Frequently Asked Questions
General
Why freelancers and business owners love Kulud?
No more manual sorting or data entry. Centralize your invoices, receipts, and transactions. Spend less time on admin and more on scaling your business. Automated categorization. Affordable pricing.
General
Why freelancers and business owners love Kulud?
No more manual sorting or data entry. Centralize your invoices, receipts, and transactions. Spend less time on admin and more on scaling your business. Automated categorization. Affordable pricing.
General
Does Kulud automatically identify emails containing receipts?
Yes, Kulud can identify emails containing receipts, attached receipts, or links to receipts and extract the information, saving you hours of manual searching.
General
Does Kulud automatically identify emails containing receipts?
Yes, Kulud can identify emails containing receipts, attached receipts, or links to receipts and extract the information, saving you hours of manual searching.
General
Can Kulud analyze my previous emails for receipts?
Absolutely! Kulud can retroactively analyze your entire email history to identify and extract receipt information.
General
Can Kulud analyze my previous emails for receipts?
Absolutely! Kulud can retroactively analyze your entire email history to identify and extract receipt information.
General
What kind of information does Kulud extract from receipts?
Kulud extracts crucial receipt details such as purchase amounts, categories, dispute deadlines, and more.
General
What kind of information does Kulud extract from receipts?
Kulud extracts crucial receipt details such as purchase amounts, categories, dispute deadlines, and more.
General
Can I export reports in PDF format?
Yes, you can easily export reports in PDF format with Kulud, simplifying your accounting and financial tracking processes.
General
Can I export reports in PDF format?
Yes, you can easily export reports in PDF format with Kulud, simplifying your accounting and financial tracking processes.
General
Who can benefit from using Kulud?
Kulud is designed to benefit a wide range of users, including individuals filing tax returns, freelancers, small business owners, and accountants.
General
Who can benefit from using Kulud?
Kulud is designed to benefit a wide range of users, including individuals filing tax returns, freelancers, small business owners, and accountants.
General
Has Kulud passed any security assessments?
Yes, Kulud has successfully completed a Cloud Application Security Assessment (CASA) and has been validated by the App Defense Alliance (ADA). This assessment includes a review of application conformance with CASA recognized security frameworks, verification of automated security test (AST) application scan results, and conformation to non-functional CASA requirements. This means that Kulud.ai meets the CASA TIER 2 requirements, ensuring a high level of security for our users. You can learn more about CASA and its industry-recognized security standards on the CASA developer site.
General
Has Kulud passed any security assessments?
Yes, Kulud has successfully completed a Cloud Application Security Assessment (CASA) and has been validated by the App Defense Alliance (ADA). This assessment includes a review of application conformance with CASA recognized security frameworks, verification of automated security test (AST) application scan results, and conformation to non-functional CASA requirements. This means that Kulud.ai meets the CASA TIER 2 requirements, ensuring a high level of security for our users. You can learn more about CASA and its industry-recognized security standards on the CASA developer site.
General
Does Kulud help with tax preparation?
Yes, Kulud allows you to instantly generate a spreadsheet with all your necessary financial information, helping businesses avoid missed tax filing deadlines and ensuring individuals don't overlook valuable deductions.
General
Does Kulud help with tax preparation?
Yes, Kulud allows you to instantly generate a spreadsheet with all your necessary financial information, helping businesses avoid missed tax filing deadlines and ensuring individuals don't overlook valuable deductions.
Email Analysis and Privacy
Which emails do you read in my mailbox (inbox, sent, spam, etc.)?
The system reads only incoming (inbox) emails related to financial documents (receipts, invoices, bills).
Email Analysis and Privacy
Which emails do you read in my mailbox (inbox, sent, spam, etc.)?
The system reads only incoming (inbox) emails related to financial documents (receipts, invoices, bills).
Email Analysis and Privacy
Do you analyze personal messages or only receipts and invoices?
The system reads only incoming emails related to financial documents (receipts, invoices, bills). Algorithms analyze the subject lines, email text, and attachments. Keywords like 'invoice,' 'bill,' or 'payment' are essential indicators.
Email Analysis and Privacy
Do you analyze personal messages or only receipts and invoices?
The system reads only incoming emails related to financial documents (receipts, invoices, bills). Algorithms analyze the subject lines, email text, and attachments. Keywords like 'invoice,' 'bill,' or 'payment' are essential indicators.
Email Analysis and Privacy
How does the system understand that it's a service invoice and not a payment confirmation? Is a PDF necessary for an email to be classified as an invoice?
The system analyzes text content and attachment metadata. PDFs are not mandatory but significantly improve identification accuracy.
