Sleep well.You are on ground.solid

You're probably here because a vendor has burned you before — a missing BAA, a redacted SOC 2, a sub-processor change you found out about from a news headline. We've built this page so that doesn't happen with us.

System status.

Production telemetry and historical uptime are published continuously at our status page. The compliance program itself is managed through Scrut, our GRC platform — every control, every audit, every piece of evidence lives there and is independently verifiable.

Uptime · 90 days
100.00%
No reportable downtime
Current state
Operational
All services nominal
Compliance platform
Scrut
Continuously monitored
Last verified
Sep 2025
Pen test · independent third party

The Trust Vault.

Most trust pages are static. Ours is connected directly to Scrut, the GRC platform that runs our compliance program. Every control, every piece of evidence, every audit artifact you'd want to verify — is verifiable in real time, not on a quarterly refresh.

Powered by Scrut Trust Vault

Don't take our word. Take the receipts.

Live · synced continuously
Open Trust Vault →No login required for public controls

Behind every trust claim is an actual control with a status, an owner, an evidence file, and a last-tested date. The Trust Vault publishes that machine state directly — sourced from Scrut, the platform we use to run our compliance program day to day.

Procurement teams can verify the status of any framework, request access to evidence under NDA, and subscribe to alerts on changes. Your security team won't need to email us. The receipts are right there.

What's verifiable, live

Control framework status✓ Live
Evidence files & audit artifacts✓ Live
Sub-processor list✓ Live
Policy library✓ Live
Document request workflow✓ Live
Risk & remediation status✓ Live

Frameworks & certifications.

Pencil Spaces is audited or certified against eight regulatory and industry frameworks: FERPA, COPPA, SOC 2 Type II, GDPR, HIPAA, CCPA, ISO 27001, and SDPC NDPA. Each row below maps to a specific federal regulation, attestation, or industry standard. Reports are available on request, generally under mutual NDA.

Framework
Scope
Authority
Status
FERPA
We operate as a school official under the school-official exception. No advertising and no student profiling under any condition.
20 U.S.C. § 1232g
Active
COPPA
Verifiable parental consent flows. No third-party tracking on accounts identified as belonging to a minor. K-12 safe by default.
16 CFR Part 312
Active
SOC 2
Type II report covering Trust Services Criteria, attested annually by an independent CPA firm. Available under mutual NDA on completion.
AICPA TSP 100
Type II in attestation
GDPR
EU data residency available on request. Pre-signed Data Processing Agreement with current Standard Contractual Clauses.
Reg. (EU) 2016/679
Active
HIPAA
Business Associate Agreement available on request. Protected Health Information encrypted at rest and in transit. Audit logs retained six years.
45 CFR §§ 160, 162, 164
BAA available
CCPA
All California consumer rights honored end-to-end. Verified-request portal staffed within five business days.
Cal. Civ. § 1798.100
Active
ISO 27001
Information Security Management System aligned to ISO 27001 controls; surveillance work in progress with our certification body.
ISO/IEC 27001:2022
In progress
SDPC
Signatory to the National Data Privacy Agreement (NDPA) through the Student Data Privacy Consortium. Active in multiple state alliances.
NDPA v1.0
Signatory

The Customer Assurance Package.

One request, one signed NDA, one bundle. The complete package your security and procurement teams need to evaluate Pencil Spaces — sent within one business day, refreshed quarterly.

CAP · v2026.05

Everything in one place.

Most vendors make you email six different addresses to assemble a security review packet. We bundle the documents you'd otherwise spend a week chasing into a single mutual-NDA delivery. If your team's questionnaire asks for it, it's in the pack.

