Decypher Technologies

Decypher Technologies List of Subcontractors

Last Updated: 04/08/2026 

As part of delivering our IT and cybersecurity services to our Clients, Decypher Technologies Inc. (“Decypher,” “we,” “us,” or “our”) may engage third-party service providers (each, a “Subcontractor” or “Sub-processor”) who may process Personal Data on our behalf. This List of Subcontractors provides transparency regarding the identity, location, and role of each Subcontractor we engage in delivering our Services. Our engagement of Subcontractors is governed by our contractual obligations under applicable data protection laws, including but not limited to the General Data Protection Regulation (GDPR), Colorado Privacy Act (CPA), California Consumer Privacy Act (CCPA/CPRA), and other relevant privacy regulations. 

Subprocessor Definition and Engagement Standards 

A Subcontractor, as defined in this document, is any third-party entity engaged by Decypher that has or may have access to Personal Data in the course of providing services that support our delivery of IT managed services, cybersecurity solutions, compliance consulting, or related offerings to our Clients. Decypher maintains strict standards for Subcontractor engagement and requires each Subcontractor to enter into written agreements that impose substantially the same data protection obligations that apply to Decypher under our contractual arrangements with Clients. These obligations include, but are not limited to: processing Personal Data only on documented instructions; implementing appropriate technical and organizational security measures; maintaining confidentiality; assisting with data subject rights requests; and providing cooperation in the event of a data breach or security incident. All Subcontractors must demonstrate compliance with applicable data protection laws and industry-standard security practices before being authorized to process Personal Data on behalf of Decypher. 

Changes to Subcontractors and Client Notification 

Decypher reserves the right to add, remove, or replace Subcontractors as necessary to deliver and improve our Services, respond to technological changes, or optimize our service delivery model. When Decypher intends to engage a new Subcontractor or replace an existing Subcontractor that will have access to Personal Data, we will provide advance notice to affected Clients in accordance with the terms of our applicable service agreements and Data Processing Agreements (DPAs). Unless otherwise specified in your DPA, Decypher will provide a minimum of thirty (30) calendar days’ advance notice of such changes by updating this List of Subcontractors and notifying Clients via email to the primary contact address on file. If a Client objects to a new or replacement Subcontractor on reasonable grounds relating to data protection, the Client must notify Decypher in writing within seven (7) calendar days of receiving notice of the change. Decypher will work with the Client in good faith to address such concerns, which may include using commercially reasonable efforts to make available an alternative solution or, if no mutually acceptable resolution can be reached, allowing the Client to suspend or terminate the affected Services in accordance with the applicable service agreement without penalty. 

Subcontractor Categories and Disclosed Information 

The Subcontractors listed in this document are organized by functional category to provide clarity regarding their role in our service delivery. For each Subcontractor, we disclose the following information: (1) the Subcontractor’s legal name and/or trade name; (2) the primary jurisdiction(s) or geographic location(s) where the Subcontractor processes or may process Personal Data; (3) a description of the services or functions performed by the Subcontractor; and (4) the category of Personal Data that may be accessible to the Subcontractor. Decypher distinguishes between two types of Subcontractors: Core Infrastructure Subcontractors, which provide essential services necessary for the operation and delivery of our platform and services (such as cloud hosting, data storage, network infrastructure, and security monitoring), and Service-Specific Subcontractors, which support particular features, functionalities, or service offerings that may be utilized depending on the Client’s selected services or configuration. Certain Subcontractors may process Personal Data in jurisdictions outside the European Economic Area (EEA), United Kingdom, or United States; where applicable, Decypher ensures that appropriate data transfer mechanisms are in place, including Standard Contractual Clauses (SCCs), adequacy decisions, or other legally compliant transfer frameworks as required by applicable data protection laws. 

