Skip to main content
Subprocessors extend your security perimeter—customers review them for data residency, certifications, and incident history. Keep this list current; stale entries erode trust during procurement.

Infrastructure

Hosting and networking vendors that operate regions you select.

Certifications

Link SOC 2, ISO, or FedRAMP reports where applicable so enterprise teams can self-serve.

Communications

Transactional email and in-product messaging providers.

Data minimization

Note which fields each vendor receives—full profile vs email-only.

Updates

We notify customers of substantive subprocessor changes as described in enterprise agreements.

Objection windows

Define how customers object or terminate if they cannot accept a new subprocessor—timeline and migration assistance matter.