Security

Security

Overview

This site includes the following security mechanisms to protect its members and their resources:

Passwords

Every account has its own unique user id and password which can be managed by an administrator. In addition, policies can allow an instructor to access and/or reset the passwords of their learners. Login is encrypted using SSL. Every course and group can have an optional password, and every district must be password protected.

Walled communities

By default, your organization is a walled community, which isolates your learners from contact by anyone who is not also in your organization. Organizations can change this policy if they want their learners to be able to enroll in courses with other organizations or message members of the site who are not in their organization.

Authenticated resource access

To prevent resources being accessed by unauthorized members, when someone views a page on the site, all the resources on that page have a special custom code appended to their URL that's unique for the viewer. Our system only allows access to resources whose custom URL matches the account of the viewer. This approach prevents a member from sharing a resource by sending its URL to someone else.

Secure profiles

If an organization is a walled community, learner profile pages can only be seen by members of their organization.

Secure messaging

We apply a strict set of rules to messaging to ensure that members do not receive unauthorized communications. For a list of the rules, visit the messages section.

Communications monitoring

Premium plan members can enable communications monitoring that sends alerts whenever communications include potentially offensive language. For more information about monitoring, visit the policies article.

Secure e-commerce

Our integrated e-commerce system uses Paypal, Authorize.net or Stripe as secure payment gateways, and all communications between our site and these sites are encrypted using SSL. In addition, we do not store any payment information at our site.

Secure storage

We store all files in the Amazon storage system (S3), which is secure and only allows authorized access to those files. We store all data in the Amazon relational database system (RDS) which is secure and password protected.

Secure servers

All our software runs on the Amazon Elastic Computing cloud (EC2), which is secure and password protected. The servers are constantly monitored by our staff and Amazon's own management software.

How do we use your data

Data collected through our websites or registration/subscription to our learning platforms

The data provided by users when registering to use our learning platforms is used in the following ways:

  • To send informative emails to the users on the 14-day Free Trial
  • To send the monthly newsletter to all Free Trial users and paying clients
  • To send product updates to all users
  • Data provided by users on the Free Trial can also be used for marketing campaigns that might be suited for them such as invitations to webinars and events, content marketing campaigns, campaigns to convince users to upgrade to a paid plan, marketing research campaigns related to our platforms and industry, etc.
  • Data provided by paying clients can also be used for marketing campaigns that might be suited for them such as invitations to webinars and events, content marketing campaigns, marketing research campaigns related to our platforms, campaigns to gather product feedback, etc.
  • Phone numbers collected through our automated phone system on our websites are stored in Nextiva and we do not store this data on our company servers. When contacting us through our phone system users agree to give their phone number and we only use phone numbers to respond to inquiries that come through our websites. Paying customers sometimes may require phone support and we provide that service, but we only use the phone numbers provided by clients with their consent.
  • Data provided when subscribing to our blogs is used to send blog updates and future marketing campaigns, similar to the ones mentioned above.

Data hosted by clients on our platforms

Our clients are fully responsible for the data hosted on our platform and how they use it. In this case, they are the "data collector" and we are the "data processor". We only collect the data that clients use when registering for our platforms, which is usually the administrator account of the platform. Clients decide the type of user data they upload and use in our platform and if they want to use our platforms to collect more user data, by allowing users to self-register for their portals.

How long do we store data

Client data such as registration details, company details, data stored by the client in our learning platforms, is stored as long as the client is registered to use our learning platforms. After the 14-day Free Trial, if the user does not upgrade to a paid plan, their registration is terminated and we delete their data.

Personal data gathered through marketing campaigns and website forms (such as contact forms on our websites) is stored until the user decides that they don't want to receive updates from us anymore. We use email marketing to communicate with these contacts and there is an "Unsubscribe" option available in each email. If a person does not interact with our marketing campaigns for a period longer than one year, we will delete the contact information from our database.

Blog subscribers receive blog updates until they decide to stop their subscription. The "Unsubscribe" option is available in each blog update we send out. We do not store phone numbers.

Where do we store data

Clients' data located in the USA is stored on our secure company servers on AWS. Clients' data located in Europe, is stored on the Amazon servers in Frankfurt. Clients' data located in Australia, is stored on the Amazon servers in Australia.

Security measures implemented in our learning platforms

Our learning platforms include the following security mechanisms to protect its members and their resources: passwords, walled communities, authenticated resource access, secure profiles, secure messaging, communications monitoring, secure e-commerce, secure storage, secure servers. All communications are over HTTPS, all personal passwords are encrypted with individual SALT values, we use a rate limiter to prevent script kiddies or malicious attackers from overwhelming the system, our Amazon servers are hosted in their own VPC (virtual private cloud), and all remote ssh logins are protected using public/private keys. We conduct regular security audits and run daily security tools on our site to automatically detect and report security issues. You can easily prevent selected users from logging in, revoke their access rights, or delete them entirely if necessary. You can configure your site security policies to specify which operations can be performed by specific account types.

We provide Policy documents for our clients to use on their portals. This feature gives clients the framework to create documents that describe their privacy policy and require users to accept their privacy policy.

How do we use data shared through Google SSO and Google Drive

We use the information provided by users such as their email address for authentication through Google Workspace single sign-on and for accessing the files in Google Drive of the user if they use this integration in our platform. We don't alter in any way the user data in Google Drive and we only store the data in our system if the user wants this. We do not use Google user data in any other way.

    • Related Articles

    • Messages

      Overview The platform has a built-in, private messaging system that does not require an email address. To quickly view messages: Click the Messages icon on the top navigation bar. To read a message, click its subject. You can reply to a message ...
    • Forums

      Overview Several areas of the platform, such as courses/classes and groups, can include discussion forums. Discussion forums can be installed or uninstalled by an administrator. Participating in a forum To participate in a forum: Access a course or ...
    • Chat

      Overview A chat room allows users to exchange messages and collaborate in real-time. There are three ways to use chat on the platform: Interact with other users in a course or class chat room. Interact with other users in a group chat room. Chat ...
    • Accessibility

      Overview The platform is continually being improved to enhance accessibility, ensuring that all students, including those with disabilities, can access and enjoy using it. If you have feedback on the current accessibility of the platform, please ...
    • Blogs

      Overview The platform supports personal blogs, course/class blogs, groups blogs and portal blogs so that users can share their reflections, comments and thoughts on a wide variety of learning topics. The blog app can be installed or uninstalled by an ...