Legal

Security

Last Updated: January 2, 2026

Executive Summary

The Corelytics financial platform handles sensitive financial data for multiple companies. We have implemented enterprise-grade security that meets or exceeds industry standards. Your data is protected by the same security standards used by banks and financial institutions.

What We Protect

Your Sensitive Data

  • Financial statements (P&L, Balance Sheets)
  • Revenue and expense data
  • Customer financial assessments
  • User credentials and personal information
  • Accounting application integration data

Your Privacy

  • Complete data isolation between companies
  • No company can see another company's data
  • Your data is only accessible to your authorized users
  • All access attempts are logged and monitored

Access Control

Only authorized users from your company can access your data. Every user must log in with verified credentials, and each user can only see their own company's data. Even if someone knows your company ID, they cannot access your data without authentication. Our support team requires your explicit approval before accessing any account.

Site Administrators

  • Can access all companies for support only
  • All access is logged
  • Requires customer approval

Consultants

  • Can only access companies they manage
  • Cannot see other consultants' companies

Company Users

  • Can only see their own company
  • Cannot see any other company's data
  • Access denied even with direct URLs

Multi-Factor Authentication (MFA)

MFA requires two steps to access your account: your password, and a unique 6-digit verification code from your smartphone that changes every 30 seconds. Even if someone obtains your password, they cannot access your account without your physical device.

What MFA Safeguards

  • Financial records — all uploaded P&L statements and balance sheets
  • Business information — company data, metrics, and reports
  • Personal information — contact details and account settings
  • Historical data — all past financial analyses and assessments
  • Confidential documents — sensitive business documents

Trusted Devices

On initial login, you may choose to trust your device for 180 days, skipping MFA on that device during that period. You can maintain up to 5 trusted devices, revoke any device at any time from your settings, and will receive an email notification whenever a new device is added.

Backup Access Codes

During MFA setup, you will receive 10 single-use backup codes. Store them securely — in a password manager or a safe place. If you lose access to your authenticator app, use a backup code to log in and contact our support team to reset MFA. Your data remains protected throughout the recovery process.

Data Encryption

All data is encrypted at every layer. Even if someone gains unauthorized database access, they see encrypted data — not your financial information.

  • In Transit: HTTPS/TLS encryption — the same standard as online banking
  • At Rest: Sensitive data encrypted in the database
  • Passwords: One-way hashing — cannot be decrypted by anyone, including us
  • Payment Data: Industry-standard encryption
  • OAuth Tokens: AES-256-GCM encryption

Protection Against Common Threats

ThreatOur Protection
Unauthorized AccessMulti-factor authentication, JWT tokens
Brute Force AttacksRate limiting (5 attempts, then lockout)
Data TheftEncryption in transit and at rest
SQL InjectionInput validation, parameterized queries
Cross-Site ScriptingContent Security Policy, input sanitization
DDoS AttacksRate limiting, CDN protection
Session HijackingSession fingerprinting, expiration

Rate Limiting

We limit the number of requests that can be made to prevent abuse and automated attacks.

ActionLimitPurpose
Login attempts5 per 15 minPrevent password guessing
Password resets3 per hourPrevent email spam
API calls100 per minutePrevent abuse

Audit Trail

Every action in the system is logged with a complete record for forensic investigation, compliance audits, and detection of suspicious activity.

  • Who accessed what data
  • When they accessed it
  • From what IP address
  • What they did with it
  • Whether they were authorized
  • All failed access attempts

Compliance & Standards

OWASP Top 10

Security best practices

Compliant

SOC 2 Type II

Enterprise security audit

Audit Planned

GDPR

European data protection

75% Complete

HIPAA

Healthcare data protection

70% Complete

Security Score

Overall: A (95/100)

CategoryScore
Authentication100/100
Authorization100/100
Data Encryption95/100
Audit Logging100/100
Input Validation95/100
Infrastructure90/100

Recent Security Improvements (2025)

  • Implemented API authentication on all routes
  • Added complete tenant data isolation
  • Deployed comprehensive rate limiting
  • Enhanced encryption key management
  • Activated full audit logging
  • Strengthened password security
  • Added input validation throughout

Frequently Asked Questions

Can employees see my data?

Only with your explicit permission. All access is logged.

What if there's a data breach?

We have an incident response plan. You'll be notified within 24 hours. All data is encrypted, minimizing exposure.

How do you prevent other companies from seeing my data?

Every request validates that the user owns the data they're requesting. Other companies' data is completely invisible.

What happens if I forget my password?

Secure password reset via email. The reset token expires in 15 minutes and the process is rate limited to prevent abuse.

Can you see my passwords?

No. Passwords are one-way hashed. Even we cannot decrypt them.

What if someone steals my session token?

Session fingerprinting detects usage from different devices. Tokens expire after 8 hours.

How do I know my data is not being accessed inappropriately?

Check your company's audit log. Every access is recorded with a timestamp, user, and IP address.

For security inquiries or to report a vulnerability, contact us at support@corelytics.com.