Trust starts with being clear.
This page explains how BeeSensible processes data, where it runs, and what we put in writing. For signed agreements, email trust@beesensible.eu.
Read next
Architecture & data flow
How the extension, EU-hosted services, and your browser work together.
Privacy
Roles, agreements, and what operational data may exist for admins.
Security
Encryption, access, logging, and how to request a security overview.
Compliance & vendors
Sub-processors, contracts, and how to reach us. No third-party certification marketing here.
How the product behaves
Application and API run on EU infrastructure (Scaleway). The detection model runs on separate EU infrastructure (Hetzner).
Message content is processed in memory for detection and not kept as message content; not used for model training.
Reporting is at organisation or team level, not person-level; the product enforces a minimum group size for stats.
Intended for security and leak prevention, not for performance or disciplinary monitoring of staff.
Logging is designed so request bodies and user-typed text are not written to application logs.
Request the DPA, product DPIA, and customer DPIA template from trust@beesensible.eu.
Procurement, privacy, or security
Email trust@beesensible.eu for the DPA, product DPIA, subprocessor list, privacy questions, and security questions. For general enquiries you can also use the contact page. We reply as soon as we can in Dutch or English.