Last updated: 2025-12-11

Security

How we safeguard data, control access, and respond to incidents across iEARNEASY.

Security Posture & Scope

We apply layered defenses across infrastructure, application, and operations to protect customer and partner data processed by our services.

Technical & Organizational Measures

We use network segmentation, least-privilege IAM, MFA for admin access, encryption in transit and at rest, logging, and change control on production systems.

Access Control & Monitoring

Access to production data is role-based, time-bound, and logged. Regular reviews remove unused access. Sensitive actions are monitored for anomalies.

Incident Response

We run a documented incident playbook: detect, contain, investigate, remediate, and notify when legally required. Suspect an issue? Contact us immediately.

Data Handling & Encryption

Customer data is encrypted in transit (TLS) and at rest. Secrets are stored in managed secret stores; keys are rotated on a defined schedule.

Business Continuity & Backups

We maintain regular backups, test restores, and deploy across redundant infrastructure to reduce downtime risk.