Frequently Asked Questions
Does Nila adhere to Information Security Standards?

We have an Information Security Management System (ISMS) in place derived from ISO standards, which takes into account our security objectives and the risks and mitigations concerning all the interested parties. We have achieved ISO 27001, ISO27017 & ISO27018 certifications to demonstrate our compliance with the standards.

Where is my data stored? Can I choose where my account and data will be located?

The Data Center where your data is stored is selected automatically based on the country chosen by you while signing up for Nila. The information regarding which Data Center has been selected is displayed right below the Country picklist in the sign up form.

At any instant, you can know which Data Center your data resides in by looking at the URL on the browser when you are logged in to Nila and are using our applications, or by clicking here.

If the URL is in the format of .nila.design, then your data is stored in the US(United States) DC.

Will Nila employees have access to our data and what data will they have access to?

Access to your data is restricted to a small number of employees on a need-to-know basis in order to provide you with technical support. This access is reviewed periodically.

Is data stored on Nila cloud products encrypted?

We encrypt customer data both in transit and at rest. Data at rest is encrypted using industry-standard AES-256. All customer data is encrypted in transit over public networks using Transport Layer Security (TLS) 1.2/1.3 with Perfect Forward Secrecy (PFS) to protect it from unauthorized disclosure or modification. To know more about encryption at Nila, click here.

How are encryption keys managed, and can customers upload their own keys?

We own and maintain the keys using our in-house Key Management Service(KMS). Currently, there is no provision for customers to upload their own keys.

How are passwords for Nila cloud services stored?

The passwords you use to access Nila are stored in a non-reversible encryption scheme. We use bcrypt hashing algorithm with per-user-salt, so that even if our login database was stolen, it would be prohibitively expensive to reverse engineer the passwords.

How is customer data segmentation implemented in Nila cloud services?

Our framework distributes and maintains the cloud space for our customers. Data of multiple customers is logically separated from each other and our framework ensures that no customer's service data becomes accessible to another customer.

How does Nila protect itself against DDos attacks?

We use technologies from well-established and trustworthy service providers, who offer multiple DDoS mitigation capabilities to prevent disruptions caused by such attacks.

Does Nila conduct penetration tests and code scans?

Yes, we conduct automated and manual penetration testing efforts regularly. We use a combination of certified third party scanning tools and in-house tools for scanning codes.

I found a vulnerability in one of your products. How do I report it?

If you discover a vulnerability in one of our products, you can let us know so that we can fix it as soon as possible. We also have a responsible disclosure policy and bug bounty program. Please find further details at https://bugs.zohosecurity.com/

Does Nila have an incident response program?

We have a dedicated Incident Response Team which is responsible for incident detection, assessment, forensics, containment, and recovery activities. In cases where we are controllers of data and an incident leads to a data breach, the affected customers will be notified within 72 hours after we become aware of it. In cases where we are processors of data and an incident leads to a data breach, the respective controllers will be informed without undue delay.

For general incidents, we will notify users through our blogs, forums, and social media. For incidents specific to an individual user or an organization, we will notify the concerned party through email (using their primary email address). The Complete report will be provided to customers on request within 5 to 7 working days.

What are Nila's responsibilities in the event of a security incident?

We notify the incidents that apply to you, along with suitable actions that you may need to take. We track and close the incidents with appropriate corrective actions. Whenever applicable, we provide you with necessary evidence regarding incidents that apply to you. Root Cause Analysis will be provided on request.

Is Nila PCI DSS compliant?

The Payments service that the customers use to purchase subscriptions of Nila is PCI compliant.

Nila never transmits or stores your credit card details.

As a customer of Nila, what are the additional security options I have to protect my data?

Additional security features that can be availed by customers:

  • Multi factor Authentication
  • Configurable password policy
  • IP restrictions
  • Role based Access control
  • Encryption for custom fields
  • Account activity audit
If a customer discontinues Nila, how long is their data retained?

We hold the data in your account as long as you choose to use Nila. Once you terminate your Nila user account, your data will eventually get deleted from active database during the next clean-up that occurs once in 6 months. The data deleted from the active database will be deleted from backups after 3 months.

What is Nila's business continuity and disaster recovery plan?

We have a business continuity plan for our major operations such as support and infrastructure management. For redundancy, Data in primary Data Center (DC) is replicated in the secondary. In case of failure of the primary DC, secondary DC takes over and the operations are carried on smoothly with minimum or no loss of time.

What is your data backup policy?

We run full back-ups once a week and incremental back-ups everyday. Back-up data in a DC is stored in the same location and encrypted at rest, as the original data. We additionally restore and validate backups every week. A retention time of 3 months is applicable for all backed up data. In case of a request from a specific customer, we will restore their data from the backup and make it available to them.

What controls you have in place while accessing customer data?

We employ technical access controls and internal policies to prohibit employees from arbitrarily accessing user data. We adhere to the principles of least privilege and role-based permissions to minimize the risk of data exposure. Access to production environments is facilitated through a separate network with stricter rules and hardened devices. Access control is maintained by a central directory and authenticated using a combination of strong passwords, two-factor authentication, and passphrase-protected SSH keys.

What is your availability SLA commitment?

Our availability SLA commitment is 99.9% monthly uptime. We have redundancies implemented at various levels starting from the infrastructure to the ISP to achieve this. Data from the primary data center is replicated in the secondary, and a read-only version of Nila apps is always served from the secondary data center.

What is your risk assessment process? How often is risk assessment performed?

We have a risk assessment policy and procedure to identify, analyze and mitigate risks by implementing appropriate controls. We perform risk assessment for every major change that happens in our environment. The overall risks are reviewed and updated once in a year.

What is your employee background verification policy?

Each employee undergoes a process of background verification. We hire reputed external agencies to perform this check on our behalf. We do this to verify their criminal records, previous employment records if any, and educational background. Until this check is performed, the employee is not assigned tasks that may pose risks to users.

Will you share my data for the purpose of law enforcement?

We always provide utmost importance to customer’s privacy. When we receive requests from law enforcement authorities, we review such requests to see if the applicable legal process is followed to obtain a valid and binding order. We object to overboard or otherwise inappropriate requests. Unless prohibited by law, we notify customers before disclosing customer data so that the customers can seek protection from disclosure.