EducationDynamics uses enterprise-grade security and regular audits to ensure you’re always protected. We undergo annual penetration testing and security reviews designed to be SOC 2 compliant.

We devote significant resources to ensuring that we meet all facets of multiple industry and regulatory best-practices for protecting the Confidentiality, Processing Integrity, Availability, and Privacy of customer data.

  • Change Management: 

EducationDynamics’ software development practices are aligned with industry best practices and follows a defined software development life cycle methodology. This development process introduces security and privacy control specifications during the feature and component design and throughout the development process.

  • Strong Encryption: 

EducationDynamics has deployed secure methods and protocols for transmission of confidential or sensitive information over public networks. Databases housing sensitive customer data are encrypted at rest. EducationDynamics uses only recommended secure cipher suites and protocols to encrypt all traffic in transit and Customer Data is securely encrypted with strong ciphers and configurations when at rest.

  • Access Controls

EducationDynamics uses secure access protocols and processes and follows industry best-practices for authentication, including Multifactor Authentication and Single Sign on (SSO). All production access requires the use of two-factor authentication, and network infrastructure is securely configured to vendor and industry best practices to block all unnecessary ports, services, and unauthorized network traffic. 

  • Vulnerability Management 

EducationDynamics performs automated continuous vulnerability scanning of our environment and contracts with reputable external security firms to perform technical testing against our critical systems. We also employ a suite of tools and processes to perform continuous auditing and monitoring of our infrastructure for suspected malicious activities, unpatched systems, misconfigurations, and other potential vulnerabilities. 

  • Awareness and Background Checks

EducationDynamics conducts background checks on all employees before onboarding, and employees receive comprehensive security awareness at hire and on an ongoing basis. All employees are required to read and acknowledge our information security policies, which include specific provisions for the protection of customer data. 

  • Culture and Code of Conduct

EducationDynamics has developed a code of conduct that addresses acceptable business practices, conflicts of interest, and expected standards of ethical and moral behavior, as well as employee confidentiality agreements that prohibit the inappropriate use and disclosure of customer or company information. These documents are provided to all new employees and are required to be signed prior to the employee’s start date. All employees are also required to sign an acknowledgment form that they received and agree to follow the code of conduct and confidentiality agreement.

  • External Audits

EducationDynamics has completed a SOC2 Type II audit that includes the Security and Processing Integrity Trust Service Criteria. To obtain a copy of our report, please reach out to your Account Manager. 

  • Incident Response

In the event of a security breach EducationDynamics will promptly notify impacted users of any actual or suspected unauthorized access to their systems and data. EducationDynamics has developed detailed response policies and associated procedures and a team is in place to respond to events and incidents.

  • Contact Us

If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact security @ educationdynamics.c