Security practices
Reviewed 27 April 2026
Vendor and third-party risk management
Every subprocessor goes through a documented risk assessment before we adopt it.
Download PDF
Owner: Head of Security
Before onboarding any vendor that may process customer data, we run a documented assessment that covers their certifications, region of processing, sub-processors, security posture, and data protection terms.
The current list of approved subprocessors is published on this Trust Centre and updated as soon as changes are approved.