Skip to main content

Data Security

Understanding how your data is handled

N
Written by Níall Farren
Updated over a week ago

🔐 Data Security & Storage

We understand that your data is one of your most valuable assets. At Service Geeni, we’re committed to keeping it safe, secure, and always available when you need it. This article outlines where your data is stored, how it’s protected, and what measures we take to back it up and ensure business continuity.


📦 Where Your Data is Stored

Hosting Provider

Our platform is hosted on Microsoft Azure, a cloud provider that meets internationally recognised compliance standards such as:

  • ISO 27001

  • SOC 2 Type II

  • GDPR

  • PCI DSS

Data Residency

All customer data is stored in their North Europe data centre, with backups in their West Europe location. We do not move or replicate your data outside of these regions without your explicit consent or a lawful basis to do so.

Infrastructure Redundancy

Azure’s geographically separate data centres provide high availability and resilience against failure, helping ensure minimal disruption even in extreme scenarios.


🧑‍💼 Who Has Access to Your Data

Internal Access is Restricted

Only a limited number of authorised personnel have access to customer data — typically members of our support and infrastructure teams, and only when required to resolve specific issues.

Audit Trails & Monitoring

  • Every access to credentials is logged, timestamped, and includes the user ID.

  • Logs are stored securely and reviewed periodically as part of our internal security auditing.


🔐 Data Security Measures

We apply multiple layers of security controls to protect your data from unauthorised access or loss:

Encryption

  • In Transit: All data is encrypted via TLS 1.2 or higher.

  • At Rest: All data stored in our databases and backups is encrypted using AES-256.

Authentication & Access Control

  • Role-based access control (RBAC) is enforced across the platform.

  • Support for secure passwords and optional multi-factor authentication (MFA).

Vulnerability & Threat Management

  • Regular automated vulnerability scans

  • Periodic third-party penetration testing

  • Ongoing threat monitoring and incident response


💾 Backups & Recovery

Backup Frequency

We perform automated encrypted backups of your data multiple times per day.

Backup Retention

Backups are retained on a rolling 35-day cycle, allowing for recovery from a wide range of scenarios.

Disaster Recovery & Failover

  • RTO (Recovery Time Objective): under 4 hours.

  • RPO (Recovery Point Objective): under 1 hour.

These recovery targets ensure we can restore service quickly and with minimal data loss in the event of a major incident.

  • Backup Location: All backups are stored in the same geographic region mentioned above to comply with data residency requirements.

  • Testing: Backup recovery processes are tested regularly to ensure data can be restored when needed.


🔎 Compliance & Data Rights

GDPR / UK GDPR Compliant

We follow the principles of data minimisation, purpose limitation, and user control.

Did this answer your question?