Data Security Policy

Data Infrastructure

Learning Machine utilizes Amazon Web Services (AWS) to host the environment that runs Learning Machine SaaS and Private Stack services. Amazon maintains multiple certifications for its data centers, including ISO 27001, FERPA, NIST, HIPAA, GDPR, and more. For additional information about their certification and compliance, please visit the AWS Security website and the AWS Compliance website.

Availability
Our infrastructure runs on systems that are protected against failures of individual servers or even entire data centers with redundant backups across different geographic locations. We also employ an on-call team to quickly resolve unexpected incidents.

Network Protection
In addition to system monitoring and logging, firewalls are configured according to industry best practices, and unnecessary ports are blocked by configuration with AWS Security Groups.

Disaster Recovery
Customer Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure availability. We have backup and restoration procedures, which allow recovery from a major disaster. Customer Data and our source code are automatically backed up daily.

Data Encryption in Transit and at Rest
Learning Machine services support the latest recommended secure cipher suites and protocols to encrypt all traffic in transit using 256-bit SSL. Customer Data is also encrypted at rest with 256-bit AES.

Public & Private Key Management
The Learning Machine services use Hierarchic Deterministic (HD) wallets for issuer key generation. The initial seed is created by a BIP39 mnemonic phrase that is fully encrypted and connected to a customer-provided issuing password. This results in a keypair hive from which keychains can be derived. The customer-provided issuing password must be entered by the customer before initiating the process for credential issuance.

Logging
Learning Machine maintains a centralized logging in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about Learning Machine services. These logs are analyzed for security events via automated monitoring software, which is overseen by the security team. If data is encrypted, it will not be displayed unencrypted in the logs.

Security Features for Team Members & Administrators
In addition to the work we do at the infrastructure level, we provide your administrators with tools for passwords, roles, and permissions to enable their own users to operate securely.

Product Development
Any new features, functionality, and design changes go through a security review process. In addition, our code is tested through a variety of methods and manually peer reviewed prior to being deployed to production. The development team works closely with security teams to resolve any additional security concerns that may arise during development.

Confidentiality
We place strict controls over our employees’ access to the data you and your users make available via Learning Machine services. Controls are defined in your agreement with Learning Machine covering the use of the Learning Machine services (“Customer Data”).We are committed to ensuring that Customer Data is not seen by anyone who should not have access to it. The operation of Learning Machine services requires that some employees have access to the systems which store and process Customer Data. For example, in order to diagnose a problem you are having with Learning Machine services, we may need to access your Customer Data. Employees are prohibited from using permissions to view Customer Data unless it is operationally necessary to do so. We have technical controls and audit policies in place to ensure that any access to Customer Data is logged.

All of our employees and contract personnel are bound to our policies regarding Customer Data, and we treat these issues as matters of the highest importance within our company.

Personnel Practices
Learning Machine conducts background checks on all employees before employment, and employees receive security training during onboarding as well as on an ongoing basis. All employees are required to learn our comprehensive information security policy covering the security, availability, and confidentiality of Learning Machine services.

Host Management
We perform vulnerability scans on our production hosts and remediate any findings that present a risk to our environment.

Incident Management & Response
In the event of a security breach, Learning Machine will promptly notify you of any unauthorized access to your Customer data. Learning Machine has incident management policies and procedures in place to handle such an event.