As an open-source data company, at HASH we understand the value that’s contained within your personal and business information. That’s why we take every possible measure to secure and encrypt your information, and are mindful whenever we collect it. On this page you’ll find a transparent overview of who we are, what data we collect, and why. “HASH” refers to:
In addition to developing our open-source platform, HASH is a company that also provides:
We collect data for a number of reasons.
We comply globally with the strictest standards of data protection, going above and beyond measures set out in the EU’s General Data Protection Regulations (GDPR). We apply these high standards to all of our users worldwide, not just those within Europe.
Users may submit information on the HASH platform via form fields, checkboxes, radio buttons or other interactive inputs, or through integrations with third party providers (for example when using Google or LinkedIn to log in to a HASH account, where accounts from these providers may have been associated).
Certain user-submitted Public Information such as name and profile photo will be visible by anybody with an internet connection who visits your HASH profile page. This information can be edited or removed at any time by logging in.
Users may also store Private Information within HASH for processing. This includes contact details which users have not elected to make public, as well as HASH working files, which are private by default. To access a private file, you must either be its creator, or have been invited by an existing user with sharing permissions. As a file creator, you can choose to share your work with individual users and organisations, or alternatively make it publicly accessible to anybody with a link.
We store and process data both internally and on cloud servers provided by a number of external providers.
|Provider||What is stored||Regions stored in|
|BACKBLAZE||User-uploaded images, audio, and video||US|
|User-uploaded models, algorithms, and datasets||UK, US, EU (based on user preferences)|
|MICROSOFT||User-uploaded models, algorithms, and datasets||UK, US, EU (based on user preferences)|
|AMAZON||User-uploaded models, algorithms, and datasets||UK, US, EU, + 3 others (based on user preferences)|
The cost of storing and processing data may differ by region, but your Private Information will always be stored in an encrypted format at all times.
For most ordinary users we believe that standard encryption is sufficient, however politically sensitive or incredibly commercially sensitive clients may wish to take advantage of the greater level of protection afforded by Mylar.
You can modify or delete your data at any time by logging into your account and overwriting field data, or by using the ‘delete’ buttons found adjacent to many files or elements in HASH. You can also remove all search history and personalised suggestions by clearing your account history.
You can also delete your account completely at any time by visiting the user preferences panel of your account. Please note: once an account is deleted, it may be impossible to recover. If your account is part of a HASH organisation, you may need to wait for administrator approval before any data linked to that organisation which may also be associated with your account is deleted.
Not only do we not share user Private Information with third-parties, we cannot access it ourselves. That being said, we utilise a number of third-party software products and data processors when analysing platform data, and for the purposes of communicating with users. For the sake of transparency, these are outlined below.
|Data processor||What we use them for|
|Platform analytics and reporting|
|Mapbox||Visually representing certain geospatial user data|
|Stripe||Processing user payments|
|Sentry||Error tracking within the platform|
|MailChimp||Email communication with some users|
|Amazon||Email and SMS communication with some users|
|Twilio||SMS, WhatsApp and other instant messenger communication with some users|
|Intercom||Providing customer support to users via live chat|
|Zendesk||Providing customer support to users via our helpdesk|
|Segment||Aggregating, cleaning and managing user data to ensure permissioned access|
|Clearbit||Enhancing and cross-referencing user data to ensure it is accurate and up-to-date|
|Cloudflare||Securely delivering information via their Content Delivery Network|
|Gravatar||Displaying user profile pictures in relation to hashed emails|
Before using any third-party provider, we consider the nature of the information being processed on their platform, and the strength of the security policies and practices they have in place. The history of the company, the competency of its team, and the criticality of the user data we ask them to process all weigh on our decision whether or not to use a given third-party provider. No decision is taken lightly, and we regularly review the data processors we work with to protect our userbase’s interests. We welcome feedback from the community on what standards we should expect of our partners, as well as any concerns or feedback that might relate to existing ones.
The providers that host HASH and process our user’s sensitive data maintain a multitude of certifications, including (where relevant) ISO 27001, ISO 27017, ISO 27018 and PCI DSS certifications. They are also subject to regular SOC reporting. If you are interested in finding out more about certification and compliance within our supply chain please contact us.