Backup Policy

Last modified: Version 3.6 October 2025

Blue information icon with a lowercase letter i inside a circle.

ISO Statement

oboloo Limited is actively aligning with ISO/IEC 27001:2022 and has implemented this Backup Policy in accordance with Annex A control A.12.3.1 (Information Backup), as well as A.17.1.3 (Testing of backups), and A.9.4 / A.10.1 (Access control and encryption). This policy defines how critical systems and data are backed up, stored, retained, and recovered to support business continuity and information resilience.

Icon of a building with multiple floors and windows representing corporate fare.

Introduction

This Backup Policy defines the standards and responsibilities for the secure backup, storage, and recovery of oboloo Limited’s data and systems. It ensures that business-critical information is protected against loss or damage and can be restored in the event of an incident such as system failure, data corruption, or cyberattack.

Icon of two hands shaking, symbolizing agreement or partnership.

Definitions

- Backup: A copy of data or system information created for recovery and continuity purposes.

- Disaster Recovery: The processes involved in restoring operations after a disruption.

- Critical Data: Any information essential to business operations, including customer data, application configurations, and financial records.

- Retention Period: The amount of time backup data is preserved before secure disposal.

Shopping cart icon with a plus sign indicating add to cart.

Who We Are and How to Contact Us

Company Name: oboloo Limited
Company Number: 12420854
Trading Address: 7 Bell Yard, London, England, WC2A 2JR
Contact: oboloo.com/contact-us

Blue shield icon with a padlock symbol indicating security or protection.

Changes to This Policy

oboloo may revise this policy periodically. All updates will be communicated to staff and service providers where applicable. The latest version will always be accessible on the company intranet or upon request.

Icon of an identification card with a person’s photo and personal information lines.

This policy should be read alongside the following:

- Information Security Policy

- Access Control Policy

- Incident Response Plan

Icon of two connected nodes with one node crossed out, representing a disconnected or broken link.

Purpose

The purpose of this policy is to:

- Ensure the reliable backup of critical information assets.

- Maintain business continuity and operational resilience.

- Protect against accidental or malicious data loss.

- Support compliance with ISO/IEC 27001:2022 and applicable legal or contractual requirements.

Speech bubble with an exclamation mark inside, indicating feedback or alert.

Scope

This policy applies to:

- All production systems and applications containing customer or internal data.

- All databases, file servers, cloud storage services, and hosted environments under oboloo’s control.

- All employees, contractors, and third parties involved in backup processes.

Blue emergency siren icon with light rays.

Backup Procedures

Frequency
- Production Databases: Daily incremental backups and weekly full backups.

- Application Configurations & Logs: Backed up weekly or after significant changes.

- Documents and Shared Storage: Backed up nightly.

Storage
- Backups are encrypted in transit and at rest.

- Data is stored in secure, access-controlled, geographically separate locations.

- Redundant copies are maintained to support disaster recovery objectives.

Retention
- Backups are retained for a minimum of 30 days, with longer retention available for contractual or legal compliance.

- Retention schedules are reviewed annually and updated as necessary.

Disposal
- When no longer required, backup data is securely deleted or destroyed using approved erasure methods.

- Backup media (if used) is disposed of via certified destruction providers or hardware sanitisation procedures.

Blue circular arrows forming a refresh or sync icon.

Testing and Validation

- Backup restore tests are conducted at least twice per year.

- Tests include random file restores, full system recovery simulations, and verification of data integrity.

- Results are documented and reviewed by the Head of Security and retained for audit.

Blue shield icon with a padlock symbol indicating security or protection.

ISO/IEC 27001 Annex A Mapping

- Backup Strategy (A.12.3.1) - Information backup and retention
- Testing & Validation (A.17.1.3) - Verifying recoverability of data
- Access & Security (A.9.4 / A.10.1) - Access control and encryption

Icon of a balanced weighing scale representing justice or fairness.

Review and Update of the Methodology

- Review Cycle: Every 6 months or following major infrastructure changes.

- Change Management: All policy changes are logged and communicated to affected personnel.

- Training: Staff involved in backup processes receive appropriate training.

Icon of a Wi-Fi signal with three curved bars indicating strong connection.

Document Control

Version: 1.1
Date: April 2025
Description: Initial backup policy aligned to ISO/IEC 27001:2022