Subprocessors
This page lists third-party subprocessors that Cyber Army may engage to deliver our products and services. We choose vendors who align with our security and privacy standards and enter into appropriate data protection agreements (DPAs).
Last updated: 2025-09-29
Current subprocessors
The table below describes each subprocessor’s role, typical data processed, and its primary processing region. Exact data and retention depend on customer configuration and use.
Vendor | Purpose | Data processed (typical) | Region | DPA / Info |
---|---|---|---|---|
Resend | Transactional email (lead confirmations, notices) | Name, email, message metadata; templates | US / EU (vendor-managed) | DPA |
hCaptcha | Bot mitigation for contact/lead forms | IP address, user-agent, challenge responses | Global | DPA |
Google Maps (Embed) | Location map on contact page | IP address, request/usage metadata | Global | Info |
Hosting & CDN (e.g., Vercel / AWS / Cloudflare) | Serving website/app; logs, caching, WAF/CDN | IP addresses, request logs, minimal telemetry | Region per deployment | Add links to your provider’s DPA |
Analytics (e.g., Plausible / Google Analytics) | Basic website usage analytics | IP (truncated or anonymized), pageviews, referrers | Region per vendor | Add your analytics DPA link |
Changes to this list
We’ll update this page before adding or replacing subprocessors where required by law or contract. For questions or notifications, email security@cyberarmy.tech.
Related
- Security
- Privacy Policy (coming soon)
- Terms of Service (coming soon)