Prioritizing Data Security

 Data Privacy


 
Sheild.png

Your identity is never shared with administrators.

 
Sheild.png

Personal data is never sold to third parties.

 

Our Promises on Data Security


ownership.png

OWNERSHIP

You own your data at every stage and can always request its return or deletion.

 
redundancy.png

REDUNDANCY

All information is synchronously stored in both primary and secondary geographically distributed databases to ensure that data is never lost.

identity.png

IDENTITY

We display data in groups of four or more to ensure teachers can’t be identified.

 
audits.png

ROUTINE AUDITS

Our security procedures are regularly checked through independent, third-party audits.

encyrption.png

ENCRYPTION

Data at rest on the primary and failover disks is secured with the industry standard AES-256 encryption algorithm.

 
access.png

ACCESS

Our internal administrators maintain control over each level of user.