Proctorio Blog Proctorio Blog

two encrypted shields connected by a lock in the middle enforced by passwords/secret keys

Setting the Record Straight: End-to-End Encryption Pt. 2

The recent settlement involving Ring and the Federal Trade Commission (FTC) serves as a stark reminder of the importance of robust privacy measures and accountability in the world of education technology. We'd like to emphasize our commitment to data privacy and protection, and why we remain stringent in our approach.

In case you missed it, this is what happened: “Following [Amazon’s] acquisition of Ring, employees and third-party contractors were granted access to images and videos taken with customer doorbell and security cameras. Some were even found watching users’ personal footage for over an hour each day without the company’s knowledge. The FTC said that Ring neglected to implement ‘basic privacy and security protections.’”

Similarly, Wyze, another smart home security company, disclosed to its customers that “13,000 were impacted by a recent data breach,” where 1,504 people could see into homes that did not belong to them, leaving users feeling perturbed and violated.

At Proctorio, we've always prioritized data security. Our commitment to maintaining the highest standards of privacy is not just a recent development; it's ingrained in the very foundation of our service. We understand that incidents like the one involving Ring and Wyze can erode trust, and we want to assure you that we have implemented strict measures to prevent any similar occurrences within our system.

Our end-to-end encryption ensures that your data remains confidential and secure. As we’ve previously mentioned, the information is encrypted and locked, accessible only with the proper unshared key, preventing any and all unauthorized access. We take a proactive stance in prioritizing your privacy, and we continuously update our security measures to stay ahead of potential threats. Our end-to-end encryption has been validated by 3rd parties and their report is available in our Trust Center.

One of the key differentiators is our limited access policy. Unlike some companies that faced criticism for allowing widespread access to customer data, Proctorio has maintained a minimalistic approach. Only institution-approved personnel can access test-taker data, and even then, it's under tightly controlled circumstances.

As technology evolves, so do our efforts to uphold the highest standards of data protection. We believe in transparency and accountability, and we will continue to refine our practices to ensure that your trust in us is well-placed. Your privacy is not just a promise; it's a commitment we uphold every day.

September 19, 2023


Setting the Record Straight: Encryption

November 3, 2022


Setting the Record Straight: On Financial Information

October 28, 2022


Setting the Record Straight: On Privacy

June 03, 2022


Our Commitment to Protecting Your Privacy

January 5, 2022


Security in an Unsecured World

November 01, 2020


Enhanced encryption and security features for Fall Semester 2020

October 06, 2020


Why Proctorio requests certain browser permissions

August 16, 2020


Why Proctorio does not use facial recognition

August 15, 2020


How Proctorio approaches data security and test-taker privacy