The Safety and Security of Yooz

Trust Yooz to protect your data. The availability and reliability of invoicing software through the Yooz platform and the confidentiality and security of your data are our top priorities.

hero image portal

Confidentiality

At Yooz, protecting your data is a top priority. All information is encrypted end-to-end: in transit via TLS, at rest on disk, and directly within our databases for sensitive data. Advanced access control mechanisms are in place to prevent any unauthorized intrusion. Authentication via SSO (Single Sign-On) streamlines login while enhancing security. MFA (Multi-Factor Authentication) adds an extra layer of protection. Access rights are managed through an RBAC (Role-Based Access Control) system, ensuring that each user can only access the data they strictly need.

High Availability

Service continuity is an integral part of Yooz’s commitment. Our infrastructure is built on fully redundant components to avoid any single point of failure. This resilience is strengthened by dynamic scalability, allowing the platform to automatically adapt to increased workloads. As a result, performance remains high even during peak activity, delivering users a smooth and reliable experience.

Data Protection

We apply security principles from the outset (security by design) and by default. Multiple levels of data segregation are offered to ensure complete isolation between clients. Automatic backups are stored on geo-redundant infrastructures, serving as the foundation for a robust and proven Disaster Recovery Plan (DRP). To meet confidentiality requirements, we also provide data masking and secure deletion mechanisms.

Physical Security

Our clients’ data is hosted in Microsoft Azure data centers located in Europe. These facilities meet the highest physical security standards: 24/7 surveillance, strict access control, power redundancy, and state-of-the-art infrastructure. This choice ensures performance, security, and compliance with European regulations.

Certifications

Yooz maintains an ongoing commitment to meeting the most demanding security standards. We are certified to ISO 27001, which governs information security management, and SOC 1 Type 2, which attests to the effectiveness of our internal controls regarding security, confidentiality, and data integrity.