We know you've entrusted us with valuable data, and we take its security very seriously. Below, we've provided a deep dive into our security practices, protocols and tooling. But we're always available to answer questions on this topic. Just send us a note at [email protected] 🔐

Security practices

The following list was last updated May 28, 2021

Sub-processors

We work with the following companies and tool systems to store, analyse, and transmit data for our users. They've been carefully vetted for best-in-class security practices.