{"id":3741,"date":"2023-06-12T08:58:47","date_gmt":"2023-06-12T08:58:47","guid":{"rendered":"https:\/\/www.clever.com\/?page_id=3741"},"modified":"2023-11-08T17:27:06","modified_gmt":"2023-11-08T17:27:06","slug":"security","status":"publish","type":"page","link":"https:\/\/www.clever.com\/trust\/security","title":{"rendered":"Security"},"content":{"rendered":"\n<div class=\"cle-simple-text-header cle-section cle-filtered-tabs \" id=\"cle-simple-text-header-block_a8fad41eefbdea4f71f6d96e70da219c\">\n            <div class=\"cle-simple-text-header__decor-wrapper\">\n            <svg class=\"cle-decor-circle-1 cle-simple-text-header__decor-1\" data-sth-decor start-from-hidden width=\"312\" height=\"312\" viewBox=\"0 0 312 312\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                <g clip-path=\"url(#clip0_444_4226)\">\n                <circle cx=\"156.001\" cy=\"156.002\" r=\"50.7436\" stroke=\"#1464FF\" stroke-width=\"0.75\"\/>\n                <circle cx=\"156.001\" cy=\"156.002\" r=\"84.2352\" stroke=\"#1464FF\" stroke-width=\"0.75\"\/>\n                <circle cx=\"156.002\" cy=\"156.002\" r=\"121.252\" stroke=\"#1464FF\" stroke-width=\"0.75\"\/>\n                <circle cx=\"156\" cy=\"156.002\" r=\"155.625\" stroke=\"#1464FF\" stroke-width=\"0.75\"\/>\n                <\/g>\n                <defs>\n                <clipPath id=\"clip0_444_4226\">\n                <rect width=\"312\" height=\"312\" fill=\"white\"\/>\n                <\/clipPath>\n                <\/defs>\n            <\/svg>\n            <svg class=\"cle-decor-circle-2 cle-simple-text-header__decor-2\" data-sth-decor start-from-hidden width=\"281\" height=\"243\" viewBox=\"0 0 281 243\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                <path d=\"M26.2024 22.5982C-50.1906 160.366 60.8295 275.885 164.151 233.25C267.473 190.616 242.098 37.7117 156.396 45.2121C70.6943 52.7124 84.3731 159.012 122.057 150.093C152.619 142.859 127.992 101.98 158.416 92.7113C189.743 83.1676 220.016 144.235 153.831 189.115C83.3344 236.918 27.1195 150.879 55.501 67.5942C83.8826 -15.6905 220.281 -30.2956 268.378 77.4238C299.827 153.347 256.676 209.688 244.665 219.2\" stroke=\"#1464FF\" stroke-width=\"0.8\"\/>\n            <\/svg>\n        <\/div>\n        <div class=\"container\" start-from-hidden>\n            <div class=\"cle-simple-text-header__wrap cle-text-center\">\n                                    <h1 class=\"cle-simple-text-header__title js-title-with-highlight\">A trustworthy guardian<\/h1>\n                                                                    <div class=\"cle-simple-text-header__btn-cont\">\n                        <a class=\"cle-btn cle-btn_primary\" href=\"https:\/\/clever.com\/trust\/security\/practices\" target=\"_self\">\n    Read about our security practices     <span class=\"icon\">\n    <svg width=\"29\" height=\"12\" viewBox=\"0 0 29 12\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n        <path d=\"M28.5303 6.53033C28.8232 6.23743 28.8232 5.76256 28.5303 5.46967L23.7574 0.696697C23.4645 0.403804 22.9896 0.403804 22.6967 0.696697C22.4038 0.989591 22.4038 1.46446 22.6967 1.75736L26.9393 6L22.6967 10.2426C22.4038 10.5355 22.4038 11.0104 22.6967 11.3033C22.9896 11.5962 23.4645 11.5962 23.7574 11.3033L28.5303 6.53033ZM6.55671e-08 6.75L28 6.75L28 5.25L-6.55671e-08 5.25L6.55671e-08 6.75Z\" fill=\"white\"\/>\n    <\/svg>\n<\/span><\/a>                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n\n\n<h3 class=\"wp-block-heading\">Our comprehensive security program helps protect sensitive data at every step.<\/h3>\n\n\n\n<p>Our success depends on building highly secure product and infrastructure. Our desire is to help schools, teachers, parents, and application partners create a secure learning environment where students can thrive.<\/p>\n\n\n\n<p>We know it\u2019s not enough to just write secure code\u2014for security to be effective, it has to be ingrained in our culture and embedded in every part of the business. That\u2019s why security is part of everyone\u2019s job at Clever: 100% of our people receive security training. To lead this program, we hire security experts who have extensive security experience for market-leading cloud services and are passionate about creating safe digital learning ecosystems.<\/p>\n\n\n\n<p>Our comprehensive security-by-design approach helps to protect sensitive data at every step\u2014whether it\u2019s a district\u2019s first data transfer or one-millionth login.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Helping schools secure their data<\/h3>\n\n\n\n<p>We know data protection is a key priority for our district customers, and we understand how challenging it can be for districts to effectively manage risk and ensure high data protection standards across all of the district\u2019s unique technology partners. At Clever, we\u2019re not only committed to meeting those standards\u2014we have an outstanding security track record and are regularly investing in new tools, technologies, and enhancements to stay ahead of risks.<\/p>\n\n\n\n<p>School districts turn to Clever to help manage and safeguard Student Data shared with technology partners. Instead of maintaining and troubleshooting custom scripts with dozens of application providers, districts can easily create and update student accounts in education software and control how much data is shared through Clever. Instead of managing multiple transmissions to application providers, districts can rely on the Clever API to transmit Student Data with strong security requirements.