Email Analysis and Privacy
How does the system understand that it's a service invoice and not a payment confirmation? Is a PDF necessary for an email to be classified as an invoice?
The system analyzes text content and attachment metadata. PDFs are not mandatory but significantly improve identification accuracy.
Email Analysis and Privacy
I have important documents in my email. How can I be sure they are not being read?
Encryption and strict access policies protect sensitive documents. Access to non-financial emails are excluded.
Email Analysis and Privacy
I have important documents in my email. How can I be sure they are not being read?
Encryption and strict access policies protect sensitive documents. Access to non-financial emails are excluded.
Email Analysis and Privacy
What email services are supported besides Gmail?
Currently, we are using Gmail as our primary email service. However, we plan to support additional email providers in the future to accommodate broader requirements.
Email Analysis and Privacy
What email services are supported besides Gmail?
Currently, we are using Gmail as our primary email service. However, we plan to support additional email providers in the future to accommodate broader requirements.
Email Analysis and Privacy
Is it possible to manually select which emails to analyze?
There is no such option. However, we are considering to add such option.
Email Analysis and Privacy
Is it possible to manually select which emails to analyze?
There is no such option. However, we are considering to add such option.
Data Security and Encryption
Are my data encrypted while stored and transmitted? If so, which protocol is used? Which cloud providers host the servers?
Yes, your data is encrypted during transmission using HTTPS protocols to ensure secure communication. However, data at rest is not encrypted but remains protected through stringent security measures.
Our servers are hosted on trusted cloud providers, including Amazon AWS and Google Cloud. Please
Data Security and Encryption
Are my data encrypted while stored and transmitted? If so, which protocol is used? Which cloud providers host the servers?
Yes, your data is encrypted during transmission using HTTPS protocols to ensure secure communication. However, data at rest is not encrypted but remains protected through stringent security measures.
Our servers are hosted on trusted cloud providers, including Amazon AWS and Google Cloud. Please
Data Security and Encryption
What measures do you have in place to protect against data breaches and cyberattacks?
We have robust measures in place, including comprehensive logging and continuous monitoring of systems to detect and respond to potential threats. Additionally, we conduct thorough manual reviews to ensure the security and integrity of our infrastructure.
Data Security and Encryption
What measures do you have in place to protect against data breaches and cyberattacks?
We have robust measures in place, including comprehensive logging and continuous monitoring of systems to detect and respond to potential threats. Additionally, we conduct thorough manual reviews to ensure the security and integrity of our infrastructure.
Data Security and Encryption
How often is your platform's security audited?
Annualy.
Data Security and Encryption
How often is your platform's security audited?
Annualy.
Data Security and Encryption
Do you work with third parties that have access to data? If so, what confidentiality guarantees are provided?
We may employ third party companies and individuals to facilitate our Service (“Service Providers”), provide Service on our behalf, perform Service-related services or assist us in analysing how our Service is used.
These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.
Data Security and Encryption
Do you work with third parties that have access to data? If so, what confidentiality guarantees are provided?
We may employ third party companies and individuals to facilitate our Service (“Service Providers”), provide Service on our behalf, perform Service-related services or assist us in analysing how our Service is used.
These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.
Data Security and Encryption
Who within the company has access to my data?
Access is limited to specific employees with security clearance.
Data Security and Encryption
Who within the company has access to my data?
Access is limited to specific employees with security clearance.
Data Security and Encryption
Do you use customer data for analytics or training algorithms?
We may use third-party Service Providers to monitor and analyze the use of our Service.
Google Analytics
Google Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualise and personalise the ads of its own advertising network.
Data Security and Encryption
Do you use customer data for analytics or training algorithms?
We may use third-party Service Providers to monitor and analyze the use of our Service.
Google Analytics
Google Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualise and personalise the ads of its own advertising network.
Data Storage and Retention
Are organization, email, bank, and participant data stored? For how long?
Yes, organization, email, bank, and participant data are stored. However, they are retained only until the client chooses to delete their account.
Data Storage and Retention
Are organization, email, bank, and participant data stored? For how long?
Yes, organization, email, bank, and participant data are stored. However, they are retained only until the client chooses to delete their account.
Data Storage and Retention
How long do you keep data after the subscription ends?
We retain your data until you choose to delete your account.
Data Storage and Retention
How long do you keep data after the subscription ends?
We retain your data until you choose to delete your account.
Data Storage and Retention
What happens to my data if Kulud.ai ceases operations?
In the event that Kulud.ai ceases operations, all data will be securely deleted. However, we will notify our clients in advance, providing them with the opportunity to download any required data.
