Security

Security
Effective Date: December 11, 2021.
We, at AHI (hereinafter referred as “AHI”, “we”, “us”, or “our”) provide a suite of software products and services for education, skills, and careers (“Service” or “Services”) through uLelktz Learning Solutions Limited (India). Our Services are being used by millions of users from hundreds and thousands of colleges and universities worldwide, they all trust us with their data security.
We back ourselves up with robust data security and privacy practices that form an integral part of our product engineering and service delivery principles. Following the tenets of security by design, security is at the heart of how we build our products, deliver our services, secure your data and provide high resiliency. We have a top-down governance and security in our DNA that lets us constantly wade through our threat vectors and calibrate to strengthen our security posture. That way, we align to the changing business and technology landscape.

We have an Information Security Management System (ISMS) in place which takes into account of our security objectives and the risks and mitigations concerning all the interested parties. We employ strict policies and procedures encompassing the security, availability, processing, integrity, and confidentiality of customer data.

Our products and services are delivered through Secure Socket Layer (SSL) encrypt link. It provides security to the data that is transferred between web browser and server, and ensures that all data passed between them remain private and free from attack.
Amazon Web Services (AWS) is our hosting partner. Our products and services are built and delivered with a multi-fold model of security architecture for highly resilient service delivery platform.

We have an Information Security Management System (ISMS) in place which takes into account of our security objectives and the risks and mitigations concerning all the interested parties. We employ strict policies and procedures encompassing the security, availability, processing, integrity, and confidentiality of customer data.

Secure authentication
You can enforce strong authentication mechanisms using our SAML services or tune up the password rules from the admin console.

Data Protection
We protect your data, accounts, and workloads from unauthorized access. Our Services are designed to provide encryption and key management and threat detection that continuously monitors and protects your accounts and workloads.
Role-Based Access
Enforce differential access based on the users’ responsibilities to limit access based on the principle of least privileged access and prevent conflict of interest.

Data Backup
Near real-time backups taken across multiple availability zones in encrypted and access-controlled containers.

Malware & Spam Protection
Malware and Spam protection is applied based on the latest threat signatures and supports real-time scanning and security.

Secure APIs
Update your APIs as and when we bring in new releases and notify you