How We Keep Your Data Safe

At COUNT, protecting your information is our top priority. We lock your data with strong encryption, keep it on secure servers with around-the-clock guards and surveillance, and store extra copies in different locations so it’s never lost. Bank and card connections are view-only, we can see transactions but can’t move your money. Bottom line: your data stays safe, always available, and completely under your control.

Security

We employ multiple layers of security measures and policies to protect your information during collection, use, and disclosure on our servers.

Reliability

Robust infrastructure ensures your financial data is always available and accessible, providing seamless, uninterrupted service whenever you need it.

Privacy

Your data is yours to control. We’re dedicated to ensuring you decide who can access specific information and when. We never share or sell your data to third parties.

Data Security

Read-Only Integrations

Our data integrations (e.g. live connection with banks and credit cards) are “read-only,” meaning we do not, will not, or cannot change any of your banking or financial data.

Secure Sockets Layer (SSL)

All information traveling between your browser and COUNT is protected from eavesdroppers with 256-bit SSL encryption. The lock icon in your browser lets you verify that you aren’t talking to a phishing site impersonating COUNT and that your data is secure in transit.

Firewalls

The COUNT platform and your accounting data rest securely behind Microsoft Azure Web Application Firewalls. This protects from common web-hacking techniques such as SQL injection and security vulnerabilities like cross-site scripting.

Secure Data Storage

Your accounting data is stored on servers that have strict physical access and technical controls. They are located in state-of-the-art data centers, which provide biometric access controls, constant surveillance, redundant power feeds, and generators, robust fire suppression, and carefully monitored climate control to protect the servers that store your data and manage your billing. Learn more.

PCI Compliance and Card Holder Data

Cardholder data should only be input by the user in areas that explicitly require it. COUNT handles cardholder data in accordance with PCI Data Security Standard requirements. Where cardholder data storage is required (i.e. automatic payments on recurring invoices) COUNT leverages PCI DSS Level 1 Compliant partners who undergo an annual audit of its infrastructure. Learn more.

Keep Sensitive Data Out of LLMs

We automatically identify and redact sensitive information and intellectual property during Large Language Model (LLM) data collection, training, fine-tuning, and inference.

Reliability

Redundant Servers and Data Centers

The COUNT infrastructure uses redundant storage and servers to keep the application and your data available in the case of hardware failure – and another set of servers and storage in a geographically separate data center in case our primary data center is made unavailable by a disaster or other disruption.

Managed Hosting

The COUNT platform utilizes Microsoft Azure for hosting requirements. With a vast array of clients with varying needs, Azure provides an environment that allows for the fast delivery of features, continued product innovation, reliable security, stability, and a reduced chance of downtime.

Backups

The data in your COUNT profile is replicated across multiple database servers in two geographic locations to prevent a single failure from causing data loss. Additionally, that data is backed up nightly to tape and stored in a secure offsite location to ensure that, even in the event of a catastrophe like a tornado or a flood, your information will be safe and your records can be quickly restored.

Privacy

Access

We safeguard the information you share with us with some of the industry’s best practices. The innovative technology we use helps stop fraudsters in their tracks and ensures only you can access your data on COUNT.

Privacy Policy

COUNT has a strict privacy policy that all users, employees, and partners must adhere to.