Permission Subprocessors
Last updated on 01/07/2025
​
Permission engages third-party entities listed below to perform specific, limited activities in connection with our Services. The table outlines the activities performed by each entity and specifies if an entity is relevant to a particular Service. Additional details are provided to explain the limited processing of user or customer data that each entity is authorized to perform.
Our subprocessors maintain privacy and security practices to ensure compliance with applicable privacy regulations. They are contractually obligated to protect the privacy and security of any user or customer information they process on our behalf. Please see each subprocessor's privacy policy and terms for more information on their privacy practices when they provide services to us.
Technical Support: In cases of customer-initiated technical support, as described in the Permission Privacy Policy, subprocessors do not access user or customer data stored or processed by the Services unless explicitly authorized. Access is granted only when users or customers choose to share such data during support interactions (e.g., via screenshots).
Entity Name | Corporate Location | Purpose of Data Processing |
---|---|---|
Nyckel | US | We use Nyckel to deploy custom classification models. |
ANKR | US | We use ANKR for the management of our blockchain operations. |
Atlassian (Jira and Confluence) | Australia | We use Atlassian for engineering project development, management, and knowledge sharing for team collaboration and documentation. |
Brevo | France | We use Brevo for cloud-based email marketing and notification services. |
Deskpro | US | We use Deskpro for Customer Support and ticket handling. |
Docusign | US | We use DocuSign for Document Management and E-Signature. |
Firebase | US | We use Firebase for Secure Identity Access Management and user authentication. |
Fireblocks | US | We use Fireblocks for securely managing, transferring, and safeguarding digital assets and cryptocurrency transactions. |
Google Analytics | US | We use Google Analytics to collect and receive Platform analytics. |
Google Cloud | US | We use Google Cloud for Hosting and Platform Infrastructure. |
Google Gemini | US | We use Google (Gemini AI Models) for content generation, data analysis, customer support, and to enhance operational efficiency. |
Google Workspace | US | We use Google Workspace (G Suite) for our company email and internal workspace. |
Hubspot | US | We use Hubspot for customer relationship management. |
Instantly.ai | US | We use Instantly.ai for lead generation campaign automation and tracking customer or lead communications. |
Keycloak | US | We use Keycloak for Secure Identity Access Management and user authentication. |
LastPass | US | We use LastPass for secure management and storage of Employee credentials. |
MEGA Pro | US | We use MEGA Pro for secure cloud storage and managing company data. |
Microsoft Azure | US | We use Microsoft Azure for instracture, data storage and application hosting services for company operations. |
Microsoft Outlook | US | We use Microsoft Outlook for Email Services. |
OneTrust | US | We use OneTrust for Cookie Consent Management and Privacy Compliance. |
OpenAI | US | We use OpenAI for natural language processing and AI-powered tools for content generation, data analysis, and customer support enhancement. |
PostHog | US | We use PostHog for End User Behavior Analysis and for monitoring application functionality. |
Shufti Pro | UK | We use Shufti Pro for Identity verification and fraud prevention services to ensure compliance with KYC and AML regulations. |
Slack | US | We use Slack for Employee communication. |
Wix | Israel | We use Wix as a website development and hosting platform for maintaining our sites and online services. |
ZeroTier | US | We use Zerotier to secure our web infrastructure and facilitate remote access to company systems. |
Apollo | US | We use Apollo for sales engagement and lead generation platform for managing customer outreach and relationship development. |
We may add additional subprocessors in the future. To the extent possible, we always seek to limit the rights of these parties with respect to Personal Information where reasonable, and we do not grant any rights to these organizations to use this information for any marketing or other purpose beyond providing services to us to manage business activities. As set forth in our DPA, we have Data Processing Addendums with EU Standard Contractual Clauses or similar terms in place with our subprocessors.