Last updated: April 23, 2026
Shortlist is built for teams evaluating high-stakes software decisions. The rigor we apply to scoring vendors is the same rigor we apply to protecting the data you bring into the platform. This page summarizes our security posture, subprocessors, and how to request documentation for your review.
Shortlist runs on encrypted, access-controlled infrastructure with security hardening applied at the network, application, and database layers. Highlights:
Shortlist is a pre-commercial-launch platform as of April 2026. Our compliance posture is transparent and iteratively hardening:
If your procurement process requires a specific certification we don't yet carry, email hello@tryshortlist.app with your requirement and timeline and we'll share our current posture and roadmap in detail.
Customer data is processed and stored in the United States (AWS us-east-1). This covers the primary Postgres database (Supabase, us-east-1), edge compute (Vercel, iad1 / us-east-1), and background job queues (Upstash, us-east-1).
EU-resident data residency is on our roadmap. If this is a hard requirement for your procurement, please contact us before trialing Shortlist.
Shortlist uses the following third-party subprocessors to deliver the platform. All subprocessors are reviewed for security posture, and data shared with each is limited to the minimum required to operate the platform.
| Subprocessor | Purpose | Data region |
|---|---|---|
| Supabase | Primary database, auth, storage | US (us-east-1) |
| Vercel | Edge hosting, serverless functions | US (iad1) |
| Anthropic | AI model inference (Claude) | US |
| OpenAI | AI model inference (embeddings, fallback) | US |
| Upstash | Rate limiting, cache, queues (Redis) | US (us-east-1) |
| Sentry | Application error monitoring | US |
| Stripe | Billing and payments | US |
| Resend | Transactional email delivery | US |
| Cloudflare | DNS, edge network, browser rendering | Global edge |
| GitHub | Source control and CI/CD pipelines | US |
| Tavily | Vendor enrichment search API | US |
| Apify | Vendor enrichment web data | US |
| BuiltWith | Vendor technographics | US |
| Perplexity | Vendor enrichment search | US |
| LIX | Vendor enrichment intelligence | US |
Material changes to this subprocessor list (additions, removals, regional changes) will be announced via email to account owners at least 30 days before taking effect, unless an urgent security or availability reason requires a faster change.
A Data Processing Agreement is available on request for all paid plans and for enterprise evaluations. To request a DPA, email hello@tryshortlist.app with your legal-entity name, jurisdiction, and any required addenda (e.g., SCCs for EU transfers). We aim to turn around DPAs within 3 business days.
If you believe you've found a security vulnerability in Shortlist, please report it responsibly to security@tryshortlist.app. Please include reproduction steps, the affected endpoint, and your contact information. Our target response targets:
We do not operate a paid bug bounty program at this time. Please do not conduct destructive testing, access other customers' data, or exfiltrate data.
Customer data is retained for the active life of your account plus 30 days to support account recovery. You can request full deletion at any time by emailing hello@tryshortlist.app. Backups are rotated on a rolling 30-day window.
Requests for data access, portability, or rectification can be sent to the same address. Our target turnaround is 30 days, consistent with GDPR Article 12.
In the event of a confirmed data breach that affects your organization's data, we will notify affected account owners within 72 hours of confirmation — consistent with GDPR Article 33/34 obligations. Notice will describe the nature of the breach, the data involved, the likely consequences, and the remediation steps we have taken or will take.
General security questions: security@tryshortlist.app
Privacy and data-handling questions: hello@tryshortlist.app
Related: Privacy Policy · Terms of Service