
Paradox uses sub-processors in the provision of our cloud software. Each Paradox sub-processor undergoes an information security and data protection review and is subject to a written agreement with Paradox. The list below identifies the sub-processors that are authorized under Paradox's agreements with its clients.
Register here to receive notifications of updates or modifications to Paradox's list of sub-processors.