Sub-processors

Last updated: November 12, 2025

Phone2, Inc. Sub-processor List

Overview

Phone2 uses third-party service providers ("Sub-processors") to assist in providing our telecommunications services. This page lists the Sub-processors that may process personal data on behalf of Phone2.

We carefully select Sub-processors that maintain appropriate security measures and comply with applicable data protection laws. Each Sub-processor is contractually bound to process personal data only as necessary to provide their services to Phone2 and in accordance with our instructions.

Current Sub-processors

The following Sub-processors are currently authorized to process personal data on behalf of Phone2:

Sub-processorPurposeLocation
Amazon Web Services (AWS)Cloud infrastructure and hostingUnited States
TwilioTelecommunications infrastructure (voice and SMS)United States
StripePayment processingUnited States
Google Cloud PlatformCloud services and analyticsUnited States
IntercomCustomer support and messagingUnited States
SentryError monitoring and application performanceUnited States
MixpanelProduct analyticsUnited States
SendGridTransactional email deliveryUnited States

Updates to This List

Phone2 may update this Sub-processor list from time to time. We will notify customers of any new Sub-processors at least 30 days before they begin processing personal data, unless a shorter notice period is required due to urgent circumstances.

If you have concerns about a new Sub-processor, please contact us at [email protected] within 14 days of notification.

Data Processing

Each Sub-processor listed above processes personal data only to the extent necessary to provide their specific services to Phone2. The types of personal data processed vary by Sub-processor and may include:

  • Account information (name, email, phone number)
  • Usage data (call logs, message history)
  • Device information (IP address, device type)
  • Payment information (processed only by our payment processor)

Security Measures

All Sub-processors are required to implement appropriate technical and organizational security measures to protect personal data. These measures include, but are not limited to:

  • Encryption of data in transit and at rest
  • Access controls and authentication
  • Regular security assessments and audits
  • Incident response procedures

Contact Information

For questions about our Sub-processors or data processing practices, please contact:

Phone2, Inc.
8 The Green
Dover, DE 19901 USA
Email: [email protected]
Phone: (775) 405-3030