loader image

Sub-processors

To provide our service, we engage third-party data processors as sub-processors to perform various activities. In the case that some sub-processors could have access to your personal data, shall you use our platform, we engage in an extensive review of their security information systems. In particular, we look for SOC 2 Type 2 attestation and ask them for their report and bridge letters to ensure that all the measures we deem mandatory are enforced.

Sub-processor Nature and purposes of processing Categories of personal data Location of processing Frequency and duration of processing Security certification Data transfer
AWS
Infrastructure hosting
Customer data
EEA*
Continuous
SOC 2 Type 2
N/A
Intercom
Customer support
Customer data
World
Continuous
SOC 2 Type 2
SCCs

EEA: European Economic Area DPA: Data Processing Addendum SCCs: Standard Contractual Clauses

Start automating today

Sign up for Mindflow to get started with enterprise hyperautomation.

By registering, you agree to receive updates regarding Mindflow’s products and services and your account in Mindflow.

The future of automation is just a login away 🚀

Fill the form below to unlock the magic of Mindflow and be the first to try our feature . 

USE CASE

Phishing

OpenAI icon

OpenAI

Slack

Jira

Jira

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.