Beehive uses carefully selected sub processors to conduct its services. Each sub-processor has been assessed for IT security control and adherence to applicable regulations for the protection of personal data. We ensure we have appropriate contracts in place, and that the product or service is fit for purpose. On an annual basis we undertake a full risk assessment to ensure continued compliance and suitability.
Though not an exhaustive list , the following companies were at the time of publication some of our primary sub-processors.
An up to date list of sub-processors will be made available to clients upon request.