AcumenEd Logo
Security

Enterprise-Grade Security

Student data security is our highest priority. We implement comprehensive security controls to protect the sensitive information schools trust us with.

Defense in Depth

Our Security Approach

Multiple layers of security controls protecting your data at every level.

Data Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

TLS 1.3 for all network communicationsAES-256 encryption for data at restEncrypted database backupsSecure key management with rotation

Access Controls

Role-based access ensures users see only the data they're authorized to access.

Role-based access control (RBAC)Multi-factor authentication (MFA)Single sign-on (SSO) supportAutomatic session timeout

Infrastructure Security

Enterprise-grade cloud infrastructure with multiple layers of protection.

SOC 2 Type II compliant cloud hostingNetwork segmentation and firewallsDDoS protectionGeographic data residency (US)

Monitoring & Logging

Comprehensive audit trails and real-time monitoring detect anomalies.

Complete audit logs of data accessReal-time security monitoringAutomated threat detection24/7 incident response

Data Protection

Robust backup and recovery procedures ensure data availability.

Daily automated backupsPoint-in-time recovery capabilityGeographic redundancyRegular disaster recovery testing

Employee Security

All team members undergo security training and background checks.

Background checks for all employeesAnnual security awareness trainingLeast-privilege access principlesSecure development practices
Verified

Compliance & Certifications

Third-party validated security and privacy controls.

SOC 2 Type II

Annual audit of security, availability, and confidentiality controls

FERPA Compliant

Full compliance with student privacy regulations

COPPA Compliant

Protection of children's personal information

Student Data Privacy Pledge

Signatory to the national student data privacy commitment

Responsible Disclosure

Vulnerability Disclosure

We welcome responsible security research. If you discover a potential vulnerability, please report it to us.

Reporting Guidelines

  • Email security reports to security@acumened.com
  • Include detailed steps to reproduce the issue
  • Allow us reasonable time to address the issue before disclosure
  • Do not access or modify other users' data

We commit to acknowledging reports within 48 hours and keeping you informed of our progress.

Continuous Improvement

Ongoing Security Practices

Security is not a one-time effort. We continuously improve our security posture.

Regular Assessments

  • Annual penetration testing by third parties
  • Quarterly vulnerability scans
  • Continuous automated security testing
  • Regular code security reviews

Incident Response

  • Documented incident response procedures
  • 24/7 security monitoring and alerting
  • Regular incident response drills
  • Post-incident analysis and improvement

Security Questions?

Our security team is available to discuss our practices or provide additional documentation.

Ready to Trust AcumenEd with Your Data?

Schedule a demo to see our security practices in action.