Trust Center


We are stewards of our customers’ data and do not take lightly the responsibility to keep that data safe. Our products are built with security in mind from day one and undergo ongoing reviews and testing to make sure we keep our customers’ data safe and secure.

Secure Development

Security is considered with every development effort. All developers are encouraged to learn about secure coding and practice principles of zero trust and least privilege when making architecture decisions.

1. We review our code for security vulnerabilities
2. We systematically update dependencies. When a systematic update is not possible, we manually update dependencies.
3. We use Static Application Security Testing (SAST) to detect basic security vulnerabilities in our codebase.

Data Encryption

Your data is always encrypted via industry best-practices using Transport Layer Security (TLS) at rest and in transit. Please view our SSLLabs reports here:

Audit Trails

All interactions with our applications are audited and logged. Logs are immutable and are never modified. Developers do not have access to production logs.


It is imperative you control who can do what in your system. We built access controls best practices into our products. You have granular control over your data via team permissions and access settings.


We believe that you own your data, and we are committed to providing you complete control over that data. Our SOPs clearly state how we protect your identity and your data. To report an issue with privacy, please read our Responsible Disclosure section. Please read our privacy policy here.

Data Retentions,
Deletion & Destruction

Upon a written request, we will provide you with all your data and will expunge your data from our systems. Data deemed to be owned by multiple parties will be deleted once all parties provide a written request to delete such data. We backup your data and validate those backups as per our SOPs.


We do not store payment information. All electronic payments are processed through our payment provider, QuickBooks. is PCI compliant for payment processing.


Our strict, systematically enforced standard operating procedures prevent all employees, contractors, and administrators from gaining customer data access. AS per our SOPs, limited exceptions are made for specific individuals and customer support.

All employees must undergo a background check, sign a non-disclosure
and confidentiality agreement when joining. We have a BAA in place with third parties.


21 CFR Part 11 and Annex 11

Our products are validated, part 11 compliant with granular access controls and audit history. All data is stored in encrypted, redundant, high availability storage accessible to only authorized personnel.

ISO, HIPAA, and GDPR utilizes cloud services provided by AWS. Data never leaves AWS unless directed in writing by the customer. By exclusively utilizing AWS, ensures compliance with all standards listed above. The complete list of standards with which AWS complies are listed here:

Please read our privacy policy for details of how we comply.

Bug Bounty Program

We take cybersecurity very seriously and will reward anyone who finds vulnerabilities in our products and services while complying with our policies and terms of service. We encourage everyone who takes responsible disclosure seriously to participate in our bug bounty program. Please avoid automated testing. If you are a customer, please only perform security testing in your UAT and production accounts. Please do not disclose the vulnerabilities until we fix it. Rewards are done at our discretion and depend on the criticality of the vulnerability.

Please report vulnerabilities by contacting us via Contact Us page and include a note saying you are reaching out regarding our responsible disclosure program. Please be prepared to submit any applicable information, including a proof of concept. We are grateful for your time and will respond as quickly as possible. We will not take legal action if you follow our rules below.

  1. Let us know as soon as possible upon discovering a potential security issue. We will make every effort to resolve the issue quickly.
  2. Please provide us a reasonable amount of time to resolve the issue before disclosing externally.
  3. Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with the explicit permission of the account holder.

Please include in your report:

  1. Steps we should follow to reproduce the vulnerability and proof of concept.
  2. Any evidence of a successful attack, e.g., a print-screen of exploited screen or system.
  3. Explanation of how someone could carry out the attack in the wild.

Rules for us:

  1. Reply as quickly as possible to your submission and keep you updated.
  2. Not take legal action against you if you play by the rules.
  3. Reward you with a fair bounty.

Accepted vulnerabilities:

  1. Cross-Site Scripting (XSS)
  2. Open redirect
  3. Cross-site Request Forgery (CSRF)
  4. Command/File/URL inclusion
  5. Any authentication issues.
  6. Code execution or SQL injections
  7. Open ports that should be closed per security best practices.
  8. Account hopping 




This bug bounty program does NOT include:

  1. Publicly accessible login panels – unless you were able to use such a panel to gain access
  2. Reports that state that software is out of date/vulnerable without a proof of concept
  3. Host header issues without an accompanying proof-of-concept demonstrating vulnerability
  4. XSS issues that affect only outdated browsers
  5. Stack traces that disclose information
  6. Deviations from best practices – unless you can demonstrate how someone might exploit our indiscretion
  7. Academic scenarios without proof of concept of how a bad actor can exploit such a scenario
  8. Vulnerabilities as reported by automated tools without explaining how the vulnerability can be exploited
  9. Reports from automated web vulnerability scanners without proof of concept
  10. Denial of Service Attacks
  11. Reflected File Download (RFD)
  12. Physical or social engineering attempts or issues requiring physical access to a victim’s computer, or user-interaction.
  13. Missing cookie flags on non-security-sensitive cookies.
  14. Missing security headers that do not present an immediate security vulnerability.
  15. SSL/TLS scan reports
  16. Bugs that don’t affect the latest version of browsers.
  17. Disclosure of public information and information that does not present significant risk.
  18. Bugs that have already been submitted by another user, that we are already aware of, or that have been classified as ineligible.
  19. If determines the vulnerability presents an acceptable amount of risk.
  20. Things you should expect to receive little to no bounty for
  21. Most brute-forcing issues

Please contact us via Contact Us page if you have questions.