FOLIO — SECURITY ARCHITECTURE, ENCRYPTION, COMPLIANCE

Security is structural.

Not procedural.

Zero data custody is not a policy. It is the architecture. Raw financial data is processed in transient memory and is never persisted — reducing the data-exposure surface relative to traditional FP&A platforms that ingest and store full ledger copies.

For enterprise due diligence · III May MMXXVI

SECTION ISecurity Overview

FinHelm Corp builds Probabilistic Finance™ products on a zero data custody architecture: raw financial data from connected ERP systems is processed in transient memory and is never persisted to FinHelm’s servers. Only computed analysis outputs and minimal audit metadata are retained. This architecture materially reduces the data-exposure surface relative to traditional FP&A platforms that ingest and store full ledger copies.

FIG. I.a · The custody doctrine is structural, not procedural. Data we never have, we cannot lose.

SECTION IIArchitecture

SECTION IIIAuthentication

SECTION IVData Encryption

SECTION VAccess Control

SECTION VICompliance Posture

FIG. VI.a · FinHelm makes no representations regarding compliance certifications it has not earned. Aspirational items above are explicitly marked.

SECTION VIISub-Processors

Sub-processor Purpose Data
Amazon Web ServicesInfrastructure, identity, key managementEncrypted application data and tokens
Anthropic, PBC(a) Claude.ai as MCP client; (b) Claude models accessed server-side via AWS BedrockTool calls and summarized financial context
Intuit Inc.QuickBooks Online ERP integrationOAuth tokens and customer-authorized financial data
DualEntryERP integrationOAuth tokens and customer-authorized financial data
RilletERP integrationOAuth tokens and customer-authorized financial data
StripePayment processingPayment instrument data (handled entirely by Stripe)
PostHogProduct analyticsAnonymized usage events
VercelFrontend hostingStandard web logs

FIG. VII.a · The canonical sub-processor list is maintained at finhelm.ai/privacy/.

SECTION VIIIData Residency

SECTION IXBreach Notification

In the event of a confirmed security incident affecting customer data, FinHelm will notify affected customers without undue delay and in any case within seventy-two (72) hours of confirmation, consistent with prevailing standards under GDPR and U.S. state breach-notification laws. Notification will identify, to the extent then known, the nature of the incident, the data affected, mitigation steps taken, and a point of contact.

SECTION XCustomer Rights

SECTION XIContact

FinHelm Corp · finhelm.ai

Probabilistic Finance™ · Always On Course.

FOLIO — INVITATION · ENTERPRISE DUE DILIGENCE

Bring your security checklist.

Vendor questionnaires, SOC 2 readiness updates, infrastructure deep-dives. We will answer the questions your CISO is paid to ask.