Jump to a section
Related resources
Buyer-facing trust packet with printable procurement support materials.
Processor and procurement terms for institutional reviews.
State and district addendum workflow support.
How to report vulnerabilities responsibly.
1. Security model
Classroom Pulse uses layered administrative and technical safeguards to protect customer, account, and student-related data.
Security priorities include
- Confidentiality through controlled access and provider safeguards
- Integrity through logging, review, and controlled workflows
- Availability through resilient infrastructure, backup practices, and operational monitoring
2. Buyer review matrix
This matrix is intended for procurement and questionnaire review and should be read together with the DPA and Subprocessors pages.
| Review area | Current practice | Buyer note |
|---|---|---|
| Hosting and data location | Production services are operated through U.S.-based infrastructure providers used for hosting, authentication, storage, and transactional operations. | Customer data is primarily processed in the United States unless a customer-specific agreement states otherwise. |
| Encryption | Product traffic is encrypted in transit, and platform providers supply encryption at rest and managed storage protections where supported. | Refer to the Security Practices page and DPA for the contractual summary rather than treating this line as a certification statement. |
| Authentication and access | Authenticated accounts, role-based permissions, and need-based administrative access are used to limit access to customer workspaces and support tools. | Google and email-based sign-in paths are supported in the current product stack. |
| Monitoring and logging | Operational logging and monitoring support service health review, abuse detection, troubleshooting, and incident investigation. | Logs are used for operational security and support workflows, not targeted advertising. |
| Backup and recovery | Backup, resilience, and restoration depend on infrastructure-managed capabilities plus internal operating procedures for service recovery. | Schools with stricter continuity requirements should request contract language or questionnaire support through procurement intake. |
| Incident notice | Confirmed incidents affecting customer personal data are investigated, contained, and notified without undue delay when required by law or contract. | Customer-specific agreements may impose narrower timeframes or additional notice obligations. |
| Vendor management | Approved subprocessors are published publicly and are expected to operate under confidentiality and data protection obligations. | The public subprocessor list is intended for vendor due diligence and contract routing. |
3. Access, monitoring, and vendor controls
Security depends on both platform controls and operational practices that limit how access is granted and how events are investigated.
- Administrative and support access is restricted based on need and role.
- Operational logging supports service health review, abuse detection, troubleshooting, and incident investigation.
- Subprocessors used to operate the service are reviewed and published publicly for vendor due diligence.
- Systems and dependencies are updated as part of ongoing maintenance and risk management work.
4. Incident response and external reporting
If Classroom Pulse identifies a security event affecting customer personal data, the team works to investigate, contain, and remediate the issue.
When required by law or contract
- Affected customers are notified without undue delay
- Available details are shared to support response planning
- Follow-up remediation steps are tracked internally
Security researchers can report issues through the Vulnerability Disclosure Policy, and customers can route questionnaires or security review requests through the structured intake flow.
Questions or documentation requests
Use the structured intake for security questionnaires, architecture review, incident-related questions, or responsible disclosure follow-up.
Security intake
Open security review intakeSecurity email
security@classroompulse.ioDisclosure policy
View the vulnerability disclosure policy