Security at Flowt
Last updated: 1 April 2026
Our Commitment
Security is a first-class concern at Flowt. We follow industry best practices to protect your data, your candidates’ information, and your OAuth credentials at every layer of the stack.
Data Encryption
orgId or userId to enforce strict organisational data isolation.Authentication & Access
gmail.send, userinfo.email, and userinfo.profile. Microsoft integration requests only Mail.Send, User.Read, and offline_access. We never request permission to read your inbox.Infrastructure
Organisational Data Isolation
Flowt is a multi-tenant application. All data — candidates, templates, campaigns, email connections — is isolated at the database level by orgId. Cross-tenant access is architecturally impossible; every query includes an org-level filter and ownership is validated server-side before any read or write.
Incident Response
In the event of a security incident, we will notify affected users via email within 72 hours of discovery, consistent with GDPR requirements. We maintain an incident response plan and conduct regular security reviews.
Responsible Disclosure
If you discover a security vulnerability in Flowt, please disclose it responsibly by emailing security@useflowt.com. Please do not publicly disclose the vulnerability until we have had a reasonable opportunity to address it. We aim to acknowledge all reports within 48 hours.
Third-Party Processors
We work with the following sub-processors, each under a Data Processing Agreement:
| Provider | Purpose | Data Shared |
|---|---|---|
| Supabase | Auth + Database | All user & org data |
| Vercel | Hosting | Request logs (no PII) |
| OpenAI | AI features | Job descriptions, anonymised candidate data |
| Resend | Transactional email | Email address, name |
| OAuth + Gmail send | OAuth tokens, email metadata | |
| Microsoft | OAuth + Outlook send | OAuth tokens, email metadata |