Subprocessor List

Effective Date: January 1, 2025
Last Updated: November 15, 2025
Version: 1.0

📋 Table of Contents

  1. INTRODUCTION
  2. WHAT IS A SUBPROCESSOR?
  3. WHY WE USE SUBPROCESSORS
  4. GDPR REQUIREMENTS
  5. DATA PROTECTION SAFEGUARDS
  6. SUBPROCESSOR NOTIFICATION AND CONSENT
  7. ACTIVE SUBPROCESSORS
  8. HOW TO OBJECT TO A SUBPROCESSOR
  9. ALIGNMENT WITH SECURITY POLICY
  10. CONTACT INFORMATION
  11. UPDATES AND CHANGES
  1. Introduction
  1. What is a Subprocessor?
  1. Why We Use Subprocessors
  1. GDPR Requirements
  1. Data Protection Safeguards
  1. Subprocessor Notification and Consent
  1. Active Subprocessors
  1. How to Object to a Subprocessor
  1. Alignment with Security Policy
  1. Contact Information

INTRODUCTION

INTRODUCTION

INTRODUCTION

INTRODUCTION


WHAT IS A SUBPROCESSOR?

Definition:

WHAT IS A SUBPROCESSOR?

Key Characteristics:

Examples:


WHY WE USE SUBPROCESSORS

WHY WE USE SUBPROCESSORS

Core Infrastructure:

Payment Processing:

Communication Services:

Analytics and Improvement:

Financial Data and Market Information:

AI and Machine Learning:


GDPR REQUIREMENTS

GDPR REQUIREMENTS

Maintain Current List:

Contractual Obligations:

Notification Requirements:

Liability:


DATA PROTECTION SAFEGUARDS

DATA PROTECTION SAFEGUARDS

Contractual Protections:

DATA PROTECTION SAFEGUARDS

Requirements for data security measures

Technical and Organizational Measures:

Legal mechanism for lawful international data transfers

Incident response and breach notification procedures

No excessive or unnecessary data sharing

Compliance Certifications:

Compliance with our data retention schedules


How We Notify Users:

SUBPROCESSOR NOTIFICATION AND CONSENT

Description of subprocessor, services provided, and data processed

Your Right to Object:

Email notification for material changes

  1. Contact us at [email protected] within 30 days of notification
  1. Explain your objection and concerns
  1. We will work with you to address concerns or offer alternatives
  1. If we cannot resolve objections, you may terminate your account without penalty

If we cannot resolve objections, you may terminate your account without penalty


ACTIVE SUBPROCESSORS

ACTIVE SUBPROCESSORS

ACTIVE SUBPROCESSORS

Comprehensive Subprocessor Table


Detailed Subprocessor Information

7.1 STRIPE, INC.

ACTIVE SUBPROCESSORS

ACTIVE SUBPROCESSORS

Subscription billing lifecycle management

Subscription billing lifecycle management

Encrypted backups in multiple US and EU regions

IP address and device information for fraud detection

IP address and device information for fraud detection

PCI DSS compliant tokenization for payment data

GDPR compliant with dedicated EU infrastructure

Payment card data: PCI DSS compliant tokenization (never stored in raw form)

Full details: Stripe Data Retention

Full details: Stripe Data Retention

Full details: Stripe Data Retention


7.2 PLAID, INC.

Full details: Stripe Data Retention

Full details: Stripe Data Retention

Income and employment verification (if used)

Account holder names

Account holder names

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers


7.3 OPENAI, L.L.C.

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Query interpretation and response generation

No financial credentials or sensitive financial data

No financial credentials or sensitive financial data

Zero-data retention option available

Zero-data retention option available

Zero-data retention option available


7.4 ONESIGNAL, INC.

Zero-data retention option available

Zero-data retention option available

User engagement tracking

IP address and location (city-level)

IP address and location (city-level)

Privacy Shield certified (for pre-2020 transfers)

Privacy Shield certified (for pre-2020 transfers)


7.5 MAILGUN TECHNOLOGIES, INC. (Sinch)

Privacy Shield certified (for pre-2020 transfers)

Privacy Shield certified (for pre-2020 transfers)

Bounce and complaint handling

IP addresses

IP addresses

ISO 27001 certified

ISO 27001 certified


7.6 TWILIO, INC.

ISO 27001 certified

ISO 27001 certified

Delivery status tracking

User ID (internal identifier)

User ID (internal identifier)

HIPAA compliant (for applicable services)

HIPAA compliant (for applicable services)


7.7 AMAZON WEB SERVICES, INC. (AWS)

HIPAA compliant (for applicable services)

HIPAA compliant (for applicable services)

Backup and disaster recovery

System logs

System logs

Encryption at rest (AES-256) and in transit (TLS 1.3)

Encryption at rest (AES-256) and in transit (TLS 1.3)


7.8 CLICKHOUSE CLOUD (ClickHouse, Inc.)

Encryption at rest (AES-256) and in transit (TLS 1.3)

Encryption at rest (AES-256) and in transit (TLS 1.3)

Real-time analytics processing

Aggregated financial data (no individual transaction details)

Aggregated financial data (no individual transaction details)

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers


7.9 REDIS LABS (Redis, Inc.)

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Rate limiting and API throttling

API rate limit counters

API rate limit counters

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers


7.10 SENTRY (Functional Software, Inc.)

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Release tracking and deployment monitoring

