Prevention (our model)
At Level 0, we map the full corporate ownership structure of every vendor — not just the contracting entity, but all subsidiaries, parent companies, and their jurisdictions. At Level 2, data processing addenda restrict all processing to the specific legal entity and jurisdiction named in the contract.
Detection (our observability)
A quarterly vendor corporate structure review flags new subsidiary registrations or acquisitions in Five Eyes jurisdictions. At Level 2, locally held HSM encryption keys mean that even if a subsidiary is compelled by court order, the data it can produce is cryptographically inaccessible.