Security and Privacy

Eduframe Trust Portal

Self-service access to security, data privacy and compliance documents

The Eduframe Trust Portal serves as your central resource for information about Eduframe’s dedication to security and compliance. Whether you’re a potential customer or an existing one conducting due diligence, this portal provides the essential resources to assess Eduframe as a reliable partner.

Here, you’ll find Third-Party Audit Reports, which offer independent verification of the security controls and practices in place for Eduframe’s cloud-hosted services, as well as Compliance Documentation outlining how Eduframe meets industry data protection standards and regulatory requirements.

We invite you to explore the portal to gain a thorough understanding of Eduframe’s steadfast commitment to protecting your data and fulfilling your compliance needs.

Quick Summary

  • Annual third-party penetration testing

  • Will enter into a DPA

  • Deletes customer data on request
  • One or more annual third-party audit(s)
  • Has a disaster recovery plan
  • Has cyber insurance

Compliance & Conformance

Eduframe & FERPA

FERPA (34 CFR Part 99) governs how U.S. educational institutions handle student education records. The Department of Education provides guidance and training but does not accredit or certify vendors. Eduframe supports institutional FERPA compliance by:

  1. acting as a data processor under contract (no secondary use or sale of Student PII);
  2. implementing administrative, technical, and organizational safeguards aligned to SOC 2 Type II;
  3. operating with GDPR-aligned privacy practices; and
  4. maintaining 1EdTech Data Privacy certification to demonstrate sector-specific controls and transparency.

Documentation (DPA/security pack) is available below.

Documents

Controls

  • Firewall access restricted
  • Intrusion detection system utilized
  • Network firewalls utilized
  • Network and system hardening standards maintained
  • Log management utilized
  • Data encryption utilized
  • Password policy enforced
  • Vulnerability and system monitoring procedures established
  • Continuity and disaster recovery plans tested
  • Incident response plan tested
  • Development lifecycle established
  • Whistleblower policy established
  • System changes externally communicated
  • Support system available
  • Access reviews conducted
  • Access requests required
  • Production deployment access restricted
  • Change management procedures enforced
  • Risks assessments performed
  • Data classification policy established
  • Data retention procedures established

Request documents

Request access to the following document(s) *