This document is a summary of the data security policies for Chaind Limited (doing business as Nanumo) ('Nanumo', 'we', 'us', or 'our',) and is a non-exhaustive summary of the key steps that we take to secure customer (’you, ‘your’, ‘yours’) data when you use our services ('Services') as provided via the Nanumo platform.
Nanumo stores and processes customer data in accordance with global regulations and to a level that meets industry best practices. In summary our principles include:
We take care to work only with reputable and secure suppliers and to ensure high standards of security when storing and processing customer data.
Amazon Web Services EMEA SARL (AWS Europe) are our primary supplier of compute and storage infrastructure. Our compute and storage infrastructure is located in the UK and all data processing takes place in the UK. Some non-customer data (e.g. websites, content and documents) is stored in other regions for redundancy and availability purposes.
Google provide us with authentication, administration and non-customer data storage and processing services. Data may be processed in Europe or the US
Datadog Europe provide logging, application metric and monitoring services to us through their German subsidiary. No customer data is processed by Datadog and all of the data processed by Datadog remains within the EU.
Personally Identifiable Information (PII) is segregated and controlled independently from other business data. A strict boundary is maintained around personal data storage locations and only tokenised PII (i.e. non-identifiable representations of PII) are permitted to be stored outside of the boundary.
Employee access to company data is controlled, monitored and audited in accordance with industry best practices. The Least Privilege principle underpins our employee access strategy and ensures that employees only have access to the data that they need to complete their tasks.
Employee access is monitored, logged and centrally controlled.
Access to segregated personal data is further restricted with strict audit policies in place for accessing personal data in exceptional circumstances.