Policies

Business Continuity & Disaster Recovery Plans

Last Updated: January 22, 2025

Business Continuity Plan The Business Continuity plan aims to minimize interruptions to normal operations, limit the extent of disruptions and damage in disasters, and establish alternative means of operation in the event of emergencies. The Business Continuity describes the types of disruptions, the roles of key personnel in continuity planning and disruption response, the applications...

Cloud Security

Last Updated: January 14, 2025

Standards Compliance Our development team designs and maintains architecture, access rules, logging, and monitoring/alerting in our production cloud environment that aim to achieve compliance with the CIS AWS Benchmark. An internal review is performed annually for all scored, Level 1 controls, with the reviewers, date, and benchmark score recorded. Remediations for noncompliances are maintained, prioritized, and...

Control Self-Assessment

Last Updated: January 14, 2025

Objective To continuously monitor the effectiveness of controls implemented in support of Nested Knowledge policies. Procedure Revision History Author Date of Revision/Review Comments K. Cowie 10/14/2024 Reviewed K. Holub 02/24/2023 Drafted

Copyright Complaint Policy

Last Updated: November 6, 2024

The purpose of this policy is to describe the process for filing notices of copyright infringement in accordance with the Digital Millennium Copyright Act (DMCA). 17 U.S.C. § 512, et al. DMCA Safe Harbor Pursuant to the DMCA Safe Harbor, Nested Knowledge, a software service provider, will not be liable for copyright infringement of materials...

Data Classification Policy

Last Updated: January 14, 2025

The purpose of this policy is to categorize, describe, and determine the level of protection required for various types of Nested Knowledge data. Scope Nested Knowledge Data: company data is information generated by or for, owned by, or otherwise in Nested Knowledge’s possession. Company data includes, but is not limited to, research data, business data,...

Document Retention Policy

Last Updated: January 14, 2025

The document retention policy exists to reduce risks, eliminate waste, and abide by relevant laws by specifying procedures pertaining to the retention, storage and deletion of physical and digital records. Scope and Definitions: This policy affects all Nested Knowledge employees, contractors, consultants, and business partners. Digital records include contracts, operating agreements, tax returns, emails, chats,...

End-User Device Policy

Last Updated: January 14, 2025

To mitigate risks and vulnerabilities individual personnel are responsible for ensuring that the computers and devices used to access Nested Knowledge services and systems are protected by basic security measures. Scope: This policy affects all employees, contractors, and consultants of Nested Knowledge. Definitions: End-User Device Policy We require end-user devices to be protected by the...

Escalation to Client or Customer

Last Updated: January 22, 2025

Any employee or contractor who discovers any event of a questionable, fraudulent, or illegal nature should: These reports should be made without fear of retaliation. The incident response team will evaluate the incident and determine whether to notify the client. Situations that require escalation to the client include: Timeline When an incident has occurred, Nested...

GDPR Policy

Last Updated: January 14, 2025

Nested Knowledge is located in the United States and provides software services to users in the European Union. Scope: GDPR applies to the processing or controlling (by companies in ANY location) of personal data belonging to data subjects in the EU. Key Terminology: GDPR Compliance Policy Nested Knowledge is committed to processing data in a lawful,...

Incident Management and Response

Last Updated: January 22, 2025

This Incident Response Plan exists to ensure that we consistently handle information security events in an effective and efficient manner. Scope This policy offers guidance for employees, contractors, and consultants of Nested Knowledge who believe they have discovered or are responding to a security incident. Affected Systems This policy applies to all computer and communication...

Have a question?

Send us an email and we’ll get back to you as quickly as we can!