Whispr is designed to keep intake, follow-up, and handling inside a controlled system
Access is limited by role and scope, reporter follow-up uses a dedicated mailbox model, and audit activity is recorded in the product.
Whispr is built to keep reporting, follow-up, and case handling inside a controlled environment. Buyers, privacy teams, and IT reviewers can use this page to see the controls in the product, the hosted stack, and the areas that remain contract-dependent.
Access is limited by role and scope, reporter follow-up uses a dedicated mailbox model, and audit activity is recorded in the product.
The platform includes role-aware access, audit events, case routing, legal hold enforcement, and separation between reporter-visible and handler-only activity.
Security is only one part of the decision. Teams should also confirm roles, retention rules, and operating responsibilities.
In compliance mode, the product creates a dedicated reporter mailbox token and return code for secure follow-up. Internal notes, assignment actions, and administrative audit history stay separate from the reporter-facing thread.
Whispr uses role-aware permission checks in the admin application. Disabled users are blocked, team roles are normalized, and access can be limited by assignment or organizational scope depending on the product mode.
Whispr is deployed on managed cloud services that provide encrypted transport and platform-level storage protections. If you need deeper assurance details, request the security packet during procurement or technical review.
The compliance backend defines audit events for case creation, acknowledgment, assignment, replies, note creation, file activity, exports, legal hold changes, retention changes, and closure. Export and close actions are blocked when an active legal hold is present.
To keep trust materials defensible, this page does not make unsupported promises about session inactivity windows, backup cadence, uptime SLAs, certification scope, or procurement turnaround times. Those items should appear only in signed agreements or technical review materials when they are actually available.