Go to website
Important info about our security and privacy processes and policies.
List of Sub-processors
To offer our services, Easy LMS may engage with several third-party companies. We call these companies 'sub-processors' as they may process part of the data that our you give to us when using your account. We may send the sub-processors both information about our Admins and Participants of the content the admins create. This is marked in the table below.
Which cookies does Easy LMS use?
🦉 Easy LMS cookies ✓ Cookies in the admin interface ✓ Cookies in the participant interface
How to allow Easy LMS employees to access my account for seven days
🦉How to allow support to log into my Easy-LMS account? ✓ Easy LMS profile ✓ Information Security Policy ✓ GDPR
Security and privacy: questions and answers
🦉 Security ✓ Privacy ✓ Questions & answers ✓ Software architecture ✓ GDPR
Amazon AWS hosting, privacy and EU rules explained
🦉 EU rules ✓ GDPR ✓ Privacy shield ✓ Amazon AWS
Technical and organizational measures
🦉 Technical and organizational measures ✓ Security ✓ Procedures ✓ Data protection ✓ Backup
The EU-US Privacy Shield invalidated: what does it mean for Easy LMS?
🦉 Privacy Shield ✓ GDPR
Development security policy document
🦉 Development security ✓ Security first ✓ At least 4 + eyes ✓ Least privileged access principle
Information Security Policy
🦉 Information Security Policy ✓ GDPR
Change management process
🦉 Customer reported bugs ✓ Features ✓ Infrastructure and/or system maintenance ✓ Development process
Business Continuity Plan
🦉 Business Continuity Plan ✓ Disastery recovery ✓ Relocation ✓ Recovery procedure