficiency with the need to protect sensitive, proprietary, or other confidential information from undue risk; (iv) Flow will grant access to sensitive, proprietary, or other confidential information only to those with a need to know and at the least level of privilege necessary to perform their assigned functions; and (v) Recognizing that an astute workforce is the best line of defense, Flow will provide security training opportunities and expert resources to help individuals understand and meet their information security obligations.
Flow securely manage your data to protect the interests of your organization and the privacy of your stakeholders and are SOC-2 compliant.
Click here to view our Privacy Policy.