cookstobooks.com

Security

Security and Data Confidentiality Policy

At Cookstobooks, we recognize that the financial information you entrust to us is among your most sensitive assets. Our commitment is to ensure the highest standard of security, integrity, and confidentiality for all your business data.

 

 

 

1. Data Storage and Protection

  • Encrypted Storage: All client financial data is stored on industry-leading cloud platforms utilizing Advanced Encryption Standard (AES) both during transit and at rest.

  • Access Control: Access to our servers and databases is strictly limited to authorized personnel and requires Two-Factor Authentication (2FA) and strong, regularly updated passwords.

  • Regular Backups: We maintain regular, encrypted backups of all client data to ensure rapid recovery and business continuity in the event of any unforeseen incident.

2. Software and System Security

  • Secure Software Usage: We exclusively use recognized, secure, and reputable accounting software (e.g., QuickBooks Online, Xero) which adhere to global data security standards.

  • Regular Updates: All our operating systems, applications, and security software are updated promptly to patch vulnerabilities and maintain robust protection against emerging threats.

  • Anti-Malware: All company devices are protected by enterprise-grade anti-virus and anti-malware solutions, regularly monitored for suspicious activity.

3. Personnel and Internal Controls

  • Confidentiality Agreements: Every Cookstobooks team member is required to sign and strictly adhere to a comprehensive Non-Disclosure and Confidentiality Agreement (NDA) upon hiring.

  • Security Training: Our staff undergoes mandatory, recurring training on best practices for data handling, phishing awareness, and compliance with data privacy regulations.

  • “Need-to-Know” Principle: Access to client financial files is granted only on a “need-to-know” basis, ensuring that only the specific team members working on your account can view your data.

4. Client Communication and Document Sharing

  • Secure Client Portal: We utilize a dedicated, encrypted client portal (or secure file exchange service) as the primary method for clients to upload and download sensitive documents. We strongly discourage sharing sensitive data via regular, unencrypted email.

  • Identity Verification: We follow strict protocols for verifying the identity of any individual requesting access to or information about your account.

5. Incident Response

In the extremely rare event of a data breach or security incident:

  • We have a detailed Incident Response Plan in place.

  • We will immediately notify the affected clients and relevant authorities (if required by law).

  • We will take immediate steps to contain the breach, investigate the cause, and restore full security, providing a detailed report of the actions taken.

Name
No, thank you. I do not want.
100% secure your website.
Powered by
Name
No, thank you. I do not want.
100% secure your website.
Powered by