Trust Center

Privacy, data handling, and access roles

For privacy, legal, and procurement teams, this page lays out the privacy model around Whispr in plain terms: what data the service may hold, why it is processed, who can access it, and how the controller-processor split normally works.

Data model

Whispr processes organizational, user, and reporting data to operate the service

The exact personal data involved depends on the configuration of the reporting flow and the organization’s own policies.

Review focus

A clearer view of data categories, access boundaries, and processor roles

Privacy, legal, and procurement teams can use this as a shared starting point for review.

Related pages

Use this with DPA, subprocessors, and retention

Privacy review works best when the role model, processor list, and retention approach are reviewed together.

Data categories

The product can hold organizational data, user data, and report content

  • Organization and tenant configuration data
  • User account and role information for administrative access
  • Report content, case activity, notes, and file metadata depending on the mode in use
  • Operational data needed for security, audit, authentication, and notifications
Purposes

Data is processed to run the reporting workflow and support the hosted service

Whispr uses customer data to deliver intake, case handling, authentication, notifications, audit logging, and customer support. The customer organization remains responsible for choosing how the workflow is configured and used internally.

Access

Access is limited to authorized customer users and controlled service operations

Customer-side visibility depends on the configured role and scope model. BackPR personnel access customer data only when needed for service support, maintenance, security investigation, or legal obligations, subject to internal controls and contractual limits.

Processors

Current processor visibility aligns with the trust-center list

The current product stack uses Cloudflare for core infrastructure, Resend for transactional email, and Stripe only where billing functionality is relevant. See the dedicated subprocessor page for the current provider list.

Retention context

Retention expectations depend on mode, configuration, and contract

Whispr does not publish fixed post-termination timing or universal automatic deletion windows on this page. See the retention page for the current control model and confirm final requirements through legal review and contract.

Rights and requests

Privacy questions and data-rights handling follow the controller model

In most deployments, the customer organization is the first point of contact for data-rights requests relating to its reporting channel. Processor-side assistance is handled under the DPA and the operational support process.