Help center
Frequently asked questions
Quick answers about applications, verification, security, and account operations.
Suncost Pay Inc. serves U.S.-based individuals and businesses that want virtual bank account operations: balances, statements, transfers, and identity verification in one place. We are a financial technology company; banking services may be provided by partner institutions.
A dedicated business account helps you separate personal and business funds, simplify bookkeeping, and use a consistent routing and account number for ACH and wires. A virtual account through our platform is designed for clear records and operational controls.
When an administrator assigns your bank account after approval, you receive routing (ABA) and account numbers suitable for ACH, wires, and verification—subject to your account agreement and partner bank rules.
Card programs depend on your product and partner bank. Some offerings may include a debit card for eligible accounts; availability, networks, and fees are described in your account agreement and fee schedule.
Legal and display names follow your onboarding and KYC records. Card imprinting and account titling are subject to partner bank policies. You can request profile updates through the appropriate workflow in your account.
You can download PDF statements and CSV activity exports for use in spreadsheets, accounting software, and internal tools. Direct bank feeds to third-party apps depend on the third party and are not guaranteed for every integration.
Digital wallet eligibility depends on your card product and issuer rules. If a card is offered, wallet add instructions appear in your materials or app; not all accounts include this feature.
Funding methods typically include ACH and wire instructions using your assigned routing and account number. Posting times and limits depend on the sending bank and our operations. See your welcome materials and account agreement.
Your ledger shows transaction descriptions, amounts, and running balances. Automatic merchant categorization like dedicated accounting apps may be limited; you can export CSV for categorization in your own tools.
We do not provide tax, legal, or accounting advice. Use your statements and exports with a qualified tax professional or software to determine deductions.
Suncost Pay is not a tax filing or payment service. You would pay tax authorities using methods they accept (e.g., bank transfer from your account elsewhere), following IRS or state guidance.
You can import CSV activity and PDF statements into many systems. Compatibility varies by vendor; we do not guarantee a live sync with every accounting product.
Our core platform focuses on virtual account operations, statements, and transfers—not full invoicing or contractor payroll suites unless explicitly included in a separate agreement. Contact us for current product scope and pricing.
If invoicing is not part of your Suncost Pay product, use your preferred invoicing provider for client payment options. Your virtual account can still receive funds via standard bank rails where supported.
Services are oriented to U.S. operators and U.S. compliance. International use, currencies, and sanctions rules depend on your agreement and partner bank policies—contact compliance or support for your case.
No. Suncost Pay Inc. is a financial technology company. Virtual bank account services may be provided by partner FDIC-insured institutions; we are not a bank ourselves.
When funds are held at an FDIC-insured partner institution, deposit insurance may apply up to applicable limits, subject to that institution's terms and ownership categories. See your account agreement.
Most applications are reviewed within 1–3 business days, depending on document quality and compliance checks.
A valid identity document is required. Company documents are recommended for business account applications.
Yes. You can submit a new application with corrected details and additional supporting documents.
You submit a transfer request with destination details. Operations reviews and processes requests according to policy and risk controls.
We use role-based access, encryption practices, and monitored workflows to protect sensitive information.