Security & Compliance

Protecting your data with enterprise-grade security measures

Our Certifications

SOC 2 Type II
Independently Audited
FERPA
Fully Compliant
COPPA
Child Privacy
256-bit SSL
Bank-Level Encryption

Data Security Measures

Encryption

  • Data in Transit: All data transmitted to and from WBL Tracker is protected using 256-bit SSL/TLS encryption
  • Data at Rest: All stored data is encrypted using AES-256 encryption
  • Database Security: Multiple layers of encryption protect sensitive student information

Access Controls

  • Role-Based Access: Users only see data relevant to their role and responsibilities
  • Multi-Factor Authentication: Optional MFA for enhanced account security
  • Session Management: Automatic logout and secure session handling
  • IP Restrictions: Optional IP whitelisting for additional access control

Infrastructure Security

  • Cloud Security: Hosted on enterprise-grade cloud infrastructure with 99.9% uptime SLA
  • Network Security: Firewalls, intrusion detection, and network monitoring
  • Regular Backups: Automated daily backups with geographic redundancy
  • Disaster Recovery: Comprehensive business continuity and disaster recovery plans

Compliance Certifications

SOC 2 Type II

Our SOC 2 Type II certification demonstrates our commitment to maintaining the highest standards for security, availability, processing integrity, confidentiality, and privacy. This certification is renewed annually through independent third-party audits.

FERPA Compliance

As an educational technology provider, we fully comply with the Family Educational Rights and Privacy Act (FERPA). We act as a school official with legitimate educational interests and maintain strict controls over student data access and sharing.

COPPA Compliance

We adhere to the Children's Online Privacy Protection Act (COPPA) requirements, ensuring appropriate protections for students under 13 years of age and obtaining proper consent through educational institutions.

Security Monitoring

  • 24/7 Monitoring: Continuous security monitoring and threat detection
  • Vulnerability Assessments: Regular security scans and penetration testing
  • Incident Response: Documented incident response procedures and team
  • Audit Logging: Comprehensive audit trails for all system access and changes

Employee Security

  • Background Checks: All employees undergo background verification
  • Security Training: Regular security awareness and privacy training
  • Access Reviews: Quarterly access reviews and privilege management
  • Confidentiality Agreements: All staff sign comprehensive confidentiality agreements

Reporting Security Issues

If you discover a security vulnerability, please report it immediately to our security team at admin@wbltracker.com. We take all security reports seriously and will respond promptly.

Security Commitment: We continuously invest in security measures and regularly update our practices to stay ahead of emerging threats. Your trust is our top priority.

Contact Our Security Team

For security-related questions or to request additional information about our security practices, email us at admin@wbltracker.com.