Subprocessors

Before engaging with a subprocessor, Red Sift takes deliberate steps to conduct an assessment of risk arising from this third-party relationship. Any potential sub-processors are expected to demonstrate their security policies, processes, and procedures and prove that they are able to provide adequate protection of such data in line with our information security policy.

Aside from the below subprocessors, should a customer require technical support, depending on the time of day, such support may be provided by an authorized employee from any of the Red Sift global entities.

Entity Name
Subprocessing Activities
Type of Entity
Types of Personal Data Processed
Country/Region
Adequacy
Published: 14th April 2023
LinkedInInstagramTwitter