Third-party services we use, and exactly what each one sees
PII Anomalyzer processes your documents entirely on your machine. None of the services listed below ever receive document content, detected entities, or analysis results. This page is a complete inventory of the vendors that touch any data related to your account or installation, plus the vendors that operate this marketing site.
Last updated: May 2026
Product subprocessors
The only vendor that handles data related to your PII Anomalyzer account. They never see the documents you process with the application.
| Subprocessor | Purpose | Data handled | Compliance |
|---|---|---|---|
| Lemon Squeezy United States | Payment processing, license issuance, and license validation. Merchant of record. | Your name, email, payment details, license key, and activation history. | SOC 2 Type II, PCI-DSS. |
Marketing site subprocessors
These vendors operate parts of this marketing site (piianomalyzer.ai). They never receive data the PII Anomalyzer application processes.
| Subprocessor | Purpose | Data handled | Compliance |
|---|---|---|---|
| Microsoft Azure United States | Static hosting for this marketing site (Azure Static Web Apps + Azure Front Door). | No customer data. Public marketing pages and installer downloads only. | SOC 2, ISO 27001, FedRAMP, and many others. |
| SendGrid (Twilio) United States | Delivers messages submitted through our contact form to our inbox. | Sender name, email, and message content (only if you submit the contact form). | SOC 2 Type II. |
| Google reCAPTCHA United States | Anti-spam protection on the contact form. | Browser signals, IP address, and behavioral data on the contact page only. | Governed by Google's published privacy and security policies. |
| Google Analytics United States | Aggregate visitor analytics for this marketing site. | Page views, session metadata, and IP-derived geo. Never document content; never anything the app touches. | Governed by Google's published privacy and security policies. |
Changes to this list
We will update this page before adding any new vendor that handles data related to your account. We do not introduce subprocessors that have access to the documents you process. That guarantee is structural: the application has no mechanism to transmit document content.
Related
- Security and verification : how to verify the offline claim yourself.
- Privacy Policy : what the application and this website do and do not collect.
- Contact us : compliance, procurement, or security questions.