Subcontractor Name Location(s) Service DescriptionCategories of Personal Data Data Transfer Mechanism
Microsoft Corporation (Azure / Microsoft 365) United States (multiple regions); European Union (Netherlands, Ireland, Germany); Global data centers Cloud hosting services, email services (Microsoft 365/Exchange Online), document storage and collaboration, identity and access management, backup servicesAll categories of Personal Data processed through Decypher Services, including email addresses, names, email content and attachments, user authentication data, documents, system configuration data, operational logsStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US; EU-US Data Privacy Framework (for certified services)
CrowdStrike, Inc.United StatesEndpoint detection and response (EDR/XDR), threat intelligence, security monitoring, malware detection and responseEndpoint data, security event logs, threat indicators, system configuration data, device identifiers, process execution dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
ThreatLocker, Inc.United States (Orlando, Florida) Application allowlisting and ringfencing, storage control, network access control, endpoint security policy enforcement, zero-trust application controlDevice identifiers, process execution data, application usage logs, system configuration data, network access logs, file activity records, user activity dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Arctic Wolf Networks, Inc.United States (Minnesota); Canada (Ontario); Germany (Frankfurt) Managed detection and response (MDR), 24×7 security operations center (SOC) monitoring, threat hunting, incident response, cloud security monitoring, vulnerability managementSecurity event logs, network traffic data, endpoint telemetry, threat intelligence data, incident response data, user activity logs, system configuration dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US and Canada; adequacy decision for Canada
Zscaler, Inc.United States (California); Global data centers across 160+ locations worldwide including United States, European Union, Asia-PacificZero Trust network access (ZTNA), secure web gateway (SWG), cloud firewall, data loss prevention (DLP), browser isolation, secure internet and cloud application accessNetwork traffic data, IP addresses, HTTP/HTTPS request data, user authentication credentials, web activity logs, application access logs, DNS query data, SSL/TLS inspection dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Datto, Inc. (Kaseya company)United States; Canada Backup and disaster recovery services, business continuity, data restorationAll categories of client data subject to backup, including documents, emails, system images, database backups, user filesStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Datto, Inc. (Kaseya company)United States; CanadaIT documentation platform, credential management, and configuration data storageSystem configuration data, device identifiers, network information, client contact information, administrative credentials, operational logsStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US; adequacy decision for Canada
ConnectWise LLCUnited States Remote monitoring and management (RMM), patch management, remote support, IT ticketing and service deskSystem configuration data, device identifiers, network information, support ticket content, technician activity logs, client contact informationStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Kaseya LimitedUnited States; IrelandRemote monitoring and management (RMM), patch management, remote access, automated IT managementSystem configuration data, device identifiers, network information, patch deployment data, remote session logsStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Cisco Systems, Inc. (Meraki)United States; Global network locations Network infrastructure management, firewall administration, wireless access point management, traffic monitoring and analyticsNetwork traffic data, device MAC addresses, IP addresses, network configuration data, user device information, network usage logsStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Proofpoint, Inc.United StatesEmail security and threat protection, anti-phishing, anti-malware, email filtering, data loss prevention (DLP)Email addresses, email content, email headers and metadata, sender/recipient information, attachment data, threat intelligence dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
AutoElevate (CyberFox)United StatesEndpoint privilege access management, application installation control, elevation policy enforcement, automated privilege request handlingApplication installation requests, user identity data, elevation event logs, endpoint configuration data, process execution dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Acronis International GmbHUnited States (US data centers); Switzerland (headquarters only; no client data stored) Backup and disaster recovery services, local and cloud backup, business continuity, data restorationAll categories of client data subject to backup, including documents, emails, system images, database backups, user filesStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Tenable, Inc. (Nessus)United States Vulnerability scanning and assessment, network security scanning, compliance auditingIP addresses, system configuration data, vulnerability scan results, network topology data, device identifiersStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
RapidFire ToolsUnited StatesSecurity and compliance assessment tools, system configuration scanning, compliance reportingSystem configuration data, security assessment results, compliance scan data, device informationStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Global Relay Communications Inc.Canada; United States Email archiving and retention, regulatory compliance archiving, e-discovery supportEmail addresses, archived email content and attachments, email metadata, communication recordsStandard Contractual Clauses (SCCs) where applicable; adequacy decision for Canada
Okta, Inc.United States; Global data centers Identity and access management (IAM), single sign-on (SSO), multi-factor authentication (MFA), user provisioningUser authentication credentials, email addresses, names, authentication logs, device information, MFA enrollment dataStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US; EU-US Data Privacy Framework (for certified services)
KnowBe4, Inc.United States Security awareness training, phishing simulation, compliance training, user risk scoringUser email addresses, names, training completion records, phishing simulation click data, user risk scoresStandard Contractual Clauses (SCCs) for transfers from EEA/UK to US
Contact Information and Additional Assistance 

For questions regarding this List of Subcontractors, to request additional information about any specific Subcontractor listed herein, to subscribe to receive email notifications of changes to this list, or to exercise any rights under your Data Processing Agreement related to Subcontractors, please contact Decypher’s Legal Team at [email protected]. Upon reasonable written request and subject to applicable confidentiality obligations, Decypher will provide Clients with additional information regarding a Subcontractor’s processing activities, security measures, or data protection practices to the extent necessary for the Client to verify compliance with applicable data protection laws. Clients who have audit rights under their Data Processing Agreement may exercise such rights in accordance with the terms specified in the DPA, provided that any audit of a Subcontractor shall be subject to the Subcontractor’s reasonable policies, confidentiality requirements, and the coordination procedures set forth in the applicable service agreement. This List of Subcontractors is reviewed and updated periodically to reflect changes in Decypher’s service delivery model and technology infrastructure. Decypher maintains internal records of all Subcontractor changes, including the dates of authorization, modification, or termination of each Subcontractor relationship. This document was last updated on the date indicated at the beginning of this List of Subcontractors and supersedes all prior versions.