Security practices
Überprüft am 27. April 2026
Vendor and third-party risk management
Every subprocessor goes through a documented risk assessment before we adopt it.
PDF herunterladen
Verantwortlich: Head of Security
Before onboarding any vendor that may process customer data, we run a documented assessment that covers their certifications, region of processing, sub-processors, security posture, and data protection terms.
The current list of approved subprocessors is published on this Trust Centre and updated as soon as changes are approved.