At COR Advantage, we understand the importance of privacy and security to both schools and families. Here are some of the many steps we take to ensure that student data is protected:
We have designed our system to offer a private and controlled experience for schools and their families.
No sharing of information
We do not share student data, family contacts, or school information with anyone at any time. All media and data are the property of the school.
No facial recognition
Students are never automatically identified in our system.
Teacher and Administrator Control
Teachers and administrators have full discretion over student media at all times. Nothing will be sent out through COR Advantage unless they decide to do so.
Families Can Opt Out
Families may choose to have their children’s media sent only to them, or not at all.
Security is a core, mission-critical requirement for the COR Advantage system. There is nothing we take more seriously than the security of the data and media we manage on behalf of our customers. We meet or exceed industry best practices and couple them with security features specific to school environments, including:
All data is encrypted and securely hosted over HTTPS.
There is no overlap or integration with public websites or any social media services.
All system access is controlled by school administrators.
All data, media, and information are entirely the property of schools. COR Advantage cannot and will not share or publish any data outside of your account.
Media is captured and organized through tagging and messaging by teacher discretion. COR Advantage relies on the expertise of the teacher and does not layer any facial recognition software into the system.
If schools discontinue service with COR Advantage, all associated data and media are made available to them for their archives, then deleted from our system.
Designed specifically with schools in mind, COR Advantage assures a much higher level of security than the common industry practices of capturing student data on privately-owned devices, sharing on social media or other public platforms. Our system is also centralized and closely monitored, so in the event that issues arise, accounts can be locked and managed quickly.
We constantly revisit our security practices to ensure they remain effective and current.