Your organization usually determines the reporting purpose and governance model
In most deployments, the customer remains the controller for reports collected through its configured channel.
Privacy, legal, and procurement teams can use this page to understand how Whispr is typically positioned in a DPA discussion, what the review normally covers, and where the signed document remains authoritative.
In most deployments, the customer remains the controller for reports collected through its configured channel.
The DPA conversation should cover roles, subprocessors, security measures, deletion expectations, and operational support boundaries.
Security, subprocessors, retention, privacy, and signed commercial documents should all be reviewed together.
For standard Whispr deployments, the customer organization generally determines the purpose of the channel, the users who can access it, and the internal policy for handling reports. BackPR generally acts as a processor or service provider for the hosted platform functions.
A useful DPA review normally covers the categories of personal data handled in the product, the processing purpose tied to the service, the current processor stack, security measures, support boundaries, and offboarding expectations.
The current stack uses Cloudflare for hosted infrastructure and Resend for transactional email, with Stripe relevant only when billing features are used. The DPA packet should reflect that live stack rather than older references.
If your organization needs a DPA, the appropriate path is to request it directly during commercial or privacy review. That ensures the document version, deployment facts, and any negotiated language are all aligned with the actual deal.
Whispr does not promise fixed turnaround times, universal negotiation rights, or country-specific transfer mechanics on this page. Those terms belong in the actual DPA and the related commercial paperwork.