How does Procore Pay securely store and protect my data?
Answer
At Procore, Procore Pay data security is paramount and your Procore Pay data is stored in secure databases. In addition to encrypting stored data, Procore uses industry-leading, bank-grade technology to shield data during transmission. As part of our commitment to payment security, Procore maintains strict confidentiality regarding the location of Procore Pay databases and our specific security systems. Our proactive approach includes regular system updates and rigorous vulnerability checks to prevent potential security threats.
When using Procore Pay:
-
Procore uses bank-grade technology to protect payment data and transactions. To help minimize the possibility of fraud, the Procore Pay environment uses encryption, firewalls, multi-factor authentication, and strong password management protections. Data is also stored in highly secure data centers that have been certified to industry standards. To learn more see
Security and Data Governance Standards on the Procore website.
-
Confidential payment information stays private. As a payor, access to Procore Pay is guarded by Role-Based Access Controls (RBACs). In addition, Procore Pay users verify identities using Multi-Factor Authentication (MFA), not only when logging into Procore Pay, but also before performing payment transactions. This aligns with industry-standard practices and helps reduce the likelihood of unauthorized access to sensitive information.
-
Payees actively and securely manage their own bank account information to enhance transaction safety. By self-administering their bank account details through their free or paid Procore account (see Add a Bank Account as a Payee), payees securely empower Procore Pay to transmit invoice payments to their provided bank accounts.
- Procore collaborates with industry-trusted fintech partners employing embedded finance tools to optimize financial operations. This proactive approach helps Procore efficiently manage compliance risks and potential fraud. These advanced embedded finance programs significantly enhance Procore's operational efficiency and streamline compliance reporting and auditing procedures. It also bolsters Procore's ability to detect potential issues and make informed decisions, to ensure secure financial operations.
Common Questions
- How does Procore request documents and information for Procore Pay?
- How do I report suspicious account activities to Procore?
- How do I report fake or suspicious messages or emails to Procore?
How does Procore request documents and information from end users?
Procore requests specific information and documents from end users on a case-by-case basis. Legitimate requests for documents and information for Procore Pay will come from:
- A procore.com email address
- A procorepay.com email address
- A levelset.com email address
- notifications@mail.moxo.com
Important
Procore never asks Procore Pay users to submit information or documents via text message.If you need help determining whether a request is legitimate, please Contact Support.
How do I report suspicious account activities to Procore?
If you suspect identity theft or fraudulent account activities, report it to Procore immediately. See Contact Support.
How do I report fake or suspicious messages or emails to Procore?
If you receive a suspicious email, don't interact with it. Instead, Contact Support. To learn more, see How do I avoid and report phishing emails?
See Also
- Why is MFA mandatory for Procore Pay and how does it work?
- What are the different types of bank accounts in Procore Pay?
- How do funds flow between bank accounts with Procore Pay?