RightFlow Trust Center

RightFlow Security

RightFlow handles highly sensitive employment data. Our security model prioritizes encryption, isolation, and traceability across the full document workflow.

Security model

The product is designed to keep trust signals readable: protected storage, tenant-scoped access, and traceability when something needs to be reviewed.

Data handling

Encrypted at rest and in transit

Isolation

Tenant-scoped backend checks

Response

Expedited security review path

Encryption and storage

Documents are encrypted in transit and at rest. Storage access is restricted by environment, service account, and tenant-scoped controls.

Access control

Authenticated access is enforced for workspace actions, and tenant isolation is verified on the backend before documents or reports are returned.

Monitoring and auditability

Requests carry correlation identifiers so operational and security events can be traced across frontend, backend, and document-processing services.

Security contact

If you believe you have discovered a security issue, contact security@right-flow.com. We review security reports on an expedited basis.