Skip to main content

LMS Platform Privacy Policy

Last Updated: 01 Jan 2025

1. Privacy Policy for LMS Platform

Overview

This privacy policy applies to the Learning Management System (LMS) platform operated by Aktrea Learning Xperience Pvt. ltd. for our enterprise clients.

Our Role as Data Processor

  • We operate as a Data Processor under the direction of our enterprise clients (the Data Controllers)
  • We process data solely based on our clients’ instructions and for the purpose of providing LMS services
  • User access is managed according to each client’s preferred authentication method

Data Processing Activities

We process the following types of data as part of our LMS services:

Learning Management

  • Course completion records
  • Learning progress tracking
  • Assessment results and scores
  • Course assignment data
  • User activity logs

User Management

  • User registration and account management
  • Authentication and access control
  • User profile information as provided by the enterprise client
  • Account status and activity tracking

Communications

  • Course assignment notifications
  • Reminder emails for course completion
  • System notifications and updates
  • Learning progress reports

All communications are sent on behalf of and under the direction of our enterprise clients.

Data Collection and Access

We support multiple secure methods for user management:

  • Enterprise Single Sign-On (SSO) integration
  • Bulk user registration through secure data transfer
  • Client-managed user administration
  • All user data is provided and controlled by our enterprise clients

Data Security Measures

  • Platform access is restricted through role-based authentication
  • Multi-tenant architecture with strict data segregation
  • Data encryption in transit and at rest
  • Regular security audits and monitoring
  • Comprehensive backup and disaster recovery procedures
  • Access logging and activity monitoring

Data Rights and Requests

  • All data subject rights requests (access, deletion, etc.) should be directed to the respective enterprise client
  • We assist our enterprise clients in fulfilling such requests as instructed
  • Data exports are available to authorized enterprise administrators
  • User management tools are provided based on client requirements

Email Communication Practices

  • Emails are sent only for legitimate LMS-related purposes
  • All communications are branded according to enterprise requirements
  • Email frequency follows enterprise-specified preferences
  • System notifications are limited to essential learning activities

Contact Information

For any privacy-related queries, please contact your organization’s administrator or service@aktrea.com

2. Data Processor Role Documentation

Scope of Processing

As a Data Processor for enterprise clients, our role encompasses:

Platform Provision

  • Hosting and maintaining the LMS platform
  • Providing course delivery capabilities
  • Managing system security and availability
  • Generating learning progress reports

Data Processing Activities

  • Processing is limited to learning management activities
  • All processing is done under client direction
  • User data management as per client specifications

Access Management

  • Multiple secure authentication methods supported
  • Client-specific access control implementation
  • Dedicated tenant spaces for each client
  • Role-based permission management

Responsibilities

  • Maintaining platform security
  • Implementing required technical measures
  • Following client data handling instructions
  • Providing necessary reporting tools
  • Supporting client-specific user management requirements

3. Security Measures Overview

We maintain industry-standard security practices to protect our platform and client data:

Infrastructure Security

  • Hosted on AWS Mumbai Region infrastructure
  • Regular security patches and system updates
  • Industry-standard infrastructure monitoring

Data Protection

  • Data encryption at rest and in transit
  • Secure tenant isolation architecture
  • Regular automated backup procedures

Access Security

  • Role-based access control
  • Secure authentication methods
  • Access logging and monitoring

Our security measures are regularly reviewed and updated to maintain alignment with industry best practices.