This is an archive version of the document. To get the most up-to-date information, see the current version.

Data Sovereignty Violations

This report shows potential data sovereignty violations by listing all protected objects with backups or replicas residing in a different location.

Summary section contains charts that display the sovereignty violations of production data and their copies and replicas.

Data Sovereignty Violations table shows details on the location mismatch of backups, backup copies and replicas for a data source grouped by Veeam Backup & Replication server name.

Objects with no Location Tag table displays all objects in the infrastructure that have no location tag grouped by the type of object.

Report Parameters

You can specify the following report parameters:

  • Scope: defines a list of Veeam Backup & Replication servers to include in the report.
  • Job Type: defines a list of Veeam Backup & Replication jobs to include in the report.
  • Computer Type: defines whether physical computers or virtual machines are included in the report.

Data Sovereignty Violations
Data Sovereignty Violations
Data Sovereignty Violations 

Use Case

Veeam Backup & Replication supports a notion of location which you can assign to virtual infrastructure, backup infrastructure and agent management objects. Location settings helps to monitor where production data and their copies and replicas reside geographically.

The report analyzes whether any backups, backup copies and replicas reside in a location different from a data source and displays results as pie charts. This visual representation will help you identify which jobs and objects violate data protection regulations accepted in your organization.