Quick links
Privacy Policy
Read our comprehensive privacy policy to understand how we handle your data
Trust Center
View our Trust Center to learn more about our security practices and to access
our SOC2 certification. security reports and annual penetration testing
reports.
Sub-processors
We work with companies and tools to store, analyze, and transmit data on behalf of our users. These companies have been vetted for best-in-class security practices.Sub-processor | Purpose |
---|---|
PostHog | Product analytics |
DataDog | Analytics |
Google Cloud Platform | Cloud hosting |
Superhuman | |
Pylon | Support |
Slack | Internal processes |
Notion | Internal processes |
Google Workspace | Internal processes |
GitHub | Source code |
Linear | Issue tracking |
Sentry | Error monitoring |
Stripe | Billing |
Orb | Billing |
Anthropic | AI |
OpenAI | AI |
Microsoft Azure | AI |
WorkOS | Authentication |