Security Policy
Our approach to protecting your financial data.
Table of contents
Jump to any section
1. Access controls
BookOS enforces role-based access, least-privilege principles, and multi-factor authentication for sensitive operations.
2. Encryption
Data is encrypted in transit using TLS and at rest using industry-standard mechanisms.
3. Monitoring
We monitor for anomalous access patterns, failed authentication attempts, and suspicious transactions.
4. Incident response
We maintain incident response procedures and notify customers of material incidents according to applicable law and contracts.
5. Secure development
We follow secure coding practices, conduct code reviews, and perform regular dependency and vulnerability monitoring.
6. Business continuity
We maintain backup and recovery procedures to protect availability and ensure data can be restored if needed.
7. Vulnerability reporting
We welcome responsible disclosure of security issues. Please contact support with details so we can investigate. We do not operate a public bug bounty program at this time.
Version history
Track changes over time
v1.0