Your Financial Data Security is Our Top Priority
At ReconcileIQ, we understand the sensitivity of financial data. We've built our platform with robust security measures at every level to ensure your information is handled with the utmost care and confidentiality.
Our Security Commitment
End-to-End Encryption
Your financial data (CSV/Excel files) is encrypted directly in your browser using strong AES-GCM 256-bit encryption before it's uploaded. Data remains encrypted during transit (via HTTPS/TLS) and is only decrypted momentarily on our secure servers for processing.
Minimal Data Footprint
We do not store your raw financial transaction data long-term. Files are processed securely and then immediately and permanently deleted from our systems after the reconciliation results are generated and made available to you.
Secure Authentication
User accounts are protected with industry-standard bcrypt password hashing. We enforce strong password policies and utilize secure JWT (JSON Web Tokens) for session management. Email verification is required for account activation.
Secure Infrastructure
ReconcileIQ runs on secure cloud infrastructure employing firewalls, intrusion detection systems, and regular security patching. We leverage services like Cloudflare for enhanced protection against DDoS attacks and web application vulnerabilities.
Compliance Focused
We are committed to data privacy regulations. Our data handling practices are designed with GDPR principles in mind, focusing on data minimization, purpose limitation, and user control. See our Privacy Policy for details.
Secure Payments
All subscription payments are processed securely through PayPal's trusted platform. ReconcileIQ does not store your full credit card numbers or sensitive payment details on our servers.
Our Ongoing Commitment
Security is not a one-time setup; it's an ongoing process. We are dedicated to maintaining and improving our security posture through:
- Regular Security Audits: Periodically reviewing our infrastructure and code for potential vulnerabilities.
- Secure Development Practices: Implementing secure coding standards and conducting code reviews.
- Dependency Monitoring: Keeping our software libraries and dependencies up-to-date and patched.
- Access Control: Limiting internal access to sensitive systems on a need-to-know basis.
- Transparency: Being open about our security practices and policies.
We validate uploaded files for basic structure and potential malicious content, rejecting files that don't meet expected formats or exceed size limits to protect our systems and users.
Reporting Security Vulnerabilities
If you believe you have discovered a security vulnerability in ReconcileIQ, we encourage you to report it to us responsibly. Please email the details to:
We appreciate the efforts of security researchers in helping keep our platform safe.
Reconcile with Confidence
Focus on saving time and ensuring accuracy, knowing your data is handled securely.