Legal
Follix is built for freelancers and agencies who trust us with follow-up context and commercial data. This page summarizes how we approach security; it is not an exhaustive audit report.
Data in transit is protected using HTTPS (TLS). Our application infrastructure is operated on reputable cloud providers with industry-standard physical and network controls.
Access to Follix requires a valid user account. Passwords are handled using established practices (hashed storage; we do not store plaintext passwords). Session tokens are used to keep you signed in securely.
Lead and account data you enter is stored in managed databases with access restricted to operational needs. We minimize data collection to what is required to run the follow-up workflow you configure.
Payment card data is processed by our payment processor; we do not store full card numbers on Follix servers.
Security is shared: use a strong unique password, protect your devices, and revoke access when team members leave. Report suspected unauthorized access promptly via Contact Support.
If you believe you have found a security vulnerability in Follix, please email security@follix.io with enough detail to reproduce the issue. We appreciate responsible disclosure.
For how we collect and use personal data, see our Privacy Policy.