This overview describes key data-processing principles for organizations using Sheriff Flow. Where needed, Sheriff Flow may execute a separate contractual data-processing addendum.
Data is processed to provide sheriff matching, service-area mapping, workflow coordination, account security, customer support, and operational analytics.
Sheriff Flow applies technical and organizational security measures, limits access by role, and requires confidentiality obligations for personnel and relevant providers.
Sheriff Flow may use subprocessors for hosting, monitoring, communications, payments, and related support operations. Subprocessors are engaged under contractual controls and legal compliance obligations.
Where cross-border processing is required, Sheriff Flow applies appropriate safeguards in line with applicable law and contractual obligations.
Sheriff Flow maintains incident-response procedures and will notify affected customers of qualifying security incidents in line with applicable law and contractual commitments.
Sheriff Flow provides reasonable assistance to support lawful data subject rights requests and compliance activities, subject to verification, scope, and legal constraints.