SOC 2 Type II Certified GDPR Compliant FERPA & COPPA Aligned

Security & Compliance

LearnFlow prioritizes the protection of your data with enterprise-grade security, transparent compliance practices, and industry-leading standards tailored for educational technology.

Independently Verified & Audited

Our security posture is continuously validated by third-party auditors and aligned with global regulatory frameworks.

SOC 2 Type II

Annual audits verifying security, availability, and confidentiality controls.

GDPR

Full compliance with EU data protection regulations and user rights.

FERPA

Protects student education records and privacy in the United States.

COPPA

Safeguards children's online privacy and parental consent processes.

CCPA

California Consumer Privacy Act compliance for California residents.

ISO 27001

Internationally recognized information security management standard.

security framework -->

Built for Security by Design

Our infrastructure and development practices follow a defense-in-depth approach to protect learner and institutional data.

Encryption at Rest & in Transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Keys are managed via AWS KMS with automatic rotation.

Strict Access Controls

Role-based access control (RBAC), multi-factor authentication (MFA), and least-privilege principles govern all system access.

Secure Cloud Infrastructure

Hosted on AWS with VPC isolation, WAF, DDoS protection, and continuous infrastructure monitoring.

Privacy by Design

Data minimization, purpose limitation, and privacy impact assessments are embedded into our product development lifecycle.

Regulatory Alignment & Adherence

Detailed breakdown of how LearnFlow meets and exceeds global educational and data protection requirements.

LearnFlow processes EU citizen data in full compliance with GDPR. We maintain a Data Processing Agreement (DPA), provide data portability, and honor right-to-erasure requests within 30 days. Our EU data resides in Frankfurt region infrastructure.
Our systems undergo annual third-party audits for SOC 2 Type II controls covering security, availability, and confidentiality. We maintain an ISO 27001-certified Information Security Management System (ISMS) with continuous monitoring and corrective action tracking.
LearnFlow complies with FERPA by ensuring directory information is only shared with explicit consent. For users under 13, COPPA mandates parental verification before account creation. Student data is never sold or used for behavioral advertising.
California residents can exercise rights to access, delete, or opt-out of the sale of personal information. LearnFlow does not sell user data. We maintain an automated CCPA request verification and fulfillment workflow.

How We Handle Your Information

Transparent policies governing data collection, storage, sharing, and deletion across the LearnFlow platform.

Data Collection

We only collect data necessary for account creation, course progress tracking, payment processing, and platform improvement. No hidden tracking or third-party data brokers.

Data Storage

Encrypted databases with automated backups in geographically redundant AWS regions. Retention policies automatically archive or purge inactive data per regulatory requirements.

Data Sharing

We do not sell user data. Information is shared only with essential service providers (payment, hosting, analytics) under strict data processing agreements and pseudonymization where possible.

Data Deletion

Users can request permanent account deletion via dashboard or support. All personally identifiable information is securely wiped from primary and backup systems within 30 days.

Monitoring & Breach Response Protocol

Proactive threat detection and structured incident management to ensure rapid containment and transparency.

1

Continuous Monitoring

24/7 SIEM monitoring, automated threat detection, and real-time log analysis across all infrastructure layers.

2

Rapid Containment

Automated isolation protocols and security team escalation within 15 minutes of anomaly detection.

3

Investigation & Forensics

Comprehensive root-cause analysis, timeline reconstruction, and impact assessment by certified security analysts.

4

Transparent Disclosure

Timely notification to affected users and regulators within statutory timeframes, with detailed remediation steps.

Have Security or Compliance Questions?

Our Trust & Security team is available to assist institutions, enterprises, and users with compliance documentation, audit support, and security inquiries.