Flinque Trust Center

Trust, transparency, and security in one place

Everything security, privacy, compliance, and trust teams need to evaluate Flinque as a vendor. Documentation, certifications, sub-processors, and real-time status in one central hub.

99.9%
Uptime Commitment
AES-256
Encryption at Rest
72 Hours
Breach Notification
27
Published Policies

Security

How we protect the Flinque influencer marketing platform and your data.

Infrastructure Security

Defense in depth

Multi-zone hosting, encrypted data at rest and in transit, secure key management, and continuous monitoring across all systems.

Security Policy →

Access Controls

Role-based, least-privilege

MFA for all admin access, role-based access control, regular access reviews, and immediate revocation on role changes.

Security Policy →

Incident Response

72-hour notification

Documented incident response process, 72-hour breach notification to affected customers, and transparent post-incident reviews.

Incident Response →

Vulnerability Management

Continuous testing

Regular vulnerability scanning, penetration testing, and a responsible disclosure program for security researchers.

Disclosure Program →

Privacy and Data Protection

How we handle personal data and respect individual rights.

Core Policy

Privacy Policy

What we collect, why, and what we do with it.

Read →

Technical Details

Data Privacy Policy

Sub-processors, encryption, and detailed handling.

Read →

Retention

Data Retention

How long we keep data and when we delete it.

Read →

Deletion

Data Removal

How to exercise erasure and removal rights.

Read →

Cookies

Cookie Policy

Cookie types, purposes, and how to control them.

Read →

Minors

Children’s Privacy

COPPA-aligned protections and minor handling.

Read →

Regulatory Compliance

Frameworks we align with and enforce.

EU / EEA / UK

GDPR Compliance

Lawful bases, data subject rights, and transfer safeguards.

Read →

California

CCPA / CPRA

California resident rights and sale/share opt-outs.

Read →

AI Governance

AI Usage Policy

EU AI Act, GDPR Article 22, and responsible AI.

Read →

Accessibility

WCAG 2.1 AA

Accessibility conformance and ongoing commitments.

Read →

Email and SMS

Anti-Spam Policy

CAN-SPAM, CASL, and outreach compliance rules.

Read →

Copyright

DMCA Policy

Copyright takedown and counter-notice procedures.

Read →

Featured Document

Data Processing Agreement

Our GDPR Article 28 processor agreement, covering controller-processor responsibilities, sub-processor management, audit rights, international transfers, and breach notification. Automatically in force for all customers.

  • GDPR Article 28 compliant
  • Module 2 and Module 3 SCCs included
  • UK IDTA and Swiss Addendum supported
  • 30-day sub-processor notification
  • Audit rights for Enterprise
  • 72-hour breach notification SLA

Sub-processors and Vendor Management

Complete transparency on third parties that process data on our behalf.

Current sub-processors

Organized by 9 functional categories. Every vendor is vetted, contractually bound, and monitored.

View Full List →

Change notifications

Subscribe to receive 30-day advance notice of new sub-processors with objection rights for Enterprise customers.

Subscribe →

Service Reliability

Uptime commitments and real-time status.

SLA

99.9% Starter, 99.95% Enterprise

Published uptime targets with tiered service credits, incident response SLAs, and post-incident reviews for all P1 incidents.

View SLA →

Real-time Status

Status page

Live operational status, historical incidents, scheduled maintenance, and subscription options for status alerts.

View Status →

Ethical Commitments

Going beyond compliance to lead on creator and user welfare.

Industry First

Creator Bill of Rights

11 commitments to every creator whose data appears in our platform, including transparent scoring, opt-out rights, and no retaliation.

Read Bill of Rights →

Campaign Compliance

Influencer Disclosure Guidelines

FTC, UK ASA, and EU disclosure guidance for customers running compliant campaigns through Flinque.

View Guidelines →

Platform Rules

Acceptable Use Policy

Clear rules for how the platform should be used, with enforcement tiers and appeal rights.

View AUP →

Intellectual Property

IP Rights Policy

Ownership, licensing, and respect for third-party intellectual property across our platform.

View IP Policy →

Documentation for Security and Procurement Teams

Materials available on request for Enterprise evaluations.

Available Materials

  • Technical and Organizational Measures (TOMs) summary
  • SIG questionnaire response
  • CAIQ questionnaire response
  • Penetration test executive summary
  • Sub-processor due diligence summary
  • Transfer Impact Assessment (TIA) summary
  • Business continuity summary
  • Countersigned DPA
  • Security incident response plan overview

How to Request

Most materials are available under mutual NDA. Enterprise prospects can request a full security questionnaire response through our contact page.

Our Legal and Privacy team typically responds within 5 business days.

Request Documentation

Have questions?

Talk to our Legal and Privacy team

For security questionnaires, countersigned DPAs, custom SLA arrangements, audit requests, or any other trust-related matters, we are here to help. Enterprise prospects typically receive a response within 5 business days.

Flinque Legal and Privacy
Flinque
#8, Newbury Street
700 Boylston St
Boston, Massachusetts 02116
United States