<\/p>\n\n\n\n<p>With Clever, districts have one security-focused platform for sharing data with authorized applications, a platform that\u2019s regularly tested and optimized for data security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Full encryption in transit and at rest<\/h3>\n\n\n\n<p>Clever helps districts secure student information by encrypting it in transit and at rest. We use modern cryptographic algorithms like AES256-GCM and follow key management best practices with strict user access control and multifactor authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure development lifecycle<\/h3>\n\n\n\n<p>From initial design concept to final testing, our security protocols inform every aspect of product and infrastructure development. All development projects, including new products and features, require a security review process. It includes threat modeling and code review for any major change.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cloud-hosted infrastructure is a more secure infrastructure<\/h3>\n\n\n\n<p>Increasingly, districts are adopting cloud infrastructure instead of on-premise models for one key reason: security. Most education software providers also have adopted cloud services to host their products for districts, as have healthcare providers, financial institutions, and government agencies. While on-premise systems need to be maintained, updated, configured, and secured individually, cloud services typically offer key benefits that provide stronger data security management and practices.<\/p>\n\n\n\n<ul>\n<li>Cloud service providers have greater security expertise running servers in the cloud across thousands of customers over many years.<\/li>\n\n\n\n<li>Cloud service providers are experienced in navigating and managing a broad array of security requirements, including most stringent security standards, such as HIPAA, COPPA, GDPR, and SOC.<\/li>\n\n\n\n<li>Cloud service providers have a much more substantial investment in both network and physical security than on-premise systems could typically provide.<\/li>\n<\/ul>\n\n\n\n<p>Clever\u2019s infrastructure runs on Amazon Web Services (AWS), an industry leader in cloud services and data security. Ernst &amp; Young LLP performs the AWS System and Organization Controls audit and issues reports that demonstrate how AWS achieves these key compliance controls and objectives. The AWS SOC 2 and other reports are available on the&nbsp;<a href=\"https:\/\/aws.amazon.com\/compliance\/soc-faqs\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS compliance site<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Comprehensive independent third-party security evaluation<\/h3>\n\n\n\n<p>Our team continually monitors for suspicious activity and employs automated threat detection alerting and response processes. We engage top third-party security firms who perform regular audits and external code reviews, and we make these audits available upon request.<\/p>\n\n\n\n<p>In addition, we work with\u00a0<a href=\"https:\/\/www.hackerone.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">HackerOne<\/a>\u00a0to run a bug bounty program. The bug bounty program engages security researchers and independent security professionals (&#8220;<strong><em>Bug Bounty Participants<\/em><\/strong>&#8220;) to proactively test our platform and report any issues that we then assess and mitigate. Clever authorizes and encourages the responsible and ethical discovery and reporting of vulnerabilities on all of Clever&#8217;s products. Security researchers can participate by sending an email to <a href=\"mailto:security@clever.com\">security@clever.com<\/a> with the email address they use for their HackerOne account, and we will add you to our private program. \u00a0If Bug Bounty Participants make a good faith effort to conduct research and disclose vulnerabilities in accordance with our disclosure rules (found <a href=\"https:\/\/github.com\/Clever\/dev-handbook\/blob\/master\/security\/bug-bounty.md\">here<\/a>), Clever will not recommend or pursue law enforcement or civil lawsuits related to such activities. If a Bug Bounty Participant is interested in publication of the vulnerability, Clever will permit publication after the earlier of (a) Clever\u2019s confirmation of remediation of the vulnerability and (b) nine (9) months have passed since disclosure of the vulnerability to Clever\u2019s security team.<\/p>\n\n\n\n<p>If you have any questions about Clever&#8217;s security program, please send an email to&nbsp;<a href=\"mailto:security@clever.com\">security@clever.com<\/a>.<\/p>\n\n\n\n<p>Read more about Clever\u2019s&nbsp;<a href=\"https:\/\/clever.com\/trust\/security\/practices\">security practices<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our comprehensive security program helps protect sensitive data at every step. Our success depends on building highly secure product and infrastructure. Our desire is to help schools, teachers, parents, and application partners create a secure learning environment where students can thrive. We know it\u2019s not enough to just write secure code\u2014for security to be effective, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1347,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/pages\/3741"}],"collection":[{"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/comments?post=3741"}],"version-history":[{"count":6,"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/pages\/3741\/revisions"}],"predecessor-version":[{"id":7004,"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/pages\/3741\/revisions\/7004"}],"up":[{"embeddable":true,"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/pages\/1347"}],"wp:attachment":[{"href":"https:\/\/www.clever.com\/wp-json\/wp\/v2\/media?parent=3741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}