Security & Privacy

Your data security and privacy are our top priorities. Learn how we protect your courses, student information, and intellectual property with enterprise-grade security measures.

AES-256
Data Encryption
TLS 1.3
In Transit
SOC 2
Type II Compliant
99.9%
Uptime SLA

Data Security

We implement multiple layers of security to protect your course content, student data, and intellectual property. Our security infrastructure is built on industry best practices and continuously monitored for threats.

Encryption at Rest

All data stored in our databases is encrypted using AES-256 encryption, the same standard used by banks and government agencies.

Encryption in Transit

All data transmitted between your browser and our servers is protected with TLS 1.3 encryption, ensuring no one can intercept your data.

Secure Infrastructure

Hosted on Google Cloud Platform with enterprise-grade security, redundant systems, and automatic failover across multiple data centers.

Network Security

Advanced firewalls, intrusion detection systems, and DDoS protection monitor and block malicious traffic 24/7.

Authentication & Access Control

We use industry-standard authentication protocols to ensure only authorized users can access your courses and data.

Multi-Factor Authentication (MFA)

Optional MFA adds an extra layer of security using authenticator apps or SMS verification.

Available on all plans

Role-Based Access Control

Assign specific permissions to team members with detailed audit logs.

Professional & Enterprise plans

Single Sign-On (SSO)

Enterprise customers can integrate with existing identity providers.

Enterprise plan

Privacy & Compliance

We are committed to protecting your privacy and complying with global data protection regulations. You maintain full ownership and control of your course content.

GDPR Compliance

Full compliance with the European General Data Protection Regulation.

  • Data processing agreements (DPA) available
  • Right to access and export your data
  • Right to be forgotten (data deletion)
  • Consent management for data collection
  • EU data residency options available

CCPA Compliance

California Consumer Privacy Act compliance ensuring transparency and control.

  • Clear disclosure of data collection practices
  • Opt-out mechanisms for data sharing
  • Access to personal information
  • Data deletion upon request
  • Non-discrimination for privacy rights

SOC 2 Type II

Independent third-party audit of our security controls.

  • Annual audits by certified third parties
  • Security control verification
  • Availability and performance monitoring
  • Confidentiality safeguards
  • Reports available to Enterprise customers

Data Ownership & Portability

You own your content. We provide tools to export, backup, and delete your data at any time.

You Own Your Content

All course materials remain your property. We never claim ownership.

Complete Data Export

Export all your data in standard formats at any time.

Automatic Backups

Daily automated backups with 30-day retention.

Right to Delete

Delete your account and all data at any time.

Contact Security Team

If you discover a security vulnerability, please report it to:

security@caringconsulting.co

We commit to acknowledging your report within 24 hours.

Additional Resources

Last updated: January 2025