The Computershare company which provides services to you uses other Computershare companies and third-party companies to process personal information in support of some of the services provided. Such third parties are known as sub-processors. We ensure that we have robust contractual safeguards in place and if personal information is transferred between geographic regions, we ensure that appropriate transfer safeguards are implemented.

This website lists the particular sub-processors we have engaged, by region and by service provided. We also provide information on how Computershare’s selection process evaluates the security, privacy and confidentiality practices of a sub-processor regarding the handling of your personal information.

Please note that only the lists of sub-processors form part of your service agreement with the relevant Computershare company.

A sub-processor is a company that has access to and processes personal information to support the provision of services as directed by a client. Companies that have no access to personal information are not sub-processors.

When contracting with sub-processors we agree contractual clauses that are aligned with the requirements of applicable legislation and client contractual obligations. Requirements include:

  • Check circle iconSub-processors process personal information based on Computershare’s instructions. 
  • Check circle iconSub-processors inform us about any personal data breaches impacting personal information shared with them.
  • Check circle iconSub-processors implement and maintain appropriate technical and organisational measures to safeguard personal data.
  • Check circle iconSub-processors cooperate with Computershare to deal with requests from data controllers, data subjects or applicable data protection/supervisory authorities.
  • Check circle iconSub-processors use personnel who are reliable and subject to a binding obligation to observe data secrecy and privacy, pursuant to the applicable privacy regulation/legislation.
  • Check circle iconComputershare remains responsible for any acts or omissions of its sub-processors in the same manner as for its own acts and omissions.

Computershare undertakes to have a selection process by which we evaluate the security, privacy and confidentiality practices of a sub-processor regarding personal information handling:

  • Check circle iconConduct appropriate vendor due diligence
  • Check circle iconEnsure appropriate contractual arrangements are in place
  • Check circle iconCarefully monitor performance, and
  • Check circle iconEnforce adherence to high information security standards that provide adequate protection for that personal information.

Third-party hosted systems are computing services (e.g. servers, storage, databases, networking, software, analytics, and intelligence) that are delivered over the internet to offer faster innovation, flexible resources, and economies of scale.​

There are many benefits of using third-party hosted systems/software, and at Computershare we have found the following to be the most advantageous for us:

  1. Global scale: It enables us to scale elastically, to deliver the right amount of IT resources (e.g. storage and bandwidth), when they’re needed and from the right geographic location.​
  2. Productivity: It enables greater productivity, such as by removing time-consuming IT management tasks, so the team can focus on achieving more important business goals and our day-to-day operations across all our locations.​
  3. Performance: We have engaged third-party hosted system/software service providers, who regularly upgrade to the latest generation of fast and efficient computing hardware, with the added benefit of reduced network latency for applications and greater economies of scale.
  4. Reliability: It offers data backup and disaster recovery features, to help prevent data loss in the event of an emergency, such as hardware malfunction, malicious threats, or even simple user error.​
  5. Security: It can help to strengthen our security posture due to the depth and breadth of security features automatic maintenance and centralised management, including helping to protect your data and infrastructure from potential threats.
List of sub-processors

For any questions please contact your Computershare Relationship Manager or send an email to third-partyprocessing@computershare.co.uk. You can view our privacy policy at www.computershare.com/global/privacy.

Please provide the contact details where sub-processor notification emails should be sent.

Which countries and business lines would you like to receive updates for?
Select all that apply. Hold Command or Control to select multiple options.
Select all that apply. Hold Command or Control to select multiple options.
View our Privacy Notice for details on processing and storage of your data.
You can unsubscribe at any time.