PayPeriod.AI is built with a privacy-first architecture. We never see your bank credentials, never sell your data, and give you full control over what's stored and where.
PayPeriod.AI never asks for your bank login, account numbers, or social security number. You manually enter the data you want to track — income amounts, expense names, and balances. We have zero access to your actual bank accounts.
All data transfers use encrypted connections. When synced to the cloud, your financial data is stored in a secure database accessible only through your authenticated session. No one at PayPeriod.AI can read your data.
Use PayPeriod.AI without creating an account. All data stays on your device and is never transmitted to any server. Full functionality, zero cloud exposure. Your data literally never leaves your phone.
Export or delete your data at any time. Contact support@payperiod.ai to request complete data deletion from our servers. Uninstalling the app removes all locally stored data. No data retention after deletion.
Sign-in is handled through Apple Sign-In — we store only your Apple ID token and an optional notification email. No passwords are created or stored in our system. Apple's authentication infrastructure handles identity verification.
Only what you provide: account names (not numbers), income amounts, payment names and amounts, and savings goals. This is planning data — not transactional data pulled from your bank. You decide exactly what information exists in the app.
The PayPeriod.Agent reads only the financial plan data you've entered into the app. It does not access external accounts, browser history, or any data outside your PayPeriod setup. AI conversations are processed securely and not used to train models.
PayPeriod.AI's architecture is designed from the ground up with data isolation, encryption, and audit-readiness. Active progress toward institutional-grade compliance.
Production architecture designed for institutional readiness. Separate development, staging, and production environments. Encrypted database with managed backups. Rate limiting, structured logging, and error monitoring active. Secrets management with rotation policies. Incident response procedures documented.