Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Implemented This page lists core third-party services used in Tero-hosted deployments and the role each service plays.

What this page answers

  • Which third parties are involved in hosted delivery
  • What data category each subprocessor handles
  • How subprocessor scope changes in self-hosted deployments

Current subprocessors (hosted)

ServicePurposeData categoryLocation
Google Cloud PlatformInfrastructure runtime, storage, backupsControl-plane operational dataUS
WorkOSAuthentication and identity workflowsIdentity and authentication metadataUS
Anthropic or OpenAI (deployment-dependent)AI-assisted classification workflowsAI workflow input scopeUS
Stripe (self-service only)Billing operationsBilling metadataUS

Self-hosted model boundary

In self-hosted deployments, customers choose and operate their own infrastructure and provider stack. Subprocessor scope is therefore customer-defined for customer-hosted components.

Change management baseline

  • Subprocessor changes follow internal review before customer use.
  • Material changes that could affect security, availability, or data handling are communicated in advance where required by contract or plan terms.
  • Emergency changes are communicated as quickly as practical with impact context.

Evidence you can request

TopicPrimary evidence
Ownership splitShared Responsibility
Data scope and retention baselineData Handling, Data Retention
Compliance contextCompliance and Assurance

Questions

For subprocessor detail requests, email .