www.bill.com Open in urlscan Pro
2600:9000:2491:9400:10:f954:8f40:93a1  Public Scan

Submitted URL: https://sg.bill.com/ls/click?upn=0iGCdM-2FABTuHSGF2Z3try7DDTgtCMhneoNKg1SdvDPagYDudiV2hP8ekmk0dagDR86sx_kfIYSqKvuY4B...
Effective URL: https://www.bill.com/security
Submission: On July 21 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------


LoginSign Up

--------------------------------------------------------------------------------

Product
Solutions
Pricing
Partners
Resources
Company

--------------------------------------------------------------------------------

SupportLoginSign Up


SECURITY CENTER

You've worked hard to build your business.

We're committed to helping you protect it.

Our team works diligently to safeguard your Bill.com account with
industry-accepted best practices, including advanced security tools, training on
the latest policies and procedures, and continuous monitoring.





REPORT SUSPICIOUS ACTIVITY

Notice something fishy with your Bill.com account, or believe your information
has been compromised?

Let us know


REPORT PHISHING SCAMS

Receive a suspicious email from someone claiming to represent Bill.com?

 * Don't reply to it
 * Don't click on any links
 * Don't open any attachments

Forward the email immediately to phishreport@hq.bill.com


STAY ON GUARD

Bill.com is designed with your privacy and security in mind. We are committed to
keep your information safe—but we need your help, too.

Listed below in Bill.com Protections and Security Measures, you can find various
levels of controls we have in place to help guard your money and sensitive
information.

You can also read various best practices, tips, and resources to help keep your
account, data, and identity safe under Securing your accounts and transactions,
and Protecting your devices and email accounts.

Bill.com Protections and Security Measures

We're enhancing our security with you in mind.

APPLICATION PROTECTIONS

Bill.com helps protect against unauthorized access to your account by:

 * Enforcing a strong password policy
 * Applying 2-Factor Authentication
 * Sending login data over a secure channel
 * Automatically logging out customers after a period of inactivity
 * Educating our customers on the risks of business email compromise schemes
 * Enforce separation of duties with role-based access that lets you control who
   can enter, approve, and pay bills.
 * Automatically keep a record of all AP activity with a timestamped audit trail
   that cannot be altered, including original bills, review notes, approvals,
   payments, and remittance details for each transaction; then easily access
   that documentation for internal, vendor, and auditor inquiries.

PAYMENT PROTECTIONS

 * Reduce risks from check theft by paying vendors with digital payments or
   checks that are sent by Bill.com on your behalf, rather than keeping blank
   check stock on your premises and exposing your bank information on checks you
   send.
 * Bill.com applies Positive Pay to reduce the risk of check fraud; the bank
   matches the check issued with the check presented for payment.
 * Keep your bank account information private from vendors by making digital
   payments through the Bill.com account.

NETWORK PROTECTIONS

 * Bill.com uses security software, intrusion detection and prevention
   appliances, and network monitoring technology to detect and prevent
   unauthorized electronic access to our servers.

DATA PROTECTIONS

 * Bill.com applies an additional level of encryption to protect access to
   sensitive customer data from malicious applications.
 * We use Transport Layer Security (TLS) and industry standard cipher suites to
   protect customer data during transit over the internet.
 * Bill.com replicates production data from the primary site to the co-location
   facility for disaster recovery scenarios.

PHYSICAL PROTECTIONS

 * Bill.com servers and network infrastructure are hosted at secure data center
   facilities managed by leading certified data center providers.
 * All our employees undergo background checks and data security and privacy
   training.
 * We have a formal vendor management program to manage third-party risks.

COMPLIANCE PROTECTIONS

 * Bill.com undergoes an annual SOC 1 and SOC 2 Type II Audit by a leading
   national CPA Firm.
 * Bill.com partners with a PCI certified vendor for credit card payments.
 * We have adopted an Anti-Money Laundering (AML)/Office of Foreign Assets
   Control (OFAC) Program, which is designed to prevent the Bill.com Service
   from being used for purposes of money laundering, terrorist financing,
   violating or subverting OFAC sanctions, or for other illegal purposes.


