A "sub-processor" is any vendor we use to deliver the Service. We list every single one here and keep the list current. If we add, remove, or materially change how we use one, admins get 30 days' notice by email.
This is the process we run every time we consider bringing a new vendor into the data flow — or removing an existing one.
Every prospective sub-processor completes a security questionnaire. We verify encryption, access controls, audit status (SOC 2, ISO 27001), and breach history.
We sign a Data Processing Addendum with SCCs before any production data flows. We won't use a vendor that refuses to sign.
Each vendor gets only the data necessary for its specific function. No blanket data sharing, no "just in case" access.
Before adding a new sub-processor or materially changing how we use an existing one, we email account admins at least 30 days in advance.
Enterprise customers can object to a new sub-processor; if we can't accommodate the objection, you can terminate the affected portion of the Service with a prorated refund.
Every sub-processor is re-reviewed annually. If their security posture slips or their terms change adversely, we replace them.
Account admins are notified automatically. If you're a procurement or security stakeholder and want to be on the notice list without a workspace seat, add your email to our sub-processor notification list.
Join the notice list→