We use physical, procedural, and technical safeguards together with enterprise cloud providers to help preserve the integrity, availability, and confidentiality of your information.
Your teaching and learning data deserves the same rigor we apply to our own. We combine provider security capabilities with operational discipline.
Our production stack runs on actively maintained cloud services. We rely on providers that patch underlying infrastructure and expose security configuration so we can harden accounts, networks, and application endpoints.
Kuizzo is cloud-native: we do not operate our own physical data centers for the product you use at kuizzo.com.
Every hop over the public internet should assume hostile networks. We design accordingly.
Customer content and account metadata live in managed cloud data services. Like many SaaS products, Kuizzo uses shared logical multi-tenant storage; application-level controls and testing help ensure organizations and users only reach data and roles they are permitted to use.
Specific retention, subprocessors, and your rights are in our Privacy Policy. Regional obligations (for example GDPR) are on our GDPR Compliance page.
Production data is processed in facilities operated by our cloud providers (AWS and Vercel), which maintain physical access controls, monitoring, and auditing at their data centers.
More from AWS: Data center controls.
We limit internal access to customer data to people who need it to run or support the service. Personnel and contractors with access follow our privacy and security policies.
Visibility helps us catch reliability issues and suspicious activity early.
Kuizzo is designed with SOC 2 security principles. Our architecture is SOC 2 aligned, and we are actively working toward SOC 2 certification. AWS and Vercel both maintain SOC 2 Type II reports that underpin the foundation we build on.
| Commitment | Description |
|---|---|
| SOC 2 aligned architecture | Our infrastructure is built on enterprise-grade, SOC 2 compliant cloud platforms. |
| Designed with SOC 2 security principles | Security controls, access management, and data protection are baked into our design. |
| Working toward SOC 2 certification | We are on a path to achieve formal SOC 2 certification. |
Last updated: March 30, 2026