We use cookies to improve your experience. Read more about how we handle your data in our GDPR policy.

    Security & Privacy

    Your clients' data is treated like it's ours.

    Enterprise-grade security built for small businesses. GDPR compliant. EU servers. AES-256 encryption. We never sell your data or your clients' data — ever.

    🔒

    GDPR Compliant

    Full EU compliance

    🇪🇺

    EU-Only Servers

    Frankfurt, Germany

    🛡

    AES-256 Encryption

    At rest and in transit

    🔑

    TLS 1.3

    All data in transit

    💾

    6h Backups

    Automated, encrypted

    📊

    99.9% Uptime SLA

    Guaranteed reliability

    Encryption

    Every piece of data — client names, phone numbers, payment information, appointment history — is encrypted at rest using AES-256 and in transit using TLS 1.3. Your client data is mathematically impossible to read without the correct keys.

    Your data never leaves the EU

    All Genju infrastructure runs on servers in Frankfurt, Germany. Your client data never leaves the European Union. No US cloud providers. No third-country transfers. You can tell your clients with certainty where their data lives.

    GDPR built in — not bolted on

    Genju is the processor. You are the controller. We provide a full Data Processing Agreement, handle data subject requests (access, deletion, portability), and maintain Article 30 records. This is the same encryption standard used by banks.

    We never sell your data

    We never sell your data for advertising or any other purpose. Full stop. No exceptions. Your client list is yours. Genju's business model is subscription fees from you — not advertising from third parties. We have zero financial incentive to misuse your data.

    Automated Backups

    Every 6 hours, a full encrypted backup of your account data is created and stored redundantly. Backups are retained for 30 days. Point-in-time recovery is available on request. You can request a data export at any time from your account settings.

    Access Controls & Audit Log

    Team members only see what they need to. Role-based permissions: Admin, Manager, Staff. Every action is logged — who did what and when. Instantly revoke access when someone leaves. On Pro: full audit log export, IP allowlisting, and 2FA enforcement.

    Security FAQ