Data Storage and Retention
What happens to my data if Kulud.ai ceases operations?
In the event that Kulud.ai ceases operations, all data will be securely deleted. However, we will notify our clients in advance, providing them with the opportunity to download any required data.
Data Storage and Retention
If I decide to delete my account, will my data be completely removed from your servers?
If you make this request, we will delete the personal information we hold about you as of the date of your request from our records and direct any service providers to do the same. In some cases, deletion may be accomplished through de-identification of the information. If you choose to delete your personal information, you may not be able to use certain functions that require your personal information to operate.
Data Storage and Retention
If I decide to delete my account, will my data be completely removed from your servers?
If you make this request, we will delete the personal information we hold about you as of the date of your request from our records and direct any service providers to do the same. In some cases, deletion may be accomplished through de-identification of the information. If you choose to delete your personal information, you may not be able to use certain functions that require your personal information to operate.
Data Storage and Retention
How can I obtain a copy of all the data you store about me?
Upon your request, we will provide you with a copy of all the data we store about you.
Data Storage and Retention
How can I obtain a copy of all the data you store about me?
Upon your request, we will provide you with a copy of all the data we store about you.
Authentication and Access Control
How do you authenticate access to my mailbox?
Through OAuth for Gmail.
Authentication and Access Control
How do you authenticate access to my mailbox?
Through OAuth for Gmail.
Authentication and Access Control
Is two-factor authentication supported?
Yes, we can enable two-factor authentication for your account if needed.
Authentication and Access Control
Is two-factor authentication supported?
Yes, we can enable two-factor authentication for your account if needed.
Service Usage and Limits
How many emails, banks, and organizations can I connect? How many participants can I add to an organization?
There are currently no limitations on the number of emails, banks, organizations, or participants you can connect or add.
Service Usage and Limits
How many emails, banks, and organizations can I connect? How many participants can I add to an organization?
There are currently no limitations on the number of emails, banks, organizations, or participants you can connect or add.
Service Usage and Limits
Are there any limitations on the number of documents or data volume I can upload?
Currently, there are no limitations on the number of documents or the data volume you can upload.
Service Usage and Limits
Are there any limitations on the number of documents or data volume I can upload?
Currently, there are no limitations on the number of documents or the data volume you can upload.
Product Features and Availability
Do you have a mobile app or only a web version?
Currently, we only offer a web version.
Product Features and Availability
Do you have a mobile app or only a web version?
Currently, we only offer a web version.
Product Features and Availability
Is there a service agreement for using the product?
Our Terms and Conditions govern all use of our Service and together with the Privacy Policy constitutes your agreement with us.
Product Features and Availability
Is there a service agreement for using the product?
Our Terms and Conditions govern all use of our Service and together with the Privacy Policy constitutes your agreement with us.
Service Reliability and Guarantees
What happens in the case of a service failure or error?
In the event of a service failure or error, we actively monitor the situation and continuously check logs to identify and resolve any issues as quickly as possible.
Service Reliability and Guarantees
What happens in the case of a service failure or error?
In the event of a service failure or error, we actively monitor the situation and continuously check logs to identify and resolve any issues as quickly as possible.
Service Reliability and Guarantees
Is there a money-back guarantee?
Please note that due to the nature of our business at Kulud, we do not provide refunds once our service has been used. Our technology involves the use of artificial intelligence and high-power computing resources, such as Graphics Processing Units (GPUs), which incur substantial costs during operation. Therefore, once a transaction has been processed, we are unable to offer refunds, as this would result in a financial loss for us. We encourage our customers to carefully consider their needs and requirements before availing our services. We appreciate your understanding in this matter.
Service Reliability and Guarantees
Is there a money-back guarantee?
Please note that due to the nature of our business at Kulud, we do not provide refunds once our service has been used. Our technology involves the use of artificial intelligence and high-power computing resources, such as Graphics Processing Units (GPUs), which incur substantial costs during operation. Therefore, once a transaction has been processed, we are unable to offer refunds, as this would result in a financial loss for us. We encourage our customers to carefully consider their needs and requirements before availing our services. We appreciate your understanding in this matter.
Legal and Compliance
Do I sign any confidentiality agreement when starting to use your product?
By using the service, users agree to the Terms of Service and Privacy Policy, which outline data handling practices. If additional confidentiality agreements are in place, we will let you know.
Legal and Compliance
Do I sign any confidentiality agreement when starting to use your product?
By using the service, users agree to the Terms of Service and Privacy Policy, which outline data handling practices. If additional confidentiality agreements are in place, we will let you know.
All rights reserved
All rights reserved