Article overview:
How do we select subprocessors?
At Filestage, we take your privacy and security seriously. That's why we have a robust third-party privacy and security risk management program.
As part of our program, each subprocessor's privacy and security practices are assessed prior to our use of their services. This assessment includes a review of their information security management systems and data processing agreements (DPAs).
Preference is given to subprocessors who are GDPR-compliant and certified against industry best practice standards such as ISO 27001. In addition, and where required, we enter into DPAs with each of our subprocessors.
Who are our subprocessors?
At Filestage, we embrace remote working. This means we're a fully remote and globally distributed team that leverages cloud service providers for our products (i.e., hosting and delivering our application (app.filestage.io). Please follow this link to review our sub-processors.
If you have any questions or comments, please contact us through chat or email at support@filestage.io.