Encryption in transit and at rest
TLS 1.3 between every client and SmartBooks. AES-256 at rest on all stored data. Database backups encrypted, key-managed and rotated automatically.
SmartBooks handles regulated UK accounting data. Every architectural decision starts with HMRC and ICO obligations, not with a feature wishlist. This page documents how that holds up — sub-processors, certifications, encryption, access controls and our published incident process.
These are the floors, not the ceilings. Each pillar has an associated runbook, owner and audit cadence inside the operating team.
TLS 1.3 between every client and SmartBooks. AES-256 at rest on all stored data. Database backups encrypted, key-managed and rotated automatically.
Primary infrastructure is on UK and EU regions. Document storage, database and backups all stay within the UK/EU. Edge nodes serve cached static assets only.
Full UK GDPR compliance. ICO-aligned data-processing register. Data subject access requests (DSARs) handled within statutory time-frame. Sub-processor list published and updated.
Granular roles for firm partners, bookkeepers, reviewers and clients. Every action logged with actor, IP, user agent and timestamp. Audit log is read-only and exportable.
Every MTD VAT, MTD ITSA and Self Assessment submission stored with the full payload, HMRC receipt, response and bookkeeper approval. Replayable for any HMRC enquiry.
No submission to HMRC happens without explicit approval by a named bookkeeper. No payment is collected without an invoice issued by an approved user. Automation cannot bypass the approval layer.
We won’t claim a badge we don’t hold. This table reflects current status. Items marked “roadmap” have a target year — we’ll publish the certificate the moment it’s issued.
Sub-processors handle specific workloads under written instructions and a data-processing agreement. We publish the list and notify customers of additions in advance.
We operate a coordinated disclosure process. Report vulnerabilities to security@usesmartbooks.com with reproduction steps. We acknowledge within one working day, triage within three, and publish a fix timeline within ten.
Pilot cohorts get the full security review pack — sub-processor list, DPA, encryption attestation and incident-response playbook. Book a demo or join the waitlist.
Running a firm? Book a 15-minute demo.