Safe Harbor

Our Security + Privacy Policies

At Tied Out Books, protecting your financial information is one of our highest priorities. Bookkeeping requires trust, and we believe that trust must be earned through transparent processes, secure technology, and consistent professionalism. Our security practices are designed to safeguard sensitive data at every point—from how you share documents with us to how we store and access them internally.

How We Keep Your Information Safe

Secure Platforms With Built-In Industry Standards

We rely on reputable, industry-leading software platforms that meet or exceed modern security standards. These systems are designed specifically to safeguard financial data and ensure privacy, giving our clients confidence that their information is handled with care.

Password Protection with 1Password

All credentials used by our team are stored exclusively in 1Password, a highly secure, encrypted password manager. 1Password uses end-to-end encryption, meaning only authorized team members can access the vault. They use AES-GCM-256 authenticated encryption, making it essentially impossible to decrypt even with cracking software. Read more here.

Company-Wide VPN

Tied Out Books maintains a company-wide Bitdefender Virtual Private Network (VPN) that all team members — local and remote — use when accessing client information. Bitdefender’s VPN runs on AES-256 encryption protocol with no traffic data logging. Read more here.

Controlled Access and Internal Protocols

We limit internal access on a need-to-know basis. Only authorized team members can access specific client files, software accounts, and shared documents. Our internal procedures include: Role-based access controls, prohibition of local storage of client files, and secure document-sharing portals.

These steps ensure your information stays protected at every stage.

Your Data, Your Control

We never sell, share, or disclose your information to third parties unless expressly required by law or necessary to perform bookkeeping services at your request. You retain ownership over your documents and data at all times, and you may request copies or removal at any time.

Questions About Security?

We believe transparency builds confidence. If you ever have questions about how your data is stored, who can access it, or how any of our systems operate, we’re happy to talk through the details.