esc
Let’s find time to talk
Thanks for getting in touch!
Your info has been delivered to the team. Keep an eye on your email inbox, we’ll be reaching out soon.
Got it
Oops! Something went wrong while submitting the form.

🎉 Nash raises $27.8M in total funding to power reliable, local delivery for businesses‍

Nash logo
How It WorksWho We AreCareersBlog
Contact Us
Twitter Nash icon
LinkedIn Nash icon
Effective Date: 03/01/2021

Security

The entire Nash team is dedicated and committed to keeping your data safe. We adhere to industry-leading standards to manage our network, secure our application, and set policies across our organization. If you believe you have discovered a problem or have any questions, please contact us at support@usenash.com.

Communications & Connections

  • Nash forces HTTPS for all services using TLS (SSL), including our public website, API, and user dashboards.
  • Any attempt to connect over HTTP is redirected to HTTPS.
  • All connections to Nash services internally and externally are encrypted by default, in both directions using modern ciphers and cryptographic systems. We will never connect to a data source using an unencrypted connection.
  • We regularly audit the details of our implementation, including the certificates we serve, the certificate authorities we use, and the ciphers we support

Physical

  • Nash's servers are hosted in Amazon Web Services. Physical and environmental security is handled entirely by Amazon and their vendors. Amazon provides an extensive list of compliance and regulatory assurances, including SOC 1, 2, and 3, and ISO27001. See Amazon compliance and security docs for more detailed information.
  • All data in Nash is encrypted at rest and in transport

Nash Company Policies

  • Nash mandates that employees act in accordance with security policies designed to keep customer data safe.
  • Nash requires sensitive data to be encrypted using industry-standard methods when stored on disk or transmitted over public networks.
  • Nash controls access to sensitive data, application data, and cryptographic keys.
  • Two-factor authentication and strong password controls are required for administrative access to any of our systems.

Compliance & Privacy

  • Nash's Privacy Policy can be found here
Content
Communications & ConnectionsPhysicalNash Company PoliciesCompliance & Privacy
© 2022 Nash. All right reserved.
Privacy PolicySecurity
Twitter Nash icon
LinkedIn Nash icon