Security & Compliance

Data Storage & Privacy

How Geordy handles your data with a privacy-first approach

Geordy does not collect, store, or process private user data from your website. All generated files (YAML, Markdown, JSON, etc.) contain only public content—the same data visible to visitors or search engines.

Key Principles

No Tracking or Analytics

No analytics, tracking scripts, or cookies are embedded in your generated files.

No Sensitive Data Extraction

No proprietary or sensitive information (e.g., passwords, PII) is extracted from your website.

Public Content Only

Geordy processes only publicly accessible content that's already visible to search engines and visitors.

Minimal Metadata

Only essential operational data is retained: domain names, timestamps, and debugging logs.

What Data Geordy Retains

Geordy's infrastructure retains minimal operational metadata necessary for service functionality:

  • Domain names – To identify which domains are connected to your account
  • File generation timestamps – To track when files were last updated
  • Log entries – For debugging purposes only, with automatic purging

This metadata is used exclusively for service operation and is never shared with third parties.

Your Website

Public content only

Page titles
Meta descriptions
Public URLs

Geordy Processing

Privacy-first approach

No tracking
No PII extraction
No sensitive data

Structured Formats

AI-ready files

YAML
JSON
Markdown

Only public, non-personal data is processed

GDPR & Privacy Compliance

Geordy's privacy-first architecture aligns with GDPR and other privacy regulations:

  • Data minimization – Only essential data is processed
  • Purpose limitation – Data is used only for file generation
  • Storage limitation – Logs are automatically purged
  • Transparency – Clear documentation of data handling practices

Data Security Measures

All data handled by Geordy is protected with industry-standard security measures:

  • Encrypted data transmission (TLS 1.3)
  • Secure storage with access controls
  • Regular security audits and updates
  • Isolated hosting environments per domain
Ask Geordy