How can we serve you?

Popular help articles: Understand your Dashboard, Add Clients, Build Forms

Frequently Asked Questions

Does Bitsy have access to my clients information?

We do NOT store your client’s information nor do we sell it.  We rely on our third party providers like Docusign and Google Firebase to store and protect your clients information.  Furthermore, Bitsy does not recall such data unless you/your team are actively working within the app.

Bitsy is simply a tool you can use to auto-populate such information into all your required enrollment fields and complete all associated onboarding steps, faster than any human could do it.

Can Bitsy help with clients who refuse electronic methods?

YES.  We have built-in functionality for you and your team to complete your workflow electronically, but deliver all required signature fields to clientele in paper format.

You can easily satisfy their request without affecting your own flow, it’s a win-win.

Do I have to use Bitsy's compliance documents?

NO!  The great thing about this system is that you have an electronic form-builder, that makes it fast and easy to upload your compliance approved, enrollment documents.

You can even quickly create beautiful pre-meeting questionnaires, risk assessments, etc., that give you the power to capture prospect/client data faster than before while reducing your workload, because the client does all the data entry for you.

This is one of the secrets to onboarding clients in minutes, more compliantly than ever!

See why 800+ Advisors love Bitsy

© Bitsy Advisor 2021 All Rights Reserved

How can we help?

9 + 1 =

Compliance Checklist

Disclosure Delivery. Proof of Delivery.

You can deliver disclosures at any time during the client acquisition process.  Disclosure documents can attach to any questionnaire you build, be sent with contracts or automatically upload to your client's dashboard, for example.  This is completely your preference.

Proof of delivery happens within an admin's and an advisor's dashboard, with a timestamp of delivery for compliance adherance.

Platform Updates and Enrollment Audit Line Items.

You get world-class RIA attorneys continually keeping you up-to-date and in-line with your state and national compliance regualtions.  You can even get discounted access to their time, should you need it.

Bitsy automatically tracks and timestamps client enrollment steps to ensure you have what you need during audit.  You can easily download and send as littls as 1 client contract to your auditor, or mass download all client contracts and email via zip file to said auditor.  It's quick and easy.

Client Information and Record Retention Requirements.

Our compliance staff keeps us (and you) up to date on such requirements, and removal can only happen upon request to our support staff so that advisors can not remove manually. 

If you should discontinue your membership with Bitsy, we make it easy for you to transfer all of your client records and documents.  However, you only get 30 days to do so before we email all such records and automatically close your account.

We are NOT going to hold all of your electronic records for 5 years.

GDPR Compliance

Individual Data

Lawful, fair and transparent data processing in relation to individuals:

Bitsy’s onboarding module only collects data required by law to enroll new clients.

Data Collection

Specified, explicit and legitimate purpose for data collection:

Bitsy’s onboarding and other custom modules clearly identify required data from prospets and clients.

We also make it easy to completely purge data from Bitsy, simply reach out and we’ll do it fo you IF you meet guidelines for legal disposal AND you are an approved compliance officer/firm admin with express permission to complete such request.

Relevant Data

Relevant data, limited to only what is necessary in relation to it’s purpose:

Bitsy’s onboarding module ONLY collects relevant information to execute a compliant client enrollment.  We allow your prospects and clients to electronically sign enrollment documents, proving consent for data collected.

Personal Data Retention

Personal data should be kept for no longer than is necessary for proper subject identification:

You will be eligible to remove all collected data in regards to one or multiple client(s), when storing of such data becomes irrelevant.  Bitsy also creates a trail of all changes made by or on behalf of prospects and clients, for your security.

Again, you MUST be an approved person listed in the "Data Collection" tab to be eligible for data removal requests. 

Please also refer to the "Client Information and Record Retention Requirements" tab held within the "Compliance Checklist" section for an explanation of how we safeguard client information, and our safe removal protocols held therein.

Data Accuracy

Personal data should be accurate and up to date, where necessary:

Clients agree within Bitsy’s modules to provide you with clear and accurate data.  It is their responsibility to abstain from delivering false information.

Data Security

Personal data should be processed securely; furthermore, in a manner that is appropriate to the sensitivity of such data.

Bitsy provides a high level of data encryption to all members, ensuring that all customer information is perpetually stored in a secured database. 

We utilize state-of-the-art hacker prevention protocol to prevent access to our network.  We continually update our anti-virus and malware prevention systems to keep you, your prospects and your clients safe.

Payments

Every transaction between an advisor/advisory firm and Bitsy is secure. We only accept payments through the following methods:

Check or Wire

Security

Bitsy Network

Systems

Rest easy knowing Bitsy operates from a 'security first' mindset.

Data

Credible, third-party vendors ensure high data security.  We outsource this function to the best providers who make it their business to keep you and your clientele safe.

Property

Regular cyber risk assessments protect you at all times.

Learn more →

Security

Disaster Recovery

Our plan is built to prevent, detect and correct to ensure you and your clientele have the best experience possible.

Security

Incident Response

       Annual testing of this plan

       Response within 1 hour

       Continual training in protocol

       24/7 file-integrity monitoring

       Perpetual plan updates

Insurance

If you’d like to see a copy of our insurance coverages that keep us, you and your clients safe, please submit a written request to:

Website: https://bitsyadvisor.com

Email: [email protected] with the subject line of "Coverage Request"

Address:  800 S. Gay St., STE 1100 ATTN: Bitsy Advisor, Knoxville, TN 37929

ISO 27001:2013

DocuSign is ISO 27001:2013 certified. This is the highest level of global information security assurance available today, and provides customers assurance that DocuSign meets stringent international standards on security.

SOC I & II, Type II

As a SOC 1 and SOC 2-certified organization, DocuSign complies with the reporting requirements stipulated by the American Institute of Certified Public Accountants (AICPA). We undergo yearly audits across all aspects of our production operations, including our datacenters, and have sustained and surpassed all requirements.

ISO 27001:2013

DocuSign adheres to the requirements of the Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) program. The CSA STAR comprises key principles of transparency, rigorous auditing, and harmonization of standards. Our Consensus Assessments Initiative Questionnaire (CAIQ) documents the rigor and strength of DocuSign’s security posture and best practices and is publicly accessible for viewing and download from the CSA STAR registry.

SOC III & ISO Certifications

All Firebase services (aside from App Distribution and Crashlytics) have successfully completed the ISO 27001 and SOC 1, SOC 2, and SOC 3 evaluation process, and some have also completed the ISO 27017 and ISO 27018 certification process.

       ISO 27001

       ISO 27017

       ISO 27018

       SOC I

       SOC II

       SOC III

Critical Functions

Bitsy perpetually agrees to maintain a high level of successful operation of it's services.  Regardless of what external forces may threaten the integrity of our system.

Should there be any level of disruption to our service(s), Bitsy proactively implements a solution before acquiring new customers.

Dependencies

Bitsy acknowledges that it's members rely on our system for compliant client acquisition.  We agree to continually maintain and upgrade the integrity of our system to ensure our members get more (where possible) in value, than what they pay for.

Downtime

Where possible, Bitsy agrees to proactively acknowledge possible and current threats and complications to it's system and to put aside all other activity to amend such faults, as quickly as possible.  We also agree to keep all members regularly apprised of ongoing circumstances, how they might be affected and what we're doing to amend any complications.  This communication will happen at least once every 24 hours.

Maintenance

Bitsy prides itself in being reliable; thus, we commit to regularly (at least 2 - 4 times annually) check the integrity of our system, tools and support capabilities to ensure our members experience little to no interruption in service.