MazerikMazerik

Legal

Subprocessors

Current and planned subprocessors used to deliver services, including processing purpose, data categories, and location.

Effective date: March 24, 2026Last updated: March 24, 2026

Legal notice: This template is provided for operational planning and must be reviewed by licensed counsel before publication. Replace all placeholders, including [Company Legal Name], [Jurisdiction], [DPO Email], [Privacy Contact], and [Governing Law], before final use.

This subprocessors describes how [Company Legal Name] governs service operations, contractual expectations, and compliance commitments for users of the platform and related support channels. It is written as a detailed professional template so legal teams can adapt language to company-specific and jurisdiction-specific obligations while preserving operational clarity for technical teams.

By continuing to access, evaluate, or use the services, the applicable party acknowledges this document and agrees to cooperate with reasonable implementation requirements that support security, privacy, and lawful processing. Nothing in this template is legal advice, and implementation teams must coordinate final text with qualified counsel before external publication.

1. Subprocessor Governance Principles

In relation to subprocessors, 1. subprocessor governance principles applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

2. Due Diligence and Selection Criteria

In relation to subprocessors, 2. due diligence and selection criteria applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

3. Current Subprocessor Categories

In relation to subprocessors, 3. current subprocessor categories applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

4. Infrastructure and Hosting Providers

In relation to subprocessors, 4. infrastructure and hosting providers applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

5. Communication and Support Providers

In relation to subprocessors, 5. communication and support providers applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

6. Security Tooling and Operational Vendors

In relation to subprocessors, 6. security tooling and operational vendors applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

7. Data Residency and Transfer Safeguards

In relation to subprocessors, 7. data residency and transfer safeguards applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

8. Notification of Subprocessor Changes

In relation to subprocessors, 8. notification of subprocessor changes applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

9. Customer Objection and Escalation Process

In relation to subprocessors, 9. customer objection and escalation process applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

10. Maintaining the Public Subprocessor Register

In relation to subprocessors, 10. maintaining the public subprocessor register applies to all customers, prospects, partners, and authorized users that access services provided by [Company Legal Name]. This section is drafted as a professional template and is intended to be adapted for [Jurisdiction]-specific requirements before publication. Operational teams should treat this section as an enforceable baseline once approved by counsel, ensuring that internal policies, technical controls, and support procedures follow the same commitments stated here, including measurable controls for access, logging, retention, and exception handling.

Where personal data, financial information, telemetry, account records, or support artifacts are processed, [Company Legal Name] maintains a documented governance process that maps data flows, processing purposes, and legal obligations to designated control owners. These controls include role-based permissions, approval workflows, and periodic reviews designed to minimize unauthorized access and inconsistent handling. Each control owner must preserve objective evidence of compliance activities, including test results, review outcomes, and remediation timelines, so that legal, procurement, and customer assurance teams can verify adherence during internal and external review cycles.

If there is a conflict between this template section and an executed contract, the executed contract controls to the extent of the conflict; however, teams should still align implementation behavior with the stricter requirement whenever feasible. [Company Legal Name] may update this section for legal, security, or product reasons, and material updates should be communicated through account channels before enforcement dates. Customers are responsible for reviewing changes, raising concerns through [Privacy Contact] or [DPO Email], and maintaining their own internal records for policy acceptance and deployment decisions.

Need counsel-ready responses?

Work with us on security, privacy, and compliance review requests

We support teams preparing procurement, legal, and compliance due diligence packages.