We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
FEV Tutor (Focus Care inc. dba Focus EduVation aka FEV Tutor) will use (is using) and is committed to AES128/256 Encryption for data and information through secure SFTP site for student rostering and any information shared with us.
FEV Tutor will use (is using) and is committed to using TLS 1.3 (or above) when transferring/transmitting any data under this contract.
FEV Tutor (Focus Care Inc dba Focus EduVation) would not share any student or any other information with any other 3rd party. All of the technology that we use has been developed in house, and we have ultimate control and security over all data and information. The data are stored in Oracle database with restricted access on a need to know basis and all access are logged. Passwords are slated and encrypted using one way encryption before storing in the database so that it is impossible to retrieve even if the values stored are revealed.
In order to share secure student and assessment (other data) FEV Tutor would use secure/password protected SFTP site with encryption. All data sent between client and server is protected by being encrypted using a secrete encryption cipher which is known only to the server and client.
SFTP sessions can also be further protected through the use of public and private keys, which offer an alternative form of authentication known as public key authentication. This can be used as an alternative to or in conjunction with the traditional form of authentication of usernames and passwords.