Flow - data protection & trust analysis

Flow

Flow

About

Go from discussion to done creating Flow tasks in Slack.

Analysis Summary

🔬   Our analysis indicates that Flow is protecting users' data with a good infrastructure security in place, and their community seems healthy; however, some privacy policy aspects could be improved or clarified.

✅   Our security analysis didn't find any cloud or infrastructure risks, which means that Flow should be safe to use and relatively protected against cyber-attacks and data breaches caused by hackers.

✅   Our community analysis shows that this app has a decent following. A strong community is an indication for product maturity and usually implies increased attention to security and data protection.

Integrations

Note: This is an AI-powered analysis, please don't rely on this only and consult an expert for any 3rd-party security / privacy questions.

How scores are calculated? Learn more

Developer of this app?
Report mistake or send request

Data Safety Score 9.0/ 10

PRIVACY privacy score tooltip
Estimated restriction level from intentional data sharing, selling, and monetization.
good
SECURITY security score tooltip
Estimated protection level against unintentional data breach, lose, and exposure.
no issues found
COMMUNITY trust score tooltip
Estimated trust and sentiment of existing users and general community.
high
Note: This is an AI-powered analysis, please don't rely on this only and consult an expert for any 3rd-party security / privacy questions.

How scores are calculated? Learn more

Developer of this app?
Report mistake or send request
Flow

Data Safety Score 9.0/ 10

Privacy Policy

Privacy Policy

SCORE 7.8/ 10

Privacy Policy

Limited data sharing

To what extent does Flow restrain from aggregating personal information and using it for monetization, such as sharing data with ad networks or selling data to 3rd-parties.

Security measures

The measures Flow is taking to secure your data (based on their privacy policy). Such measures include personal information obfuscation, cyber-security, encryption, and protection by design.

Transparency & control

The data controls provided by Flow, like asking for consent, an option to opt-out from data collection, the right to be forgotten, and information like data retention, and notifying you in case of a breach.



Note: This analysis was generated by an automated semi-supervised AI. We do our best to improve it and validate its accuracy, but we can't guarantee it.

You can find the analyzed privacy-policy here:

https://getflow.com/privacy

PRIVACY SCORE 7.8/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Cloud Security

Cloud Security

SCORE 10.0/ 10

Cloud Security

Data in transit

Encryption

Data storage

Emails

Data in transit

high risk
mid. risk
low risk

Encryption

high risk
mid. risk
low risk

Data storage

high risk
mid. risk
low risk

Emails

high risk
mid. risk
low risk

We have analyzed 4 public endpoints related to this app and found 0 security risks in total.

Cloud and infrastructure security is an essential factor in determining your data is safe with an app or integration. Generally, modern web apps and integrations should not have any critical security issues.

SECURITY SCORE 10.0/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Community Trust

Community Trust

SCORE 10.0/ 10

Community Trust

Twitter
high
high


We've analyzed 0 marketplace engagement signals, and 4.1K social network signals.

User engagement signals in the app marketplaces and social networks indicate user-base satisfaction and community health, which helps us determine whether the app is legit and trustworthy.

Note: The actual engagement numbers might be higher as some marketplaces do not share the number of installs, reviews, and rankings.

COMMUNITY SCORE 10.0/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Permission Analysis

Permission Analysis

PRO VERSION
Regulatory Compliance

Regulatory Compliance

PRO VERSION
Known Data Breaches

Known Data Breaches

PRO VERSION
Startup or Developer?

Seamlessly verify your privacy & security, showcase data protection, and boost user trust & adoption.

Create Free Account

Please note, that we only rank certain ranking subjects including encryption, data storage, data sharing, security measures being taken, transparency and users’ control, number of installs, reviews, followers, etc. Thus, ranking results may change as additional ranking subjects are added, or existing ranking subjects are omitted.

General Disclaimer: Given that the service is based on a statistical heuristics, you may find the ranking inaccurate, unfavorable, unhelpful, not compatible with your requirements, or objectionable. Protective.ai, and its officers, directors, employees and affiliates (“Staff”), disclaim any and all liability for any matter relating to the ranking subjects’ opinions and recommendations, including their accuracy, or their failure to properly disclose a position in, affiliation with, or nexus they may have to the respective apps they analyze or report on.