Security & Trust — Stanfield (original) (raw)

1. Our Approach

The James Stanfield Company has served special-education classrooms since 1978. Our K–12 platform handles teacher accounts, school rosters, and limited student progress data, and we take the trust placed in us by educators and IT administrators seriously.

This page describes our current security posture in plain language. It is intended for school and district IT staff, administrators evaluating Stanfield, and anyone reviewing our practices on behalf of an institution. For binding legal terms, please refer to our Privacy Policy, Data Retention Policy, and Terms of Service.

2. Security Framework

Stanfield's security program is aligned to the Center for Internet Security Critical Security Controls, Version 8, Implementation Group 1 (CIS Controls v8 IG1) — the prescriptive baseline of essential cyber-hygiene safeguards recommended for all enterprises regardless of size or risk profile.

We chose CIS IG1 because it is concrete, free, and maps cleanly to other frameworks (ISO 27001, NIST CSF, SOC 2, the Student Data Privacy Consortium NDPA), so evidence collected here is reusable for any institutional review.

3. Data Classification

We classify the data we handle into the following categories, each governed by separate retention and access rules:

4. Encryption

5. Authentication & Access Control

6. Network & Application Hardening

7. Monitoring, Logging & Audit Trails

8. Backups & Disaster Recovery

9. Vulnerability Management

10. Incident Response

To report a suspected security incident or vulnerability, email hello@stanfield.com. We acknowledge reports within 3 business days and treat all reports confidentially.

11. Vendor & Subprocessor Management

We maintain an inventory of every third-party service that processes Stanfield data, the purpose of each, and the categories of data it receives. New vendors are reviewed before onboarding for security posture, contractual data-protection terms, and necessity.

The current list of subprocessors is published in Section 6 of our Privacy Policy. We will provide notice on this page before engaging a new subprocessor that processes student data.

12. Student Data, FERPA & COPPA

Stanfield acts as a "school official" under FERPA when processing student data on behalf of educational institutions. Our platform is designed to minimize the student data we collect:

For the full FERPA and COPPA narrative, see Sections 4 and 5 of our Privacy Policy.

13. Compliance Posture & Honest Limits

We believe in being transparent about what we have, what we are working toward, and what we do not yet have:

14. Hosting & Data Residency

Stanfield's production infrastructure is hosted in the United States. Data does not leave the United States in the course of normal operations. International users should be aware their data will be transferred to and processed in the U.S.

15. Reporting a Vulnerability

If you believe you have discovered a security vulnerability in any Stanfield service, please report it confidentially to hello@stanfield.com. Please include:

We commit to:

We ask that researchers act in good faith — avoid privacy violations, service disruption, and data destruction; do not access or modify accounts belonging to others; and give us reasonable time to remediate before any public disclosure.

16. Contact

For security questions, DPA requests, or vendor due-diligence inquiries:

James Stanfield Company
hello@stanfield.com
805-897-1185