
Secure, Reliable, and Built for Education
In today’s digital education landscape, security isn’t optional—it’s essential.
We take a proactive approach to safeguarding data, implementing strict access policies, continuous system monitoring, and resilient infrastructure to ensure information remains secure, available, and protected from evolving threats.
Attestations & Certifications
We meet industry-recognized security standards through independent audits and certifications, ensuring your data remains protected, secure, and compliant. You can learn more about the specific standards we adhere to by exploring the badges below.

SOC 2 Type II
SOC 2 Type II is an independent security attestation that ensures we meet strict standards for protecting your data. This audit goes beyond a one-time check—it verifies that our security measures are continuously effective over time.
Products: All ClearMath, ClearLiteracy, and ClearLanguages solutions
Region: U.S.
Criteria: Security
Latest Review Period: February 1, 2024 to July 31, 2024

TX-RAMP
TX-RAMP is a Texas state security certification that ensures we meet strict standards for protecting sensitive data.
By following TX-RAMP guidelines, we ensure that the data we handle remains secure and compliant with state-level regulations.
Your privacy is important to us
At Carnegie Learning, we take privacy seriously. Our compliance program is designed to meet high standards, ensuring that data is handled securely, transparently, and in accordance with strict privacy regulations.
For more information, see the following pages.
If you become aware of an unauthorized disclosure of student information, please immediately contact breachresponseteam@carnegielearning.com.
In the event of an unauthorized disclosure of student information, Carnegie Learning will:
- Notify the district of the suspected or actual incident within 48 hours.
- Convene a meeting with our Breach Response Team which may consist of the Chief Operations Officer, Engineering Leadership members, Corporate IT, other Security personnel and Legal Counsel, if necessary.
- Outline steps to contain the breach.
- Determine what specific student information may have been accessed.
- Determine communication plan to update the appropriate parties within and outside of Carnegie Learning.
- Determine potential changes (near and longer term) to data systems and procedures that may reduce the risk and impact of this type of incident in the future.
- Where possible, identify those responsible for the breach and take appropriate action, including legal remedies.