Illustration of a lock

Security

We take privacy and data security seriously. That’s why we’re committed to protecting your information using the highest standards of security available. Working with Bench gives you peace of mind.


Accounting information transferred to bank

Customer Data Protection

As a SOC 2 compliant business, Bench's security systems ensure protection, availability, processing integrity, confidentiality, and privacy of all our customer data.

Icon of an bookkeeper

Employee background checks

Every Bench employee goes through a rigorous screening process, including multiple interviews and a criminal record check.

Icon of a small business

Entirely in-house

We're based in North America and all bookkeeping is done in-house. We don't outsource your bookkeeping.

Meeting or exceeding industry standards

Bench undergoes annual SOC 2 and SOC 3 examinations of our security controls against the AICPA defined standards.

Auditing is conducted by a third party audit firm to assure security of our platform and its supporting infrastructure. Fill out this form to download our most recent SOC 3 report.

Bench and Plaid: The safest way to share your financial information and automate the exchange of information

Connect your accounts with peace of mind We use Plaid, which lets you securely connect your financial accounts to Bench in seconds. This feature saves you the time and effort of manually uploading documents.

Feel secure about your financials Both Bench and Plaid are SOC-2 compliant with security practices that meet or exceed industry standards. Plaid keeps your data safe and private with best-in-class encryption protocols like the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS).

Always maintaining the safety and integrity of your financial data

Bench upholds appropriate security safeguards designed to protect your information from loss, misuse, and unauthorized access or disclosure, and to ensure its confidentiality, integrity and availability. Our security program accounts for both the sensitivity of the information we process and the current state of technology.

Compliance Certifications
Written Information Security Program
Personnel Practices
Confidentiality and Access Controls
Data Encryption
System Availability & Network Protection
Logging and Monitoring
Product Security & Privacy by Design
Service Provider Relationships

View our privacy policy for more in-depth information about how we handle our clients' data

View privacy policy