We take the protection of customer data extremely seriously. This BTB Education Security Policy describes the organisational and technical measures we take to ensure that.
2. Security Team
Our infrastructure and security team includes people who have played lead roles in designing, building, and operating highly secure Internet facing systems at companies ranging from startups to large public companies.
3. Best Practices
Incident Response Plan
We have implemented a formal procedure for security events and have educated all our staff on our policies.
When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
After a security event is fixed we write up a post-mortem analysis.
The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
BTB Education will promptly notify you in writing upon verification of a security breach of the BTB Education services that affects your data. Notification will describe the breach and the status of BTB Education investigation.
Build Process Automation
We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes.
We typically deploy code dozens of times a day, so we have high confidence that we can get a security fix out quickly when required.
BTB Education uses a backup solution for data-stores that contain customer data. We create snapshots of the database every 24 hours.
All customer data is stored in the European Economic Area ("EEA").
Customer data is stored in multi-tenant datastores and is automatically encrypted at rest, cloaking your data in another layer of protection; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
Each BTB Education system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
6. Data Transfer
All data sent to or from BTB Education is encrypted in transit using 256-bit encryption.
BTB Education is served 100% over https. BTB Education runs a zero-trust corporate network.
There are no corporate resources or additional privileges from being on BTB Education network.
All out password are protected through, which is protected by a one time verification codes.
8. Permissions and Admin Controls
BTB Education enables permission levels to be set for any employees with access to BTB Education.
Permissions and access can be set as an admin to be able to view group settings, billing, user data, integrations, budget management, analytics or the ability to view order details.
9. Application Monitoring
On an application level, we produce audit logs for all activity, ship logs to our service providers for analysis, and use S3/Glacier for archival purposes.
All access to BTB Education applications is logged and audited.
All actions taken on production consoles or in the BTB Education application are logged.
10. Security Audits and Notifications
We use technologies to provide an audit trail over our infrastructure and the BTB Education application. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
Information about AWS security certifications and obtaining copies of security reports from AWS is available at http://aws.amazon.com/compliance/pci-data-privacy-protection-hipaa-soc-fedramp-faqs/
11. Customer Responsabilities
Managing your own user accounts and roles from within the BTB Education services.
Protecting your own account and user credentials for all of your employees accessing the BTB Education services.
Promptly notifying BTB Education if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the BTB Education services or your account.
You may not perform any security penetration tests or security assessment activities without the express advance written consent of BTB Education.