BELT SUB-PROCESSORS

Third party sub-processors

At Belt, we prioritize transparency and trust in our relationships with customers and partners. As part of our commitment to data protection and security, we work with trusted sub-processors to deliver our SaaS solutions effectively and securely. We believe it's essential for our customers to understand how their data is handled and who we entrust to assist us in delivering our services.

Explore our sub-processors page to learn more about the partners who help us maintain the high standards of security and reliability that our customers expect from Belt. 

Belt uses the third party entities below (each, a "sub-processor”) to process personal data on behalf of Belt's customers and in accordance with contract terms between Belt and the sub-processor to uphold Belt’s commitments in Belt's Data Processing Addendum. 

Further information relating to sub-processor security measures can be found via the external links below.

Sub-processor Nature and purpose of processing Categories of personal data Location of processing Security measures
AWS Tenant Data (one database per customer)

Personal data contained in user account information and text or files created by customer.

US, UK or EU

SOC2 Type 2 report

AWS Security and Compliance

Mongo DB Tenant Data (one database per customer)

Personal data contained in user account information and text or files created by customer. 

US, UK or EU

SOC2 Type 2 report

Mongo Trust Center

Office 365 Internal Email Personal data contained in user account information and text or files created by customer.  US

SOC2 Type 2 report

Microsoft Trust Center

NetSuite Accounting Data relating to finance; customers; sales, procurement; human resources; project management; analytics & reporting; compliance & governance US

SOC2 Type 2 report

NetSuite Operational Security

HubSpot CRM & Support

Contact Data; Interaction History; Sales Pipeline Data; Account Information; Activity Tracking; Customer Preferences; Notes and Attachments.

US

SOC2 Type 2 report

HubSpot Security, Privacy and Control

Stripe Payment
Customer Data; Transaction Data; Payment Method Data; Subscription Data; Dispute and Chargeback Data; Payout Data; Account Data; API Request Data; Security Data.
US

SOC2 Type 2 report

Stripe Security

Belt carries out annual security reviews of its sub-processors. Belt imposes obligations on its sub-processors to implement appropriate technical and organizational measures ensuring that the sub-processing of personal data is protected to the standards required by applicable data protection laws.

This list contains sub-processors for Belt’s generally available services. If a Beta or EAP service uses a new sub-processor, Belt may use an alternative notification mechanism. For each sub-processor, processing of personal data will be for the duration of use of the applicable service(s) by the customer, and for the retention periods as set out in the customer’s agreement with Belt and any product documentation. Please note that if you use Belt data residency, pinned data remains in your specified location as described on this page.

Thank you for your trust in Belt. We're dedicated to ensuring the privacy and security of your data every step of the way.

Updated April 2024