T TeamFeePay Trust
Security practices Revisado el 27 de abril de 2026

Vendor and third-party risk management

Every subprocessor goes through a documented risk assessment before we adopt it.

Descargar PDF Responsable: Head of Security

Before onboarding any vendor that may process customer data, we run a documented assessment that covers their certifications, region of processing, sub-processors, security posture, and data protection terms.

The current list of approved subprocessors is published on this Trust Centre and updated as soon as changes are approved.

Relacionados en Security practices