Architecture overview
Every patient message flows through a defined path. Every step is encrypted in transit, every store is encrypted at rest, every credential is held in a secrets vault — never in code. No data is ever shared with advertisers, brokers, or any third party.
Data layer
AI layer
Patient messages are sent to language model APIs to generate replies. We chose vendors specifically for their data-handling guarantees, and we configure each call to ensure your patients' data is never used to train any model.
Each clinic's AI receives a system prompt scoped to that clinic only — including the clinic name, services, doctors, and red-flag rules. The AI does not have access to other clinics' patients, brains, or data. Even if a patient asks "tell me about another clinic", the AI cannot retrieve that information because it does not exist in its context.
Channel layer
Authentication & access control
Audit trail
Every action by the AI, by your staff, and by the system itself is recorded in the Automation Log table of your clinic's Airtable base. This means your operations team has a complete forensic record of:
Compliance
No surprises, no fine print
Incident response
Automated monitoring alerts the Flowxa engineering team within minutes of any workflow failure, credential leak, anomalous access pattern, or downstream API outage.
Confirmed security incidents affecting patient data are disclosed to the affected clinic within 4 hours of confirmation, including scope, timeline, and remediation steps. Public-disclosure incidents (data breach affecting >100 patients) are reported to Kenya's Office of the Data Protection Commissioner within 72 hours as required by law.
All credentials are rotatable in <5 minutes. Compromised tokens revoked immediately. Affected workflows can be paused without disrupting routine care. Backup of clinic Airtable bases nightly, recoverable within 1 hour.
Every incident receives a written post-mortem shared with the clinic, covering root cause, timeline, customer impact, and prevention measures.
Subprocessors
Flowxa relies on these vetted vendors for parts of the system. We list them transparently — no hidden third parties.
| Vendor | Purpose | Data accessed | Compliance |
|---|---|---|---|
| Meta (WhatsApp Cloud API) | Patient messaging | Patient phone, message content | SOC 2, GDPR |
| Anthropic | AI replies (high-stakes) | Message text + clinic context | SOC 2 II, ISO 27001 |
| OpenAI | AI replies (routine) | Message text + clinic context | SOC 2 II |
| Airtable | Clinic database | All clinic records | SOC 2 II, GDPR |
| n8n Cloud | Workflow orchestration | Pipeline-internal | SOC 2, GDPR |
| Cal.com | Appointment booking | Booking metadata | SOC 2 II |
| Cloudflare | Webhook proxy + DDoS | Encrypted transit only | SOC 2 II, ISO 27001 |
| Africa's Talking | SMS fallback (KE) | Phone + message text | DPA Kenya |
| Safaricom Daraja | M-Pesa payments (KE) | Phone, amount, transaction ID | PCI-DSS, DPA Kenya |
Honest roadmap
We believe transparency builds trust. Here's what's already in place vs. what we're investing in next:
- TLS 1.3, AES-256, signed webhooks
- Per-clinic data isolation
- No-training mode on AI APIs
- Permanent system-user tokens
- Full audit log per clinic
- Subprocessor disclosure
- Server-side role enforcement on all 30+ endpoints
- Magic-link auth (replacing demo-mode)
- Conversation-lock concurrency control
- Penetration test (Q3 2026)
- Formal DPIA + privacy notice templates
- SOC 2 Type I attestation (target Q4 2026)
Ready to dig deeper?
We're happy to walk through the architecture in detail with your IT lead, sign a Data Processing Agreement before go-live, and answer any technical or regulatory question your team has.
