Security & Privacy
Your data security and privacy are our top priorities. Learn how we protect your courses, student information, and intellectual property with enterprise-grade security measures.
Data Security
We implement multiple layers of security to protect your course content, student data, and intellectual property. Our security infrastructure is built on industry best practices and continuously monitored for threats.
Encryption at Rest
All data stored in our databases is encrypted using AES-256 encryption, the same standard used by banks and government agencies.
Encryption in Transit
All data transmitted between your browser and our servers is protected with TLS 1.3 encryption, ensuring no one can intercept your data.
Secure Infrastructure
Hosted on Google Cloud Platform with enterprise-grade security, redundant systems, and automatic failover across multiple data centers.
Network Security
Advanced firewalls, intrusion detection systems, and DDoS protection monitor and block malicious traffic 24/7.
Authentication & Access Control
We use industry-standard authentication protocols to ensure only authorized users can access your courses and data.
Multi-Factor Authentication (MFA)
Optional MFA adds an extra layer of security using authenticator apps or SMS verification.
Role-Based Access Control
Assign specific permissions to team members with detailed audit logs.
Single Sign-On (SSO)
Enterprise customers can integrate with existing identity providers.
Privacy & Compliance
We are committed to protecting your privacy and complying with global data protection regulations. You maintain full ownership and control of your course content.
GDPR Compliance
Full compliance with the European General Data Protection Regulation.
- Data processing agreements (DPA) available
- Right to access and export your data
- Right to be forgotten (data deletion)
- Consent management for data collection
- EU data residency options available
CCPA Compliance
California Consumer Privacy Act compliance ensuring transparency and control.
- Clear disclosure of data collection practices
- Opt-out mechanisms for data sharing
- Access to personal information
- Data deletion upon request
- Non-discrimination for privacy rights
SOC 2 Type II
Independent third-party audit of our security controls.
- Annual audits by certified third parties
- Security control verification
- Availability and performance monitoring
- Confidentiality safeguards
- Reports available to Enterprise customers
Data Ownership & Portability
You own your content. We provide tools to export, backup, and delete your data at any time.
You Own Your Content
All course materials remain your property. We never claim ownership.
Complete Data Export
Export all your data in standard formats at any time.
Automatic Backups
Daily automated backups with 30-day retention.
Right to Delete
Delete your account and all data at any time.
Contact Security Team
If you discover a security vulnerability, please report it to:
We commit to acknowledging your report within 24 hours.