Security & Data Protection

This document outlines the security, compliance, privacy, and operational controls implemented to protect customer data.

Governance, Risk, and Compliance

Information Security Management System (ISMS)

Genialis operates an ISO/IEC 27001 certified ISMS covering risk management, incident response, access control, and continuous improvement. Security policies, procedures, and controls are formally documented and reviewed regularly as part of management reviews and audits. Security responsibilities are clearly defined across roles, including access management, incident handling, and compliance oversight.

Quality Management System

The organization is ISO 9001 certified, ensuring structured quality assurance and process controls.

Platform Architecture & Hosting

Genialis Expressions is deployed on Amazon Web Services (AWS) using a shared responsibility model.

  • Infrastructure hosted in AWS data centers (US by default; EU region available upon request)

  • Logical data isolation between customer environments

  • AWS-native network security controls and monitoring mechanisms

  • No direct third-party access to customer datasets

AWS is responsible for physical security, underlying infrastructure, and network protection, while Genialis is responsible for secure configuration, access control, encryption, and application-level security. Detailed architecture diagrams and data flow descriptions are available upon request and subject to appropriate confidentiality controls.

Identity & Access Management

Access to systems and data follows the principle of least privilege and a need-to-know basis.

  • Role-based access control (RBAC) is enforced across internal systems and the platform.

  • All administrative access requires explicit approval by the CTO.

  • Access rights are reviewed periodically and revoked immediately upon termination or role change. Authentication controls include:

    • Strong password policies

    • Mandatory multi-factor authentication (MFA)

    • Centralized secrets management using 1Password

All access to production systems and customer data is logged and auditable.

Encryption & Key Management

Genialis applies encryption consistently to protect data throughout its lifecycle.

  • Data at rest: Encrypted using industry-standard encryption (AES-256 or equivalent)

  • Data in transit: Encrypted using TLS 1.2+

  • Temporary credentials: Short-lived credentials are used for cloud resource access

  • AWS Key Management Service (KMS)

  • Key management: Managed through secure cloud key management services

  • Customer data is never transferred via physical media.

Logging, Monitoring & Vulnerability Management

  • Application-level and infrastructure-level audit logs are enabled and retained securely.

  • Logs include access events, administrative actions, and system activity.

  • AWS CloudTrail & S3 access logging

  • Security events are reviewed as needed and during incident investigations.

  • Vulnerability management:

    • Operating systems and dependencies are kept up to date

    • Third-party penetration testing is performed annually

    • Findings are tracked and remediated according to risk

Incident Management & Breach Response

Genialis maintains a formal Information Security Incident Management process.

  • All security incidents (actual or suspected) are recorded and investigated.

  • Incidents are classified based on risk and impact.

  • In the event of a personal data breach:

    • Customers are notified without undue delay

    • Regulatory notification obligations are supported where applicable

  • Incident handling includes:

    • Detection and containment

    • Root cause analysis

    • Corrective and preventive actions (CAPA)

    • Lessons learned

    • To date, Genialis has not experienced a confirmed data breach.

Backup, Disaster Recovery & Business Continuity

  • Platform data is backed up regularly to secure, encrypted cloud storage

  • Backup restoration procedures are tested at least annually

  • Backups are protected with restricted access and encryption

  • Business continuity and disaster recovery measures are defined and periodically reviewed

Personnel Security & Awareness

  • All employees and contractors are bound by confidentiality and non-disclosure obligations.

  • Security awareness training is conducted at least annually and includes:

    • Secure data handling

    • Threat awareness (e.g., phishing, credential misuse)

    • Incident reporting obligations

  • Contractors receive equivalent security training prior to being granted access.

Data Protection & GDPR Compliance

Genialis acts as a data processor. Key GDPR-aligned measures include:

  • Records of Processing Activities (RoPA)

  • Data Processing Agreements (DPA)

  • Standard Contractual Clauses (SCCs) where applicable

  • DPIAs conducted when required

  • Data subject rights handling process

  • HIPAA-aligned safeguards when PHI is processed

  • Business Associate Agreement (BAA) available upon request

Personal data is processed strictly in accordance with customer instructions and contractual agreements.

Third Parties & Subprocessors

  • Genialis does not share customer data with third parties except for essential infrastructure providers (e.g., AWS).

  • All subprocessors are assessed for security and data protection compliance.

  • DPAs and Standard Contractual Clauses (SCCs) are in place where required.