Frontline Education’s software solutions support over 4.1 million users daily in the education field across the US and abroad.
From professional development records to substitute placement to special education reports and more, we know districts depend on their digital resources. But at Frontline, we don’t just want to provide a data custodian that makes your work simpler. We want it to be safer, too. Both federal laws, like FERPA, and concerned parents alike expect student information to be protected.
That’s why we take district and student data security so seriously.
Know Your Staff and Student Data is Secure
All of the data Frontline houses is monitored around the clock in five physically and geographically secure datacenters throughout the United States and Canada, ensuring your data is protected from physical intrusions and natural disasters. Your data is encrypted in transit and on our infrastructure.
You Own Your District and School Data
We will never sell, rent, transfer, disclose or distribute your personal or student data without prior written consent. Even if you choose to terminate your contract with Frontline. Aggregated data that does not contain personally identifiable information regarding Customers’ users provided in connection with the Software and Services will be the Confidential Information and property of Frontline.
Trust in our industry-leading security program
Your employee data should be just as secure as your student data — that’s why we maintain a SOC 2-compliant security program that’s industry-leading for K-12 employee information.
SOC 2 Type II Certification is one of the most comprehensive and independent verification audits that can be conducted. This credential is critical when you are evaluating a cloud provider for your district.
SOC 2 Certification for K-12 SaaS companies is very rare despite the incredibly sensitive data that EdTech companies must collect and store on behalf of clients. The majority of SOC 2 Reports that do exist for K-12 EdTech are limited in scope and often attained because many companies outsource their data centers.
Frontline Education solutions are built for secure and confidential management and storage of the millions of human capital and administrative records amassed by clients every day. Our SOC 2 Type II report covers all Frontline Education solutions and security operations.
Streamline Your FERPA, HIPAA and State Privacy Compliance Efforts
Frontline has built its products and security program to align with the Family Educational Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HIPAA), so district leaders and parents alike can have peace of mind concerning their students’ information.
Both FERPA and HIPAA require that school districts safeguard personally identifiable information (PII) and protected health information (PHI). The laws require a combination of technical, administrative and physical security controls to ensure data confidentiality, integrity and availability. Frontline Education’s products have been designed to provide highly secure technical and physical controls which form a solid foundation which customers can leverage as part of their compliance program.
Our Student Privacy Pledge
Frontline Education signed the Student Privacy Pledge, assuming responsibility for the effective use and security of private student information. With Frontline, you can assure your district’s stakeholders and parents alike that your students’ information is in safe hands.
Frontline Takes Student Data Seriously
Frontline Education services use rigorous, industry-accepted security, privacy, and reliability standards to measure and continually improve (such as NIST’s Cyber Security Framework, Privacy by Design and Building Security In Maturity Model). We have conducted an external audit and achieved SSAE No. 16 (SOC 2) certification. Our customers can also use our cloud services to deliver solutions that comply with FERPA, PIPA, HIPAA the Student Privacy Pledge and various data protection standards.
Frontline Education's commitment to security, privacy, reliability, and trust starts with our executives and built into our processes and performance metrics for those who lead teams responsible for the implementation of comprehensive information security governance policies based on the NIST Cyber Security Framework and a robust privacy program.