Security Guidelines

At Invoice Meister we know that our customers rely on us as an important part of their business processes and record keeping. We take our responsibilities to our customers seriously, and the security and reliability of the software, systems and data that make up the Invoice Meister application are our top priority.



All information traveling between your browser and Invoice Meister is protected from eavesdroppers with 256-bit SSL encryption. The lock icon in your browser lets you verify that you aren’t talking to a phishing site impersonating Invoice Meister and that your data is secure in transit.


The Invoice Meister application – including your data – rests securely behind high securityfirewalls.

Vulnerability scanning

Invoice Meister’ servers are scanned for vulnerabilities regularly by our managed security provider. These scans test our servers both from the Internet and from inside our network, and any newly-identified problems are addressed as quickly as possible.

Strong encryption

Invoice Meister uses industry standard encryption protocols and practices to responsibly transmit sensitive information (including cardholder data).

Physical security

The Invoice Meister servers are located in state-of-the-art data centers, which provide biometric access controls, constant surveillance, redundant power feeds and generators, robust fire suppression, and carefully monitored climate control to protect the servers that store your data and manage your billing.

Cardholder Data

Cardholder data should only be input by the user in areas that explicitly require it. Invoice Meister handles cardholder data in a secure manner while it’s in transit and does not store cardholder data within its platform on behalf of our customers. Where cardholder data storage is required (i.e. automatic payments on recurring templates) Invoice Meister leverages PCI compliant partners to store the cardholder data.

Secure Development Practices

Invoice Meister developers follow the secure development practices described in OWASP. Furthermore, we subscribe and adhere to the principals of least access.


Redundant servers and data centers

The Invoice Meister infrastructure uses redundant storage and servers to keep the application and your data available in the case of hardware failure – and another set of servers and storage in a geographically separate data center in case our primary data center is made unavailable by a disaster or other disruption.

Managed hosting

The Invoice Meister Application utilizes Google Cloud Platform (GCP) for hosting requirements. With a vast array of clients with varying needs, GCP provides an environment that allows for the fast delivery of features, continued product innovation, reliable security and stability and a reduced chance of downtime.


The data in your Invoice Meister account is replicated across multiple database servers in two geographic locations to prevent a single failure from causing data loss. Additionally, that data is backed up nightly to tape and stored in a secure offsite location to ensure that, even in the event of a catastrophe like a tornado or flood, your information will be safe and your records can be quickly restored.

If you have any security concerns or questions please feel free to contact us directly.

Responsible Disclosure of Security Vulnerabilities

If you are a security researcher and think you’ve found a security vulnerability with our service, product, or website please see our responsible disclosure policy page for details on how to report it to us.