URL paths and API endpoints

URL paths and API endpoints

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers


7.11 ALPHA VANTAGE, INC.

Standard Contractual Clauses for EU data transfers

Standard Contractual Clauses for EU data transfers

Global equity data

No personal user data transmitted

No personal user data transmitted

API usage is anonymized

API usage is anonymized


7.12 YAHOO FINANCE API (Yahoo Inc.)

API usage is anonymized

API usage is anonymized

Company profiles and statistics

No personal user data transmitted

No personal user data transmitted

No storage of personal user data

No storage of personal user data


7.13 COINMARKETCAP (CMC)

No storage of personal user data

No storage of personal user data

Cryptocurrency exchange information

No personal user data transmitted

No personal user data transmitted

API usage is anonymized

API usage is anonymized


7.14 FINNHUB STOCK API (Finnhub.io)

API usage is anonymized

API usage is anonymized

Economic indicators and calendar events

No personal user data transmitted

No personal user data transmitted

No storage of personal user data

No storage of personal user data


7.15 BINANCE API

No storage of personal user data

No storage of personal user data

Exchange rate information

Read-only API access (no trading functionality)

Read-only API access (no trading functionality)

Rate limiting and security controls

Rate limiting and security controls

Rate limiting and security controls


7.16 PAYPAL HOLDINGS, INC.

Rate limiting and security controls

Rate limiting and security controls

Fraud prevention

Billing address

Billing address

ISO 27001 certified

ISO 27001 certified

ISO 27001 certified


7.17 GOOGLE LLC (Google Cloud Platform)

ISO 27001 certified

ISO 27001 certified

Maps display (if used in UI)

Device identifiers

Device identifiers

Encryption in transit and at rest

Encryption in transit and at rest

Encryption in transit and at rest


7.18 CLOUDFLARE, INC.

Encryption in transit and at rest

Encryption in transit and at rest

SSL/TLS certificate management

No personal data stored beyond network logs

No personal data stored beyond network logs

Encryption in transit

Encryption in transit

Encryption in transit


HOW TO OBJECT TO A SUBPROCESSOR

HOW TO OBJECT TO A SUBPROCESSOR

Objection Process

HOW TO OBJECT TO A SUBPROCESSOR

Deadline: You have 30 days from the date of notification to object

Deadline: You have 30 days from the date of notification to object

  1. Your full name and account email address
  1. The specific subprocessor you are objecting to
  1. Detailed reason for your objection (e.g., data protection concerns, jurisdiction concerns, security concerns)
  1. Any supporting documentation or evidence
  1. Preferred alternative solutions (if applicable)

Preferred alternative solutions (if applicable)

Restricting data shared with the subprocessor

Objection Not Feasible: If we cannot accommodate your objection (e.g., essential subprocessor for core service), we will explain why and offer you the right to terminate your account without penalty

Objection Not Feasible: If we cannot accommodate your objection (e.g., essential subprocessor for core service), we will explain why and offer you the right to terminate your account without penalty

Pre-Notification for New Subprocessors

Export your data before termination via Data Export Tool

Update to this Subprocessor List with the new subprocessor details and effective date

  1. Name and legal entity of the new subprocessor
  1. Services the subprocessor will provide
  1. Data categories that will be processed
  1. Data location and applicable safeguards
  1. Effective date of engagement
  1. Your right to object and the objection deadline

Your right to object and the objection deadline

Essential vs. Non-Essential Subprocessors

Permanent: Update to this page with version history

Mailgun/Twilio (transactional communications - required for account security)

Mailgun/Twilio (transactional communications - required for account security)

Market data providers (optional for portfolio tracking)

Contact for Objections

Market data providers (optional for portfolio tracking)

Subject: "Subprocessor Objection - [Name]"


ALIGNMENT WITH SECURITY POLICY

ALIGNMENT WITH SECURITY POLICY

Required Security Controls

ALIGNMENT WITH SECURITY POLICY

ALIGNMENT WITH SECURITY POLICY

Key Management: Secure key storage using HSMs or equivalent

Audit Logging: Comprehensive logging of all data access and administrative actions

Audit Logging: Comprehensive logging of all data access and administrative actions

Other equivalent industry-recognized certifications

Post-incident forensics and remediation

Security Verification Process

Liability and indemnification provisions

  1. Security Questionnaire: Comprehensive assessment of security posture
  1. Certification Review: Verification of SOC 2, ISO 27001, or equivalent
  1. Contract Negotiation: DPA with security obligations
  1. Risk Assessment: Evaluation of data processing risks

Risk Assessment: Evaluation of data processing risks

  1. Annual Audits: Review of security certifications and compliance status
  1. Quarterly Check-ins: Security updates and incident reviews
  1. Continuous Monitoring: Automated alerts for security incidents
  1. Penetration Testing: Annual third-party penetration tests (for critical subprocessors)

Penetration Testing: Annual third-party penetration tests (for critical subprocessors)

  1. Immediate Notification: Subprocessor must notify us within 24 hours of any security incident
  1. Joint Investigation: Collaborative investigation and forensics
  1. User Notification: We notify affected users within 72 hours (GDPR requirement)
  1. Remediation: Required remediation plan with timeline
  1. Termination Rights: We reserve the right to terminate subprocessors who fail to meet security standards

Cross-Reference: Security Policy Sections

Termination Rights: We reserve the right to terminate subprocessors who fail to meet security standards

Subprocessor Security Verification Table

Section 13: Compliance and Certifications - Required certifications


CONTACT INFORMATION

CONTACT INFORMATION

CONTACT INFORMATION

Subject Line: "Subprocessor Inquiry"

Deadline: 30 days from notification

See our Privacy Policy for comprehensive data protection information

For security-related questions about subprocessors

For security-related questions about subprocessors

For security-related questions about subprocessors

For security-related questions about subprocessors


UPDATES AND CHANGES

UPDATES AND CHANGES

At least annually for accuracy verification

Version 1.0 (November 15, 2025): Initial publication


Version number and last updated date are always displayed at the top

Version number and last updated date are always displayed at the top

Version number and last updated date are always displayed at the top


Terms of Service