Subprocessors
Before engaging with a subprocessor, Red Sift takes deliberate steps to conduct an assessment of risk arising from this third-party relationship. Any potential sub-processors are expected to demonstrate their security policies, processes, and procedures and prove that they are able to provide adequate protection of such data in line with our information security policy.
Aside from the below subprocessors, should a customer require technical support, depending on the time of day, such support may be provided by an authorized employee from any of the Red Sift global entities.