Your Data Security is Our Top Priority
We understand that your business data is sensitive. That’s why we’ve built ClippingCash with security and privacy at every layer. Your customers’ information, payment details, and business data are protected with the same standards used by banks.
Enterprise-Grade Security
Data Encryption
All of your data is protected with industry-leading encryption:
- In Transit: TLS 1.2+ encryption for all data traveling to/from our servers
- At Rest: AES-256 encryption for all data stored in our databases
- End-to-End: Sensitive data like payment information is encrypted end-to-end
- Zero-Knowledge: We cannot access your data—only you can
Translation: Even if someone intercepted your data, they couldn’t read it without the encryption keys (which only you have).
Secure Infrastructure
Our servers run on trusted cloud infrastructure with multiple layers of protection:
- AWS/Google Cloud: Hosted on secure, redundant infrastructure
- Automatic Backups: Your data is backed up multiple times daily to geographically distributed data centers
- DDoS Protection: Protected against distributed denial-of-service attacks
- Firewall Protection: Multiple firewalls prevent unauthorized access
- Intrusion Detection: Real-time monitoring alerts us to suspicious activity
- 99.9% Uptime SLA: Guaranteed availability with automatic failover
Regular Security Audits
We take security seriously and prove it through continuous testing:
- Penetration Testing: Regular external security experts attempt to break into our systems
- Vulnerability Scanning: Automated tools scan for potential security issues
- Code Reviews: All code changes are reviewed by security experts
- Dependency Monitoring: We monitor for vulnerabilities in software dependencies
- Third-Party Audits: Annual audits by independent security firms
Compliance & Certifications
Payment Card Industry (PCI) Compliance
ClippingCash is PCI DSS Level 1 Compliant, meeting the highest standards for handling payment card data:
- We never store full credit card numbers—payment processors handle all sensitive data
- Payment data is encrypted and isolated from other systems
- Regular PCI compliance audits verify our systems
What This Means: You can accept credit card payments with confidence that customer payment information is secure.
Data Protection Regulations
We comply with major international data protection laws:
- GDPR (EU): Full compliance with European data protection regulations
- CCPA (California): Comply with California’s consumer privacy law
- HIPAA (Healthcare): Healthcare-grade privacy controls (when applicable)
- SOC 2 Type II: Our infrastructure is audited and compliant
Certifications
- ISO 27001: Information Security Management System certified
- SOC 2 Type II: System and Organization Controls compliance
- GDPR Compliant: Data protection regulations compliance
- PCI DSS Level 1: Payment Card Industry Data Security Standard
Privacy & Your Data
Data Ownership
Your data is yours.
- You own all data you upload to ClippingCash
- You can export your data anytime in standard formats
- You can request deletion of your data at any time
- We don’t sell your data to third parties
- We don’t use your data for marketing without permission
Privacy Policy Highlights
- We only collect data necessary to provide our service
- We use cookies only for session management and analytics
- Third-party integrations (like payment processors) follow their own privacy policies
- We disclose data to law enforcement only when legally required
- We don’t track your activity across the web
Data Retention
- Active accounts: Data is stored as long as your account is active
- Deleted accounts: Data is deleted within 30 days of account deletion request
- Backups: Backup copies are retained for 90 days for disaster recovery
- Logs: Security and access logs are retained for 1 year
Access Control & Permissions
Role-Based Access Control
Control exactly what each team member can see and do:
- Owner: Full access to all features and settings
- Manager: Can manage customers, jobs, team members, and view reports
- Accountant: Can view financial reports and manage invoices
- Crew Member: Can view assigned jobs and update job status
- Custom Roles: Create custom permissions for specific needs
Two-Factor Authentication (2FA)
Add an extra layer of security to your account:
- Requires a second verification method (phone, authenticator app)
- Prevents unauthorized access even if password is compromised
- Available for all account types
- Optional but recommended
Activity Logs
Complete audit trail of all account activity:
- See who logged in, when, and from where
- Track all data modifications and who made them
- Export audit logs for compliance purposes
- Alerts for suspicious activity
Disaster Recovery & Business Continuity
Automatic Backups
Your data is automatically backed up continuously:
- Frequency: Multiple backups per day
- Geographic Distribution: Backups stored in multiple regions
- Encryption: All backups are encrypted
- Testing: Backups are regularly tested for recoverability
Disaster Recovery Plan
We have a comprehensive plan to ensure your data is available:
- Recovery Time Objective: Data can be restored within 1 hour
- Recovery Point Objective: Data loss is limited to less than 5 minutes
- Redundant Systems: Critical systems run on redundant infrastructure
- Failover: Automatic failover to backup systems
- Regular Testing: Disaster recovery plan is tested quarterly
Business Continuity
ClippingCash is designed to keep operating even during adverse events:
- Geographically Distributed: Servers in multiple regions
- Load Balancing: Traffic automatically routed around failures
- Monitoring: 24/7 monitoring detects and responds to issues
- On-Call Team: Security and infrastructure teams available 24/7
Support for Security Concerns
If you discover a security vulnerability, please report it responsibly:
- Email: security@clippingcash.com
- Response Time: We’ll acknowledge your report within 24 hours
- Bug Bounty: We may offer compensation for valid vulnerability reports
- Confidentiality: We keep researcher identity confidential
Trust Metrics
5+
Years Protecting Data
8+
Security Certifications
100%
Customer Data Protected