{ "nodes": [ { "parameters": { "model": "gpt-4" }, "name": "OpenAI", "type": "n8n-nodes-base.openAi" }, { "parameters": { "path": "webhook" }, "name": "Webhook", "type": "n8n-nodes-base.webhook" } ] }
PRIVACY_01
SYSTEM_STATUS: SECURE

[ Data Integrity ]
Manifesto

In an era of Connecting GPT-4 via n8n and complex data pipelines, privacy isn't a legal checkbox—it's a technical architecture. We treat your data with the same precision we apply to our automation logic.

[ 01 ] CORE_PRINCIPLES

Zero-Waste
Data Hygiene

Data Infrastructure

Fig_01: Secure Node Environment

At Intelligent Automatisatie, our operational philosophy centers on data minimization. When building N8N + OpenAI for automation, we don't just "collect" data; we facilitate encrypted flows. This policy outlines how we handle personal identifiers when you interact with our platform at Jodenbreestraat 25, 1011 Amsterdam.

[ Transmission Over Storage ]

Most modern N8N pipelines with artificial intelligence operate on a stateless basis. We prioritize ephemeral processing, meaning your business logic and CRM data pass through our secure nodes without being cached longer than the execution cycle requires.

Input Sources

  • • Contact Form Meta-data
  • • Technical Inquiry Logs
  • • API Endpoint Handshakes

Processing Scope

  • • CRM Synchronization Logic
  • • n8n Workflow Validation
  • • OpenAI Token Management

When we assist with Configuring OpenAI in n8n for business tasks, the actual data governance falls under a dual-responsibility model. We ensure the bridge is secure; you maintain ownership of the payload. We never sell, trade, or rent your identity to third-party data brokers.

[ 02 ] DATA_TRANSFERS

The AI-Logic Pipeline

Protocol: ISO_DATA_MIN_2026
Latency: < 0.5ms

Internal Processing

Personal data used for communication management and technical support is stored on encrypted European servers. We limit access to core personnel involved in Automating routine tasks through n8n.

TTL: 24 Months / Retention

Third-Party Handshakes

When Linking n8n and artificial intelligence, data may traverse OpenAI endpoints. We prioritize "Zero-Data Retention" requests where technically feasible at the API level.

Compliance: SOC2 / GDPR

Automated Logs

System logs for Integration of n8n and ChatGPT are anonymized and used exclusively for throughput optimization and security vulnerability patching.

Protocol: AES-256 Symmetric

Your Rights in the Machine

Under the GDPR and associated Dutch privacy regulations, you are the ultimate administrator of your data. We provide the following interfaces for managing your digital footprint at Intelligente Automatisatie.

[01]
Right of Retrieval

Request a full JSON manifest of all personal data points currently indexed in our systems.

[02]
Hard Erasure

Request the complete termination of your record across our Smart n8n scenarios with OpenAI.

[03]
Logic Rectification

Correct any inaccuracies in how our Automating AI-based business processes handle your specific identifiers.

Compliance Protocol

When Automating CRM processes with GPT, we implement multi-layer authentication (MFA) and granular API permission scopes. This ensures that even if a workflow node is compromised, the broader pipeline remains hardened.

We conduct quarterly internal audits of our n8n self-hosted instances to verify that no PII (Personally Identifiable Information) is leaking into debug logs or error handling catch-alls.

Request Execution:

EMAIL: info@thessen.club

SUBJECT: PRIVACY_REQUEST_V1

SLA: 30 Calendar Days

// PHYSICAL_NODE

Amsterdam
Operations

HQ_ADDRESS

Jodenbreestraat 25, 1011 Amsterdam

PULSE_LINE

+31 20 909 4884

DATA_CONTROLLER

info@thessen.club

LAST_UPDATED: 2026-02-06
REVISION: 4.2.0
SEC_LEVEL: ALPHA_ENFORCED

Ready to secure your automation pipeline?

Initialize Connection