If you have any legal notes regarding our processing of personal data or about Privacy Policy, Terms of Service or our Copyright policy you may contact legal@wearelearning.io
Security Policy
Last updated:
1. Security Governance
- We have a Security Steering Group (SSG) who oversees our security posture and reports directly to our board.
- Every team member is informed of their security responsibilities, promoting a culture of accountability and vigilance.
2. Data Protection and Privacy
- Our data, both in transit and at rest, is encrypted to safeguard its confidentiality and integrity.
- We classify our data meticulously and manage it according to its sensitivity, ensuring compliance with global data protection regulations.
- Annual audits are planned to ensure ongoing compliance with standards such as GDPR and CCPA, reinforcing our commitment to data privacy.
3. Access Control
- By adhering to the principle of least privilege and implementing role-based access control (RBAC), we ensure that access to sensitive information is strictly regulated.
- Multi-factor authentication (MFA) is a standard practice for accessing our systems, enhancing our security framework.
- Access permissions are regularly reviewed and adjusted in response to role changes or employment status updates, maintaining the integrity of our access control measures.
4. Incident Response and Management
- We have a robust incident response plan that outlines clear procedures for managing security incidents, including how we notify affected customers and stakeholders.
- Through regular drills, we ensure our team is prepared to respond effectively to security incidents.
- Compliance with legal and regulatory reporting requirements is strict, with significant incidents reported to authorities within the mandated timeframe.
5. Network Security
- Our network is protected with firewalls, intrusion detection, and prevention systems, monitoring and safeguarding our traffic 24/7.
- Network security assessments and penetration testing are performed regularly, identifying and mitigating vulnerabilities proactively.
6. Application Security
- We follow a secure software development lifecycle (SDLC) that integrates security reviews, vulnerability assessments, and code analysis.
- Application vulnerabilities are routinely scanned using advanced security tools, ensuring our applications are resilient against attacks.
- We strive to keep all third-party software and dependencies updated automatically, minimizing the risk posed by known vulnerabilities.
7. Employee Training and Awareness
- Security awareness training is an ongoing activity for all employees, covering critical topics such as phishing and secure internet practices.
- Employees are encouraged to report any suspicious activity to the SSG, contributing to our proactive security stance.
8. Vendor and Third-Party Security
- We rigorously assess the security practices of third-party vendors before and during our engagement with them.
- Our contracts with vendors include specific security requirements and obligations, ensuring they meet our high standards.
- Vendor compliance is continuously monitored, managing the risks associated with third-party access to our data effectively.
At We Are Learning, these practices are not just policies; they are the foundation of our daily operations, ensuring the security and trust of our customers and partners.
Any questions on this topic?
![](/_next/image?url=%2Fassets%2Fimages%2Fenvelope.png&w=256&q=75)
Don't miss out on our latest news. Get the inside knowledge on product updates and upcoming events.
![Product of the day](https://cdn.sanity.io/images/m36sk3a0/production/49688f705a710e9573296525925ca18c0ca1d4b0-588x288.png?auto=format)
![Microsoft for startups](https://cdn.sanity.io/images/m36sk3a0/production/8c3950ad0ce7c391087cdf7d4601db0bee94d605-744x288.png?auto=format)
![EdTech Breakthrough](https://cdn.sanity.io/images/m36sk3a0/production/3ed9896442f030b89a38a857d4d34e1db511fb97-488x288.png?auto=format)
![Holon IQ](https://cdn.sanity.io/images/m36sk3a0/production/69f9243215efc286b507e31e82fdc79180ade80f-792x288.png?auto=format)