Security & Compliance
Built to meet the rigorous requirements of higher education procurement.
SOC 2 Type II
Our infrastructure and operations are audited annually against the SOC 2 Type II framework, covering security, availability, and confidentiality trust service criteria. This provides independent assurance that our controls are not only designed properly but operate effectively over time.
HECVAT Assessment
We understand the vendor assessment process in higher education. Our completed HECVAT Lite assessment is available upon request to streamline your procurement and security review process.
Request HECVATFERPA Compliance
Alumni Forwarding is designed to support FERPA compliance. Because our service forwards messages in real-time without storing email content, the exposure of protected education records is minimized. We act as a conduit, not a repository, for communications.
Email Authentication
SPF
Sender Policy Framework records authorize our servers to send on behalf of your domain, preventing spoofing.
DKIM
DomainKeys Identified Mail adds cryptographic signatures to forwarded messages, ensuring integrity.
DMARC
Domain-based Message Authentication, Reporting and Conformance policies provide full visibility and control.
ARC
Authenticated Received Chain preserves authentication results across forwarding hops, maintaining deliverability.
Zero-Storage Architecture
Messages are forwarded in real-time and never stored. No alumni email content is persisted on our servers.
This dramatically reduces risk exposure and simplifies compliance. There is no data to breach because we do not retain message content.
Infrastructure
99%
Uptime SLA
Global
Redundancy
Automatic
Failover
TLS
Encryption in Transit
Data Processing Agreement
A Data Processing Agreement (DPA) is available for institutional review. Our DPA covers data processing obligations, sub-processor disclosures, breach notification procedures, and data subject rights in accordance with GDPR and applicable regulations.
Schedule a Security Review
Let us walk your security team through our architecture, compliance certifications, and data handling practices.
Schedule a Review