Flinque Security Policy Protecting User Data and Access

Table of Contents

  1. Security Policy
  2. 1. Introduction
  3. 2. Scope of Security Measures
  4. 3. Data Collection and Storage Security
  5. 4. Encryption Controls
  6. 5. Access Control Practices
  7. 6. Account Security Responsibilities
  8. 7. Network and Infrastructure Protection
  9. 8. Data Minimization
  10. 9. Logging and Monitoring
  11. 10. Incident Response Procedure
  12. 11. Third Party Services
  13. 12. Exported Data Security
  14. 13. International Security Compliance
  15. 14. User Rights and Reporting Vulnerabilities
  16. 15. Data Removal and Protection Requests
  17. 16. Updates to This Security Policy
  18. 17. Contact Information

Security Policy

Effective Date: 8 December 2025

Contact Email: support@flinque.com

Registered Address: 6th Floor, Shahpuri Tirath Singh Tower, 609, C 58, near Janak Cinema Complex, Janakpuri, New Delhi, Delhi 110058 India

1. Introduction

This Security Policy explains how Flinque protects user data, maintains secure systems, applies industry standards, and prevents unauthorized access across all global regions where users operate including the United States, Canada, Australia, Spain and all countries within the European Union. Flinque is committed to safeguarding user data with strict administrative, technical and physical controls.

2. Scope of Security Measures

This policy applies to all users, systems, databases, internal tools, exported files, influencer data obtained from publicly available sources, subscription accounts and any processing activities linked to the Flinque platform.

3. Data Collection and Storage Security

All data stored on Flinque servers is protected through layered security controls. These include encryption at rest, encryption in transit, access restrictions based on least privilege, audit logging and continuous monitoring. Flinque stores only publicly available influencer information and internal user account information necessary to operate the service. Flinque does not store payment card information on its servers.

4. Encryption Controls

Flinque maintains encryption standards that include:

  • HTTPS secure communication for all pages
  • Transport Layer Security protocols for data transfers
  • Encrypted storage for sensitive account data
  • Hashing of user authentication credentials

5. Access Control Practices

Flinque restricts system and database access through authenticated role based access controls. Only authorized personnel with verified business needs are permitted access to backend systems. Access logs are maintained and reviewed to detect unauthorized attempts.

6. Account Security Responsibilities

Users are responsible for maintaining the confidentiality of their login credentials. Users must use strong passwords and avoid sharing accounts. If a user believes their account has been compromised they must notify Flinque immediately at support@flinque.com.

7. Network and Infrastructure Protection

Flinque implements multiple security layers including firewalls, intrusion detection tools, anti malware systems, vulnerability scanners and real time monitoring. Systems are routinely patched to reduce exposure to known threats.

8. Data Minimization

Flinque collects only publicly available influencer data and account details voluntarily provided by users. No sensitive personal information is collected unless provided directly for support or compliance purposes.

9. Logging and Monitoring

Flinque continuously monitors system behavior, traffic patterns and administrative actions. Suspicious activity triggers alerts for security review. Logs are retained for investigation and compliance.

10. Incident Response Procedure

In the event of a security incident, Flinque follows a standardized response plan that includes containment, investigation, risk evaluation, remediation and follow up communication with affected users if required under applicable laws including GDPR and regional privacy regulations.

11. Third Party Services

Flinque uses reputable third party tools for analytics, hosting and communication. These providers are vetted for industry standard security compliance. Flinque uses services such as Google Analytics, Google Tag Manager, Google Search Console, Meta Pixel, Microsoft Clarity and advertising pixels. These tools operate under their own security frameworks and privacy terms.

12. Exported Data Security

Users may export influencer lists through CSV files. Users bear responsibility for securing exported data stored on their own devices or shared systems.

13. International Security Compliance

Flinque maintains security controls consistent with major global standards including GDPR requirements, regional privacy directives, and industry best practices followed in the United States, Canada, Australia and Spain.

14. User Rights and Reporting Vulnerabilities

Any user or influencer may contact Flinque to report suspected vulnerabilities or request data removal. Flinque will review and address valid concerns within 48 hours. Requests can be sent to support@flinque.com.

15. Data Removal and Protection Requests

If any influencer or brand wishes to remove their information collected from publicly available sources they may contact Flinque and the requested data will be removed within 48 hours. Removal requests must include clear identification of the data to be deleted.

16. Updates to This Security Policy

Flinque may update this Security Policy to reflect new legal requirements, updated infrastructure or operational changes. Continued use of the platform signifies acceptance of any updated version. Users should review this page periodically.

17. Contact Information

For any questions regarding this Security Policy or concerns about security practices, users may contact Flinque at support@flinque.com.

Cart (0 items)

Create your account

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare