Whispr processes organizational, user, and reporting data to operate the service
The exact personal data involved depends on the configuration of the reporting flow and the organization’s own policies.
For privacy, legal, and procurement teams, this page lays out the privacy model around Whispr in plain terms: what data the service may hold, why it is processed, who can access it, and how the controller-processor split normally works.
The exact personal data involved depends on the configuration of the reporting flow and the organization’s own policies.
Privacy, legal, and procurement teams can use this as a shared starting point for review.
Privacy review works best when the role model, processor list, and retention approach are reviewed together.
Whispr uses customer data to deliver intake, case handling, authentication, notifications, audit logging, and customer support. The customer organization remains responsible for choosing how the workflow is configured and used internally.
Customer-side visibility depends on the configured role and scope model. BackPR personnel access customer data only when needed for service support, maintenance, security investigation, or legal obligations, subject to internal controls and contractual limits.
The current product stack uses Cloudflare for core infrastructure, Resend for transactional email, and Stripe only where billing functionality is relevant. See the dedicated subprocessor page for the current provider list.
Whispr does not publish fixed post-termination timing or universal automatic deletion windows on this page. See the retention page for the current control model and confirm final requirements through legal review and contract.
In most deployments, the customer organization is the first point of contact for data-rights requests relating to its reporting channel. Processor-side assistance is handled under the DPA and the operational support process.