True Office Learning ensures both the physical and digital security of its markets and data through leading-edge security technology and processes.



True Office Learning maintains detailed information security policies. All employees are required to read and provide written acknowledgement of relevant policies. Topics covered range from True OfficeLearning's corporate security and information classification policies to application development standards and password handling. A dedicated Information Security group is responsible for information security operations including; daily reviews, access control requests, incident handling, engineering, consultation, design and implementation of security mechanisms. The policies and procedures are for official use only and are reviewed as part of the testing procedures detailed below within the section “Testing and Audit.”


True Office Learning uses a multi-tiered network architecture with multiple firewall tiers and service silos to isolate different security zones. Intrusion Detection Systems at True Office Learning managed facilities monitor network traffic against industry-standard and True Office Learning-customized network activity signatures.

Network Architecture


External screening routers employ access control lists to terminate virus, worm, and common hacking attempts before they reach external True Office Learning firewalls. Firewalls further parse traffic to ensure only specifically permitted sources can reach specific destinations and services. VPN or private line connections terminate outside external firewalls, but independently from Internet connection points.

Perimeter Defense


Encryption & Data Integrity

Strong encryption is used to authenticate and encrypt customer communication to True Office Learning systems. Encryption prevents potential malicious third parties from intercepting sensitive data and credentials in transmission. The controls inherent to SSL and TCP provide additional integrity to ensure content is not tampered with by a third-party during transmission. Participant credentials are never stored unencrypted – they are hashed or encrypted as appropriate to the application.


The True Office Learning Information Security group handles all access control requests for administrative access. These requests and authorization are documented and reviewed.

Access Control


User ID and password authentication are required by all True Office Learning accounts. Nine-character initial passwords can be randomly generated and assigned by the True Office Learning Helpdesk via phone. Users are prompted to change their password on initial login and instructed to choose a strong password, 8 to 14 characters in length, and including at least 3 of the following attributes: lowercase, uppercase, numbers, and special characters.



All systems follow build standards to ensure standardization and security. The Information Security group monitors, assigns, and tracks patch status to respond to vendor operating system or application alerts.



Application Design

Application-layer access controls impose strict restrictions on the data available to individual users. Data storage is physically and logically segmented from application servers, and queries can only be formed and executed after access control databases have been queried and credentials are fully verified. These processes ensure that users retrieve data only related to their account. The True Office Learning Information Security group integrates into the SDLC process via security architecture review, vulnerability scans, code analysis, and manual pen testing.


Incident Response

True Office Learning Operations maintains incident-response plans to handle any incident with operational impact -- security or otherwise. It is True Office Learning policy to notify customers if there is a security incident that could compromise customer data.


Business Continuity Planning / Disaster Recovery

All True Office Learning core procedures, systems, and operational tasks are managed in cloud-based data centers with backups and key equipment redundancy.  Business Continuity (BCP) and Incident Response Plans ensure infrastructure is recoverable.


Testing & Audit

True Office Learning conducts regular internal penetration testing and auditing to determine compliance with written policies and to assess vulnerability. In addition, third-party external penetration tests are performed at least annually. The results of these tests are used internally to verify internal audit processes and controls.