Information security policy and procedures

This document defines Learning Cub’s information security policy, procedures, and governance structure. It serves as our organization’s documented information security standards in accordance with NIST 800-53 and ISO/IEC 27001 frameworks.


Purpose and scope

This policy establishes the requirements for protecting the confidentiality, integrity, and availability of information assets managed by Learning Cub. It applies to all employees, contractors, and third-party service providers who access, process, or store data on behalf of Learning Cub and its customers.

The scope includes:


Foundational frameworks

Our information security program is aligned with the following industry frameworks:


Information security governance

Executive oversight

Executive oversight for cybersecurity is maintained at the organizational level. The Vice President and the Web Developer hold primary responsibility for the information security program.

Roles and responsibilities


Access control policy

Authentication

Authorization

Account lifecycle management

Remote access

Remote access to server environments is not permitted. Access is only available through the application interface.


Data classification and handling

Data categories

Data residency

All customer data is stored within the United States, in data centers located in Las Vegas and New York operated by BuyVM.net (FranTech). No data is stored offshore.

Data retention


Encryption standards


Hosting and infrastructure security

Hosting environment

Customer data is hosted on dedicated, isolated virtual machines that are separate from any other client’s data. These virtual machines run on shared virtualization infrastructure managed by BuyVM.net (FranTech).

Physical security

Data centers operated by FranTech maintain:

Network security


Vulnerability management

Vulnerability scanning

Periodic vulnerability scans are performed on information technology systems, networks, and supporting security systems as part of the quarterly PCI audit conducted by a third party.

Penetration testing

Penetration testing of internal and external data environments is conducted quarterly as part of the PCI audit process, performed by a third party.

Software security


Backup and disaster recovery

Backup procedures

Disaster recovery plan

Our disaster recovery plans include:

Recovery Time Objective

Disaster recovery and business continuity plans are tested annually using simulated scenarios. Plans are updated based on results and organizational changes.

Infrastructure resilience

Our main infrastructure vendor, FranTech, is multi-homed across several global regions and has a demonstrated record of recovering from incidents including DDoS attacks, core router failures, and power supply failures. Over the past year, service uptime has been maintained at 99.9%.


Incident response

Incident response plan

A cybersecurity incident response plan is maintained and tested annually through simulated exercises. The plan is updated regularly based on lessons learned, emerging threats, and organizational changes.

Breach history

No security breaches or data breach incidents have occurred.


Personnel security

Cybersecurity training

Cybersecurity training is provided to the workforce through the Coursera course “Introduction to Cybersecurity Fundamentals.” Training is delivered periodically as part of ongoing professional development. Effectiveness is evaluated through the course exam.

Third-party personnel

All work is handled in-house, except for the use of the Moodle platform. The Moodle team ensures their staff undergo thorough vetting processes following strict security and privacy protocols.

Credential deactivation

Deactivation of login credentials is verified upon end of employment or contract service, managed through Moodle’s role-based access system.


Third-party and vendor management

Outsourced functions

Key vendors


Regulatory compliance

Our organization adheres to applicable regulatory requirements:

Our proposed service is not considered a medical device subject to FDA regulation.


Audit and logging

The platform generates audit trails of access and use through Moodle’s auditing and logging features. These audit logs capture user activity, system events, and administrative actions to support compliance monitoring and incident investigation.


Change management

A formal change management process based on ITIL (Information Technology Infrastructure Library) is followed. Changes to the production environment are tested, reviewed, approved, and monitored to ensure proper implementation and minimize risks.


Policy review and updates

This information security policy is reviewed and updated annually, or as needed in response to significant changes in the threat landscape, regulatory requirements, or organizational structure. All updates are approved by the Vice President.