Skip to content
Cyber ArmyCyber Army

Subprocessors

This page lists third-party subprocessors that Cyber Army may engage to deliver our products and services. We choose vendors who align with our security and privacy standards and enter into appropriate data protection agreements (DPAs).

Last updated: 2025-09-29

Current subprocessors

The table below describes each subprocessor’s role, typical data processed, and its primary processing region. Exact data and retention depend on customer configuration and use.

VendorPurposeData processed (typical)RegionDPA / Info
ResendTransactional email (lead confirmations, notices)Name, email, message metadata; templatesUS / EU (vendor-managed)DPA
hCaptchaBot mitigation for contact/lead formsIP address, user-agent, challenge responsesGlobalDPA
Google Maps (Embed)Location map on contact pageIP address, request/usage metadataGlobalInfo
Hosting & CDN (e.g., Vercel / AWS / Cloudflare)Serving website/app; logs, caching, WAF/CDNIP addresses, request logs, minimal telemetryRegion per deploymentAdd links to your provider’s DPA
Analytics (e.g., Plausible / Google Analytics)Basic website usage analyticsIP (truncated or anonymized), pageviews, referrersRegion per vendorAdd your analytics DPA link

Changes to this list

We’ll update this page before adding or replacing subprocessors where required by law or contract. For questions or notifications, email security@cyberarmy.tech.

Related