Enterprise Security

Security & Compliance

Built to meet the rigorous requirements of higher education procurement.

SOC 2 Type II

Our infrastructure and operations are audited annually against the SOC 2 Type II framework, covering security, availability, and confidentiality trust service criteria. This provides independent assurance that our controls are not only designed properly but operate effectively over time.

HECVAT Assessment

We understand the vendor assessment process in higher education. Our completed HECVAT Lite assessment is available upon request to streamline your procurement and security review process.

Request HECVAT

FERPA Compliance

Alumni Forwarding is designed to support FERPA compliance. Because our service forwards messages in real-time without storing email content, the exposure of protected education records is minimized. We act as a conduit, not a repository, for communications.

Email Authentication

SPF

Sender Policy Framework records authorize our servers to send on behalf of your domain, preventing spoofing.

DKIM

DomainKeys Identified Mail adds cryptographic signatures to forwarded messages, ensuring integrity.

DMARC

Domain-based Message Authentication, Reporting and Conformance policies provide full visibility and control.

ARC

Authenticated Received Chain preserves authentication results across forwarding hops, maintaining deliverability.

Zero-Storage Architecture

Messages are forwarded in real-time and never stored. No alumni email content is persisted on our servers.

This dramatically reduces risk exposure and simplifies compliance. There is no data to breach because we do not retain message content.

Infrastructure

99%

Uptime SLA

Global

Redundancy

Automatic

Failover

TLS

Encryption in Transit

Data Processing Agreement

A Data Processing Agreement (DPA) is available for institutional review. Our DPA covers data processing obligations, sub-processor disclosures, breach notification procedures, and data subject rights in accordance with GDPR and applicable regulations.

Schedule a Security Review

Let us walk your security team through our architecture, compliance certifications, and data handling practices.

Schedule a Review