Subprocessors
Effective starting:1st March 2025
To support the delivery of the Athena Board Services, Lockbox Technologies Pty Limited and our related entities (“Lockbox”, “us”, “we” and “our”) may engage and use data processors with access to certain Content Data (each, a “Subprocessor”). This page provides important information about the identity, location and role of each Subprocessor. Terms used on this page but not defined have the meaning set forth in the Lockbox Customer Agreement or superseding written agreement between Customer and Lockbox (the “Agreement”).
Third Parties
Prior to engaging any third party Subprocessor, Lockbox performs diligence to evaluate their privacy, security and confidentiality practices, and executes an agreement implementing its applicable obligations.
We’ve broken the list of processors into relevant sections, to give you greater understanding over how these services have access to your information.
Infrastructure Subprocessors
Lockbox uses the following organisations to store/host Information or provide other infrastructure that assists with the delivery of our services. These are highly secure environments that are controlled by the Lockbox team and are protected by data processing agreements.
Entity: Amazon Web Services
Entity Country: United States
Purpose: Cloud Service Provider
Use: Customer Data, created by customer and stored in Applicable Cloud Products
Location of Processing: Sydney or London (customer choice)
Security Measures: AWS Compliance Programs
Service Specific Subprocessors
Lockbox works with other third-parties to provide specific functions or features within the Service. These providers may have access to relevant information to provide their relevant functions. The use of the information is limited to the specific purpose below:
Entity: Smartlook
Entity Country: United States
Purpose: Customer & Product Analytics
Use: Redacted session recordings of clicks, taps and text input for the purpose of debugging errors and issues.
Location of Processing: EU and North America
Security Measures: How Does Smartlook Protext User Privacy?