Securing your accounts and transactions

BEST PRACTICES FOR ADMINISTRATORS/EMPLOYEES

 * Do not share passwords, PIN, security tokens or any other account
   credentials. That includes reusing the same credentials elsewhere or sharing
   them with another person. Keep them secure.
 * Always use strong and unique passwords that are not easily guessable. An 8
   characters or longer, random password that contains a combination of upper
   and lower case letters, numbers and symbols is much harder to break.
 * Review account transactions daily and reconcile frequently.
 * Avoid using public computers to access your account—even if additional
   security measures have been taken.
 * Practice security principles of least privilege and separation of duties.
   Bill.com provides granular, role based access control capabilities in the
   product. Use them to carefully grant and monitor access. Grant minimal access
   needed for employees to do the assigned job duties. Promptly remove the
   access when no longer needed. Assign different roles to different employees
   so that a single person alone can not compromise the transaction workflow.
 * Building a security culture where everyone understands their part in keeping
   an organization secure goes a long way. Train everyone in the company on best
   practices in information security, not just financial personnel. Identify
   regular opportunities to routinely discuss security best practices, such as
   staff meetings or other group check-ins.
 * Set up Multi-Factor Authentication to help further protect your account from
   unauthorized log-ins.


Protecting your devices and email accounts

BEST PRACTICES FOR ADMINISTRATORS

 * Install reputable anti-virus and anti-malware software and update it
   frequently. Most modern software updates automatically.
 * Keep operating systems, browser, and email patches up to date.
 * Keep your web browser software up to date by regularly installing the most
   recent version.
 * Use reputable network and desktop firewall solutions.
 * Require and monitor that users sign off their computer or employ a lock
   screen when not in use.
 * Consider disabling CD, DVD and USB drives on all computers where these drives
   are not needed.

BEST PRACTICES FOR ACCOUNTANTS/ EMPLOYEES

 * Do not click on links or attachments in an email that seem suspicious, and do
   not reply to it. Forward all suspicious emails directly to your IT and/or
   Risk team.
 * Be suspicious of requests for secrecy or pressure to take action quickly.
 * Watch for bogus email messages disguised to appear as authentic:
   * Fraudsters commonly spoof legitimate email domains with ones that look
     similar (e.g., name@busines.com or name@business.net instead of
     name@business.com).
   * Hover over an email address to ensure it isn’t being masked as something
     it’s not.

Other helpful resources
 * Protecting yourself against Business Email Compromise (BEC)
 * Common fraud schemes and how to avoid them
 * Report identity theft and get a recovery plan


RESPONSIBLE DISCLOSURE PROGRAM

We take security seriously at Bill.com and are deeply appreciative of the role
that security researchers play in improving the security posture of our product
and platform.

We partner with BugCrowd to facilitate responsible disclosure of any security
issues impacting Bill.com services. Please send us a summary email if you
believe you have discovered a security vulnerability that you would like to
report to us.

PRODUCT

Accounts PayableAccounts ReceivableCredit & Expense Management

PAYMENTS

ACHInternational PaymentsPay By CardNetwork Payments

PRICING

For BusinessesFor Accounting Firms

INTEGRATIONS AND SYNC

QuickBooksSage IntacctOracle NetSuiteMicrosoft DynamicsXero

FEATURES

ApprovalsControlsInvoicingAPIApp MarketplaceArtificial Intelligence
(AI)SecurityMobile app

SOLUTIONS

Small BusinessesMidsize CompaniesHospitalityNonprofitsProfessional
ServicesSoftware and Technology

PARTNERS

Accounting FirmsWealth ManagementBanksVAR ProgramAccountant Referral Program

RESOURCES

Resource CenterAccountant Resource CenterEvents & WebinarsCustomer
StoriesBlogFAQsLearning CenterCompareDevelopersProduct DemoProduct TourSitemap

COMPANY

Our StoryLeadershipInvestorsPress ReleasesNewsroomPress KitRefer a
BusinessCareersContact UsSupport

LegalPrivacy NoticeAcceptable Use PolicyCookie PolicyTerms of ServiceBill.com
Network RulesAccessibility Statement
© 2022 Bill.com, LLC. Bill.com, the Bill.com logo, and the “b” logo are
trademarks of Bill.com, LLC. All other company names and brands are the property
of their respective owners.


PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * MARKETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change your default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


Performance and analytics cookies collect information that is used in aggregate
form to help us understand how our website is being used and to find out more
about the type of traffic our website receives. This helps us to improve your
and others’ experience of the website.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation, such as remembering your language and currency preferences.
They may be set by us or by third party providers whose services we have added
to our pages. If you do not allow these cookies then some or all of these
services may not function properly.

MARKETING COOKIES

Marketing Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and serve you
with advertisements we believe are relevant to you and your interests on other
sites you visit. Another benefit of these cookies is that the information
collected can be used to limit the number of times you see an advertisement to
avoid over-exposure.They do not store directly personal information, but are
based on uniquely identifying your browser and internet device. Please note that
if you disable these, you will still see ads; they just won't be tailored to
your interests.

Back Button


BACK



Vendor Search
Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All