Threatcop Logo
Threatcop Logo

Third-Party Sub-Processors

Threatcop Inc. engages the following third-party entities (each referred to as a “sub-processor”) to process personal data on behalf of its customers. These sub-processors operate in accordance with the contractual terms established between Threatcop Inc. and each sub-processor to ensure compliance with the commitments outlined in Threatcop Inc.'s Data Processing Addendum.

The following list includes the sub-processors engaged by Threatcop Inc. for its products. Each sub-processor processes personal data for the duration of the customer's use of the applicable service(s) and retains the data in accordance with the retention periods specified in the customer’s agreement with Threatcop Inc. Additional details about the security measures implemented by these sub-processors can be accessed through the external links provided below.

Sub-processor orApplicable productsNature and purpose of processingCategories of personal dataLocation of processingSecurity measures
Amazon Web Services, Inc.TSAT, TLMS, TPIR, TDMARCCloud hosting providerPersonal data contained in user account informationIndiaAWS Compliance Programs
Twilio SendGridTSAT, TLMS, TPIR, TDMARCEmail delivery providerContact detailsUnited StatesSendGrid Security
WatiTSAT, TPIRWhatsApp Business API platformContact detailsUnited StatesWati Security FAQs
ExotelTSATCloud phone systemContact detailsIndiaExotel Security

Contact Us for All Your Cybersecurity Needs

Contact Us for All Your Cybersecurity Needs

  • Privacy Policy|Terms and Conditions