Data security

Your moments matter — so we protect them with modern, multi-layered security designed from the ground up. This page explains how Swizil keeps your data secure, technically and operationally, across our mobile app, web services, and supporting systems.

Built on Secure Cloud Infrastructure

Swizil runs on enterprise-grade cloud infrastructure with strong isolation and encrypted services across all layers. Our architecture includes:

  • Multi-factor authentication and secure access controls

  • Encrypted storage for all media and user data

  • Encrypted databases with access restrictions

  • Isolated microservices with tightly scoped permissions

  • Regional encryption key management

  • Network isolation and segmentation

  • Application firewall protection

Every component is configured to follow least-privilege access, ensuring only the systems that need access can request it.

Encryption Everywhere

We use industry-standard encryption to protect your information:

  • Data in transit: Protected using current industry-standard secure protocols

  • Data at rest: Military-grade encryption across all storage systems and backups

  • Key separation: UK/EU and US regions use different encryption keys with restricted access


This ensures your information stays confidential and tamper-resistant, even inside our infrastructure.

Regional Data Separation

Where you live determines where your data is stored:

  • UK/EU member data is stored in secure EU data centers

  • US/ROW member data is stored in secure US data centers

  • Your data remains stored in your home region only

  • When you share content with friends in other regions, it's transmitted for viewing but not stored in their region

  • Only a small, non-personal subset of reference tables is replicated for cross-region share-links


This gives you stronger privacy and more appropriate legal protection.

Strict Access Controls

Sensitive data is guarded by multiple layers of controls:

  • Multi-factor authentication for internal systems

  • Role-based access with least privilege

  • No engineer access to raw media content

  • Logged & audited internal tools with mandatory "reason for change" fields

  • Temporary access that expires automatically

Access to sensitive material is rare, controlled, and fully traceable.

Continuous Monitoring & Threat Detection

We use enterprise monitoring systems and 24/7 automated alerting to detect unusual activity:

  • Comprehensive logging and metrics

  • Automated anomaly detection

  • Request-level tracking

  • Real-time event monitoring

  • Regular vulnerability assessments

  • Annual third-party penetration testing

If something looks suspicious, we act immediately.

Secure Development & Testing Practices

Security is built into our engineering process:

  • Mandatory code reviews

  • Automated dependency scanning and updates

  • Secrets stored in encrypted vaults

  • No credentials in code

  • Isolated development, staging, and production environments

  • Infrastructure as code for consistent, auditable deployments

We update our systems regularly and test them for weaknesses.

Third-Party Security

We carefully vet all third-party services:

  • Vendor security assessments before integration

  • Contractual data protection requirements

  • Regular security reviews

  • Minimal data sharing - only what's necessary

Managed Data Retention & Safe Deletion

We retain your data only for as long as needed to deliver the service or meet legal requirements. When you delete your account:

  • Personal data is permanently deleted or anonymised within 30 days

  • Encrypted backups are removed as part of their normal rotation

  • Backup data is not used for active processing

This is managed according to our retention rules and security safeguards.

Incident Response

If something happens that could affect your data:

  • We maintain a documented incident response plan

  • We conduct regular incident response drills and tabletop exercises

  • We respond immediately to assess and contain incidents

  • We notify you and the relevant authorities without undue delay, if required by law

Our goal is transparency, speed, and member protection.

Your Role in Keeping Your Account Secure

We encourage members to:

  • Use strong passwords

  • Enable device-level security features

  • Keep apps updated

  • Be cautious with external sharing

  • Report suspicious activity immediately to security@swizil.com

Security is a partnership — we protect the platform, and you protect your personal access.

Swizil exists to give you a private, safe place to share your world. Our responsibility is to protect that space — every hour, every day.

Contact Us

Questions or concerns about security? Contact us at security@swizil.com
To report a security vulnerability, please email security@swizil.com
For privacy questions, see our Privacy Policy or contact dpo@swizil.com
Post: Swizil Ltd, 4th Floor, Silverstream House, 45 Fitzroy Street, London W1T 6EB

Last Updated: 15 November 2025