Security & Compliance
Last updated: March 2026
We take practical steps to protect Korekko, customer data, and connected account data.
1. Transport security
Korekko is intended to be accessed over HTTPS to protect data in transit between users and the service.
2. Access controls
We limit access to data to authorized personnel and systems that need it to operate, maintain, or support the service.
3. Infrastructure
Korekko may rely on third-party infrastructure and software providers for hosting, storage, authentication, communications, analytics, and related product operations.
4. Incident reporting
If you believe you have found a security issue, contact team@korekko.com with relevant details so we can investigate.
5. Responsible disclosure
We appreciate responsible disclosure of good-faith security findings. Please do not exploit vulnerabilities, access data without authorization, or disrupt service availability.