Culture of security
Infinite Campus is dedicated to protecting the confidentiality, integrity, and availability of all our systems and your data. As part of this mission, we utilize a thorough information security plan that is regularly reviewed and updated based on emerging security threats and developments. This plan ensures Infinite Campus implements and maintains the appropriate safeguards to protect the confidential data of our K12 stakeholders.
:quality(70))
Security highlights
SOC 2 Audits
Code and Application Scanning
DDoS Protection
Penetration Testing
Innovation vs. Acquisition Model
Employees vs Contractors
Regular security audits and assessments
We conduct regular security audits (SOC 2 Type 2), vulnerability assessments, and penetration tests to identify and address potential security risks. This proactive approach helps us stay ahead of emerging threats and maintain a secure environment.
:quality(70))
Incident response
We have dedicated incident response staff to rapidly resolve problems. We also have a detailed incident response plan in place, including procedures for identifying, containing, and mitigating security breaches, as well as notifying affected parties and regulatory authorities as required.
:quality(70))
Encryption
All data transmitted between users and our systems is encrypted using industry-standard protocols (e.g., TLS/SSL). This protects data from being intercepted or accessed by unauthorized parties during transmission.
:quality(70))
Compliance with federal and state regulations
We adhere to all relevant federal and state data privacy laws, including Family Educational Rights and Privacy Act (FERPA) and Children's Online Privacy Protection Act (COPPA). This ensures that our systems meet stringent legal requirements for data protection.
:quality(70))
Secure hosting environments
Our systems are hosted in secure data centers that comply with industry standards for physical and network security. These data centers are equipped with advanced security measures, including firewalls, intrusion detection systems, vulnerability scanners, and Denial of Service (DDoS) protection.
:quality(70))
Employee training and awareness
We provide ongoing training and awareness programs for our employees to ensure they understand the importance of data security and are equipped to follow best practices. This includes training on recognizing and responding to security threats, such as phishing attacks.
:quality(70))
Data backup and recovery
We implement comprehensive data backup and recovery procedures to ensure that data can be restored in the event of a disaster or data loss. This includes regular backups and tested recovery processes.
:quality(70))