Trust at Spinwheel

At Spinwheel, trust is at the core of everything we do. As an embedded fintech platform, we work with industry-leading partners to provide simple, clear, and consumer permissioned access to liability data. When you use Spinwheel, you’re entrusting us to retrieve your data, and we take that responsibility seriously. Please continue reading to learn more about how we protect you and your data. For more information, you can also review our Privacy Policy and User Agreement.

How We Handle Your Data

  • User Verification

    1. User Verification

    Your security starts with verifying your identity. We use secure two factor authentication to confirm it’s you and ensure that only you can access and authorize the use of your data.

  • Accurate application information

    2. Securely Retrieve Your Account Information

    We ensure that your account data is retrieved securely and only with your explicit authorization. Our systems are built with multiple layers of encryption and bank-level security to protect your information every step of the way.

  • Account controls

    3. Control Your Data Access

    Your data is yours to control. If you ever want to disconnect your data or revoke access, you can easily do so by reaching out to us at this link.

Safety is at 
Our Core

  • Security

    Data Encryption

    We use industry-standard encryption protocols to protect your data in transit and at rest. Whether your data is being accessed, shared, or stored, it’s encrypted with the highest security standards to ensure its confidentiality and integrity.

  • Network

    US-Only Data Storage

    Your data is stored in the United States. We believe in keeping your information close to home, ensuring that all of our storage and processing facilities comply with US data protection laws and regulations.

  • Data Protection

    Data Protection

    Protecting your data is our top priority. Our platform employs multiple layers of defense, including advanced firewalls, intrusion detection systems, and continuous monitoring, to safeguard your information against threats and unauthorized access. And, we will never sell your data.

  • Personalized recommendations

    Independent Security Testing

    We regularly conduct independent security testing, including vulnerability assessments and penetration testing, to identify and address potential risks. These tests are performed by trusted third-party security experts to ensure that our systems remain resilient and secure.

Looking for technical information?

View more information about our Compliance and Controls.