Data privacy in MantrixFlow is mostly about understanding the difference between configuration metadata, operational metadata, and the underlying business data flowing through your pipelines.Documentation Index
Fetch the complete documentation index at: https://docs.mantrixflow.com/llms.txt
Use this file to discover all available pages before exploring further.
What the platform stores
- connection metadata such as names, types, and organization association
- encrypted credentials
- pipeline configuration, including selected source tables, transform logic, destination naming, and schedule settings
- run metadata such as status, timestamps, and row counts
- sync-state checkpoints for incremental pipelines
- user, organization, and membership records
What the platform does not treat as long-term workspace content
- your full source dataset as a product-owned warehouse copy
- raw credentials in logs or standard product responses
- destination business data as a separate durable MantrixFlow dataset
How data moves during normal operation
- A pipeline reads from the source.
- MantrixFlow applies transform logic and branch configuration.
- The processed records are written to the destination.
- Run metadata is retained so the team can audit and troubleshoot the flow.
Real-world example
A healthcare-adjacent operations team syncs appointment events into a reporting warehouse but masks patient contact details inside the transform step before the data lands. The pipeline configuration and run metadata remain in the platform, while the long-term analytical copy lives in the destination warehouse.Recommended privacy practices
- sync only the fields you actually need
- mask or hash sensitive identifiers in the transform layer
- avoid sending production PII into sandbox destinations
- use separate organizations or destinations for testing versus production
- review destination access controls, not just source access controls