Overview
- We use a small set of carefully vetted third‑party services to deliver the platform
- All vendors are reviewed for security posture and contractually bound to protect data
Controls
- Principle of least privilege and data minimization
- Data shared only as needed to provide the service
- Security commitments included in vendor agreements
Requests
- Enterprise customers can request a current list of service providers and subprocessors under NDA