Sub-Processors

Third-party services we use to process data and provide our Prayer Times Bot service

Prayer Times Bot uses several trusted third-party services (sub-processors) to help us deliver our prayer time notification service. We carefully select our partners and ensure they maintain high standards for security and data protection.

This page provides transparency about which sub-processors we use, what data they handle, and how we ensure your data remains protected.

Infrastructure and Hosting

Render United States
Purpose: Application hosting and deployment
Data Processed: Application files, environment variables, logs
Data Protection: Render implements industry-standard security measures including SSL/TLS encryption and secure environment variable storage
MongoDB Atlas United States
Purpose: Database hosting and management
Data Processed: User preferences, app settings, authentication tokens
Data Protection: MongoDB Atlas provides encryption at rest and in transit, network isolation, and complies with SOC 2, HIPAA, and GDPR requirements

Prayer Times Data Providers

Aladhan Prayer Times API Global CDN
Purpose: Provides accurate prayer times calculations based on location
Data Processed: Location data (city/country) for prayer time calculations
Data Protection: Location data is not stored persistently after calculations

Monitoring and Error Tracking

UptimeRobot Germany
Purpose: Service uptime monitoring and alerts
Data Processed: API endpoint availability, response times, status codes
Data Protection: UptimeRobot complies with GDPR and implements secure data handling practices

Usage Analytics

Internal Analytics United States
Purpose: Service usage statistics and performance monitoring
Data Processed: Command usage frequency, feature adoption rates, error rates
Data Protection: All analytics data is anonymized and stored securely in our MongoDB database

Data Protection Measures for Sub-Processors

  • We only share the minimum data necessary for the sub-processor to perform its function
  • We have reviewed the privacy policies and security practices of each sub-processor
  • We regularly audit and review our use of sub-processors
  • We do not permit our sub-processors to use the data for any purpose other than providing services to our application
  • All sub-processors are contractually obligated to maintain appropriate security measures to protect user data
  • We select sub-processors that are compliant with relevant data protection regulations

Updates to Our Sub-Processors

If we add or change sub-processors that handle user data, we will update this list and notify users as appropriate.

Last Updated: August 26, 2025