COMING SOON: In-app live chat support by 15th Oct for Business and Enterprise plan customers!
We understand how important and private your expense data is. So, Fyle ensures you have
total control over all of it, right from day 0 to when you bid goodbye to Fyle. (Hopefully never)
User authorizationWe facilitate the exchange of user authentication and authorization data across secure domains with Single Sign-on(SSO). Fyle uses SAML 2.0 to integrate with popular SSO services like Google, Facebook, Twitter, and LinkedIn.
Password encryptionAll passwords are salted and hashed using SHA-256 cryptographic function. This is a one-way function and the original password is never stored at Fyle. We also encourage the use of strong passwords with a mix of alphabets, numbers and special characters.
GDPR complianceFyle has been GDPR compliant as of May 25th, 2018. We do not store any sensitive and personal information of our EU clients outside of EU allowed regions. All third-party services that Fyle uses are also GDPR compliant.
IP access controlsAdmin users are privy to almost all of your sensitive data, which can be taken advantage of. Fyle protects against any potential data breaches or threats by restricting access based on their IP address.
Role-based accessEach user is allocated a unique role as soon as they are added into Fyle. Each of these roles have visibility only to data that pertains to them. For example, a travel agent will only be able to view travel bookings that are assigned to them.
Data retention and controlWe delete all our customers’ data 30 days after the termination of the contract. Our clients own their data and are free to take backups or export data in standardized formats (CSV,PNG, PDF,JPG) at any point of time.
Vulnerability testingWe routinely get our services checked by third-party vendors for any potential risks or susceptibilities every 6 months. They use industry standard Grey Box/Black Box testing and the results are shared on request.
Auditor roleOur auditor role allows you to keep your data safe during your auditing process. It allows read-only access to view the payments that are pending, in process or completed. This role can be disabled soon after auditing is done.