Phesky

/

Third Party Sub-Processors

Third Party Sub-Processors

We currently use a third-party sub-processor, Phesky conducts through due diligence to assess their privacy, security, and confidentiality protocols. Subsequently, we enter into an agreement outlining their obligations as per our standards.

As our business expands and develops, the Sub-processors we work with may evolve. We will make every effort to notify the account owner of any new Sub-processors, as required by the Agreement, and will also post such updates here.

Third Party Sub-Processors