Skip to main content

Overview

  • We use a small set of carefully vetted third‑party services to deliver the platform
  • All vendors are reviewed for security posture and contractually bound to protect data

Controls

  • Principle of least privilege and data minimization
  • Data shared only as needed to provide the service
  • Security commitments included in vendor agreements

Requests

  • Enterprise customers can request a current list of service providers and subprocessors under NDA
I