Our Use of Third Parties

By policy, Guru does not allow the addition of subprocessors/third parties without a thorough risk assessment and contractual assurance that data privacy laws and security controls will be met.  Key security elements required by contract include access control, encryption, data management/deletion and a mature body of controls governing all of the organization's security activities.