One moment...


The security of your data is a top priority for our team. We make every effort to eliminate risks associated with loss of access, damage, or unauthorized access to your data.

Reliable encryption of confidential data and their transmission over the network in encrypted form

For information exchange with users, HomeMoney applies the industry standard SSL encryption, using strong cryptography.

Data storage and backup

User data is stored in the Eastern European Microsoft Azure data center located in Amsterdam (Netherlands). More details about Microsoft Azure protection and security.

Backups are stored in several geographically remote data centers in the USA (Amazon's Simple Storage Service) every two hours. This means that in case the main storage location is unavailable (e.g., physical destruction), at worst, data from the last two hours of operation will be lost. Detailed information about Amazon S3 and Amazon S3 security.

A scheduled check and test recovery from backups ("Disaster rehearsal") is conducted monthly.

Data usage

We do not share our users' information with third parties.

Statistical (aggregated) information is used by us for analysis and service improvements (e.g., average number of used categories).

Activity information is used to send email reminders (e.g., inactivity for the last 30 days).

If you use services provided by our partners, your email address is shared with our partners, for example, when clicking on an advertising message in the newsletter.

Your data belongs to you

You can save a backup copy of your data at any time in the "Transactions" - "Export" section.

You can delete your account at any time

Within a few days, the account data will be completely deleted, including from backups.

Use of modern means of information protection

We use proven technologies for data storage and encryption, user authorization. The software is regularly updated and checked for viruses and vulnerabilities. System developers do not have access to real user data. Regular system scans are conducted to identify and eliminate potential vulnerabilities.