Security Policy

Effective Date:
Last Updated:

Introduction

Ezaalah, operated by 4 SYSTEMS Digital Solutions ("Company," "we," "our," "us"), is committed to safeguarding the confidentiality, integrity, and availability of user and student data.

This Security Policy should be read together with our Privacy Policy, Data Processing Agreement, FERPA Statement, and COPPA Statement.

Security Principles

Our security practices are based on the following principles:

  • Confidentiality: Ensuring that personal and student data is accessible only to authorized individuals.
  • Integrity: Protecting data from unauthorized modification or corruption.
  • Availability: Maintaining reliable and uninterrupted access to the Service.

Technical Safeguards

  • Encryption: All data is encrypted in transit (TLS/HTTPS) and at rest.
  • Secure Communications: HTTPS is enforced across all user interactions.
  • Updates: Regular patching and updates are applied to servers, databases, and third-party components.

Infrastructure

We partner with trusted infrastructure providers to deliver secure and reliable services:

  • Amazon Web Services (AWS) – primary hosting and compute environment.
  • Cloudflare – content delivery network (CDN), firewall, and DDoS protection.
  • Supabase – database, authentication, and managed APIs.
  • Firebase (Google) – analytics and performance monitoring.
  • Google Cloud Platform – backup and infrastructure services.

All providers implement physical and network security controls consistent with industry standards.

Access Controls

  • Role-based access ensures only authorized staff can access sensitive systems.
  • Admin accounts are protected with multi-factor authentication (MFA).
  • Access rights are reviewed and revoked when no longer necessary.

Monitoring & Logging

  • Activity logs are maintained to record administrative and system events.
  • Systems are monitored for unusual behavior or unauthorized access attempts.
  • Logs are protected against tampering.

Data Retention & Deletion

  • Uploaded and processed files are automatically deleted after 30 days.
  • Personal data and account information are deleted upon request (see Privacy Policy).
  • Backup data is securely purged on a rolling basis.

Incident Response

In the event of a suspected or actual data breach:

  1. Immediate containment and investigation steps are initiated.
  2. The Controller (school, district, or parent) is notified without undue delay (see DPA).
  3. Remediation measures are applied, and lessons learned are incorporated into security improvements.

User Responsibilities

Users play an important role in maintaining security:

Contact

For security-related concerns, vulnerability reports, or incident notifications: