Skip to main content
🔒 Security Practices SOC 2 Infrastructure US-Only Hosting

Security Practices

A plain-language overview of how Kuliso secures student data. Designed for district IT staff, procurement officers, and compliance reviewers.

Last updated: April 21, 2026 · This document is updated when practices change.
⚠️

Honest disclosure: Kuliso is a growing edtech platform operated by Polsia Inc. We have not yet pursued independent security certifications (SOC 2, ISO 27001, FedRAMP) for the Kuliso application itself. What we do have: our infrastructure providers (Render, Neon) are SOC 2 Type II certified; we follow security best practices throughout our codebase; and we have never had a student data breach. If your district requires a specific certification, please contact us — we are transparent about where we are in our security maturity.

🔒
Data Encryption
At rest and in transit
  • TLS 1.2+ for all HTTPS connections
  • AES-256 encryption at rest (Neon PostgreSQL)
  • Passwords stored as bcrypt hashes (irreversible)
  • No plaintext credentials in logs or code
🌏
US-Only Hosting
No international data transfers
  • Web app hosted on Render.com (US regions)
  • Database hosted on Neon (US regions)
  • AI processing via Google Gemini (US servers)
  • No student data leaves the United States
👤
Access Controls
Least-privilege model
  • Role-based access: teacher, student, admin, parent
  • Teachers see only their own classrooms
  • Students see only their own session data
  • Production database access limited to 2 engineers
🔎
FERPA Audit Log
Every access recorded
  • Every access to student PII is logged
  • Logs include: who, what, when, IP address
  • Retained for 5 years per FERPA requirements
  • Available for district review on request
🚨
Incident Response
72-hour notification commitment
  • Contain breach within 24 hours of discovery
  • Notify affected districts within 72 hours
  • Written incident report to all affected parties
  • Full cooperation with district IT and legal teams
🚫
Student Data Isolation
No cross-account access
  • No tracking pixels on student-facing pages
  • No third-party analytics scripts on student pages
  • AI requests exclude student identity (session-scoped only)
  • No student data used for AI training or marketing
Sections

1 Infrastructure & Hosting

Kuliso runs on two primary cloud providers, both headquartered and operating in the United States:

Provider Role Certifications Region
Render.com Web application hosting, job processing SOC 2 Type II US (Oregon)
Neon, Inc. PostgreSQL database hosting SOC 2 Type II US (AWS us-east-1)
Google (Gemini API) AI language model processing ISO 27001 SOC 2 United States
Stripe, Inc. Payment processing (teacher/parent billing only) SOC 2 Type II PCI-DSS L1 United States

Student data is never transferred outside the United States. All API calls to Google Gemini are routed to US endpoints and are contractually limited to US processing.

For IT questionnaires: Kuliso's application infrastructure is hosted by Render.com (SOC 2 Type II). Neon's database infrastructure is also SOC 2 Type II certified. We can provide links to each provider's SOC 2 reports upon request. Kuliso itself is pursuing SOC 2 Type II certification — expected 2026.

2 Encryption

In Transit

All connections to Kuliso use HTTPS with TLS 1.2 or higher. HTTP connections are automatically redirected to HTTPS. We do not support SSL 3.0 or TLS 1.0.

At Rest

3 Access Controls

Application-Level Role Isolation

Every API endpoint in Kuliso enforces role-based access control. The four roles are:

Infrastructure Access

Student Access Model

Students cannot create their own accounts. All student access is mediated by a teacher (via join code) or a parent (via Family Plan enrollment). This ensures no student under 18 can independently access the platform or create an account without adult oversight.

4 AI Data Handling

Kuliso uses Google Gemini (Gemini 2.5 Pro and Gemini 2.0 Flash) as its AI engine. Here's how student data is handled when it interacts with the AI:

Summary: A student's question to the AI tutor is sent to Google Gemini in the US (without the student's name or ID), an answer comes back, and the data is not retained or used for training. The only permanent storage of session transcripts is in Kuliso's own database, under Kuliso's data retention policies.

5 Audit Logging (FERPA)

Kuliso maintains a FERPA-compliant audit log that records every access to student personally identifiable information. Each log entry captures:

Audit logs are:

6 Incident Response

In the event of a security incident affecting student data, Kuliso follows this response procedure:

To report a suspected security vulnerability, email support@kuliso.org with "Security Report" in the subject. We will acknowledge within 24 hours and respond within 72 hours.

7 Vulnerability Management

Penetration testing: Kuliso has not yet undergone a formal third-party penetration test. This is on our roadmap for 2026. If your district requires a pen test report as part of procurement, please contact us at support@kuliso.org to discuss timelines.

8 Third-Party Vendor Security

We evaluate all third-party vendors before giving them any access to student data. Our requirements:

Current sub-processors with access to student data: Google (AI processing), Render (app hosting), Neon (database). Stripe does NOT receive student data — payment processing is limited to teacher/parent billing only.

We provide at least 30 days' notice before adding or replacing sub-processors. Our full sub-processor list is maintained in the Privacy Policy §8.

9 Student Data Isolation

10 Known Limitations & Security Roadmap

We believe in honest disclosure. Here's what we don't have yet, and when we plan to have it:

Questions? If your district needs documentation we don't have yet, email us. We can often provide supplementary questionnaire responses, additional documentation, or schedule a call with our engineering team for IT review.

Contact & IT Review Requests

🔒

IT Security & Compliance Questions

support@kuliso.org · We respond within 1–2 business days

Contact Us →
🏫

DPA & Procurement Documentation

We return countersigned DPAs within 1 business day. Privacy questionnaires (LearnPlatform, Common Sense Media) completed within 5 days.

View DPA →