Privacy & Data Handling

Accounting Bridge is built for finance teams handling confidential data. This page explains exactly what happens with your data at every stage.

File processing

All uploaded files (CSV, Excel, PDF, OFX) are processed entirely in server memory. No file content is written to disk, stored in any database, or transmitted to third parties. Files exist only for the duration of your active session and are discarded when the session ends.

What we store

We store only your client configuration: column mappings, account rename rules, currency settings, and period-over-period summaries (aggregated account totals, not row-level data). This allows returning users to skip setup and track trends across periods. No source file content, no individual transactions, no personally identifiable financial records.

Data isolation

Each authenticated user's data is isolated at the database level using row-level security (RLS) policies. Your client profiles, period summaries, and notes are accessible only to your account. Other users cannot query, view, or modify your data. Unauthenticated visitors see only the demo dataset.

Infrastructure

AI-generated summaries

When enabled, a narrative summary is generated using Anthropic's Claude API. Only aggregated totals (revenue, expense counts, entity names) are sent - never row-level data or source files. You can disable AI features per-session from the results view. The consolidation engine itself is fully deterministic - no AI touches the data pipeline.

Data retention and deletion

You can delete any client profile and its associated period data at any time from within the application. Deletion is immediate and permanent. To request complete account deletion, including authentication records, email wietze.suijker@gmail.com.

Compliance

SOC 2 Type II certification is on our roadmap. Current controls include: row-level security, encryption at rest and in transit, audit logging of all data operations, and no persistent storage of source files. We are happy to complete vendor security questionnaires on request.