Proctorio BlogProctorio Blog

two encrypted shields connected by a lock in the middle enforced by passwords/secret keys

Setting the Record Straight: End-to-End Encryption Pt. 2

The recent settlement involving Ring and the Federal Trade Commission (FTC) serves as a stark reminder of the importance of robust privacy measures and accountability in the world of education technology. We'd like to emphasize our commitment to data privacy and protection, and why we remain stringent in our approach.

In case you missed it, this is what happened: “Following [Amazon’s] acquisition of Ring, employees and third-party contractors were granted access to images and videos taken with customer doorbell and security cameras. Some were even found watching users’ personal footage for over an hour each day without the company’s knowledge. The FTC said that Ring neglected to implement ‘basic privacy and security protections.’”

Similarly, Wyze, another smart home security company, disclosed to its customers that “13,000 were impacted by a recent data breach,” where 1,504 people could see into homes that did not belong to them, leaving users feeling perturbed and violated.

At Proctorio, we've always prioritized data security. Our commitment to maintaining the highest standards of privacy is not just a recent development; it's ingrained in the very foundation of our service. We understand that incidents like the one involving Ringand Wyze can erode trust, and we want to assure you that we have implemented strict measures to prevent any similar occurrences within our system.

Our :text=SOC%202%20attested.-,End%2Dto%2Dend%20encryption,-Proctorio%20utilizes%20end target="_blank" rel="noopener noreferrer nofollow">end-to-end encryption ensures that your data remains confidential and secure. As we’ve previously mentioned, the information is encrypted and locked, :text=Only%20the%20Institution%20has%20the%20%22key%22%20that%20is%20needed%20to%20access%20Personal%20Information%20that%20they%27ve%20provided%20to%20their%20test%20takers%20or%20test%2Dtaker%20Personal%20Information%20that%20has%20been%20provided%20to%20Proctorio. target="_blank" rel="noopener noreferrer nofollow">accessible only with the proper unshared key, preventing any and all unauthorized access. We take a proactive stance in prioritizing your privacy, and we continuously update our security measures to stay ahead of potential threats. Our end-to-end encryption has been validated by 3rd parties and their report is available in our Trust Center.

One of the key differentiators is our limited access policy. Unlike some companies that faced criticism for allowing widespread access to customer data, Proctorio has maintained a minimalistic approach. Only institution-approved personnel can access test-taker data, and even then, it's under tightly controlled circumstances.

As technology evolves, so do our efforts to uphold the highest standards of data protection. We believe in transparency and accountability, and we will continue to refine our practices to ensure that your trust in us is well-placed. Your privacy is not just a promise; it's a commitment we uphold every day.

August 14, 2024

PRIVACY & SECURITY

Data Security & Privacy in Context: A (Former) User’s Story – Pt. 3 of 3: Transition

July 31, 2024

PRIVACY & SECURITY

Data Security & Privacy in Context: A (Former) User’s Story – Pt. 2 of 3: Implementation

July 17, 2024

PRIVACY & SECURITY

Data Security & Privacy in Context: A (Former) User’s Story – Pt. 1 of 3: Crisis & Adoption

September 19, 2023

PRIVACY & SECURITY

Setting the Record Straight: Encryption

November 3, 2022

PRIVACY & SECURITY

Setting the Record Straight: On Financial Information

October 28, 2022

PRIVACY & SECURITY

Setting the Record Straight: On Privacy

June 03, 2022

PRIVACY & SECURITY

Our Commitment to Protecting Your Privacy

January 5, 2022

PRIVACY & SECURITY

Security in an Unsecured World

November 01, 2020

PRIVACY & SECURITY

Enhanced encryption and security features for Fall Semester 2020

October 06, 2020

PRIVACY & SECURITY

Why Proctorio requests certain browser permissions

August 16, 2020

PRIVACY & SECURITY

Why Proctorio does not use facial recognition

August 15, 2020

PRIVACY & SECURITY

How Proctorio approaches data security and test-taker privacy