Request the package →

Delivered within 1 business day · Mutual NDA via DocuSign · Refreshed every quarter

What's inside

SOC 2 Type II reportMost recent attestation period · independent CPA firm
ISO 27001 status letterCurrent ISMS scope and certification body details
Penetration test executive summaryIndependent third party · September 2025
BAA, DPA, and NDPA templatesPre-signed where applicable
Certificate of insuranceCyber liability, E&O, general liability
CAIQ-Lite v4 + Trust Services Criteria mappingDrop into your existing questionnaire
Architecture & data-flow diagramsProduction topology, encryption boundaries
Incident response planIncluding the playbook we run during a real one

How the service is built.

Pencil Spaces runs on a multi-cloud, multi-region production footprint. The summary below describes the controls; the SOC 2 report describes how they are tested.

Cloud and regions

Production workloads run primarily on Amazon Web Services across us-east-1, us-west-2, and eu-central-1, with active-passive failover into Google Cloud Platform for critical paths. EU customer data is pinned to eu-central-1 on request and never replicated outside the region. Customers on the Enterprise tier may request a single-region or single-cloud deployment.

Encryption

All customer data is encrypted at rest using AES-256-GCM. All traffic is encrypted in transit using TLS 1.3; older versions are explicitly disabled at the load balancer. Cryptographic operations are performed in FIPS 140-2 validated modules. Customer-managed encryption keys (CMEK) are available on the Enterprise tier.

Identity and access

Single sign-on is supported via SAML 2.0 for Enterprise customers. User provisioning and deprovisioning is supported via SCIM. Multi-factor authentication is required for all administrative accounts internally; customers may enforce MFA for all of their users from the admin console. All administrative actions are logged and forwarded to a central SIEM with one-year retention.

Resilience and recovery

Production runs active in two regions with hot replicas. Recovery time objective on regional failure is under sixty seconds; recovery point objective is under five minutes. Disaster recovery is tested monthly against a runbook published internally and reviewed quarterly. Customers may request a copy of the latest DR test summary under NDA.

Monitoring and incident response

Application performance and logs flow into Datadog. Alerts page a 24/7 on-call rotation through PagerDuty. Errors flow through Sentry. Customer-facing system health is published at status.pencilspaces.com with no manual editing — the page reflects production telemetry directly.

Penetration testing

The application and infrastructure are tested annually by an independent third-party security firm. The most recent report is dated February 2026; an executive summary is available under NDA. Findings, including those rated low and informational, are tracked to closure with a published remediation timeline.

Where your data lives, and for how long.

The most important questions a privacy-conscious district counsel can ask are not about what we do, but about what happens to data over time. The five stages below describe the full journey, from collection to deletion.

01
Collect

Only what's required for the service to function. Minimization is the default; no data category is collected without a documented purpose.

02
Encrypt

AES-256-GCM at rest, TLS 1.3 in transit, the moment data leaves the client. Keys are managed in FIPS 140-2 modules.

03
Store

Region-pinned by customer choice. Access is role-based, audit-logged, and reviewed quarterly. No bulk data ever leaves your tenant.

04
Retain

Per the schedule below. Retention is enforced automatically; expired data is purged in nightly jobs with verification logs.

05
Delete

On termination or request. Cryptographic erasure where supported; verified deletion certificates available within 30 days.

What we collect, by category

Category
Purpose
Retention
Region
Account & identity
Email, name, role. Required to authenticate and provision access.
Active + 90 days
Customer-pinned
Session content
Whiteboards, chat, files shared during a session. Visible only to participants.
Per customer config (30d–7y)
Customer-pinned
Session recordings
Audio, video, screen-share. Recorded only when explicitly enabled by the host.
Per customer config (off by default)
Customer-pinned
Usage telemetry
Page views, feature events. Aggregated; no individual-level analytics on minors.
25 months, then deleted
United States
Audit logs
Administrative actions, access events. Required for compliance forensics.
6 years (HIPAA), tamper-evident
United States
Billing
Invoices, payment records. Held by Stripe; we see metadata only.
7 years (tax)
United States
Support correspondence
Tickets and emails to our team. Held only for the duration of resolution + audit.
2 years
United States

When the contract ends

Three paths, your choice. Each is defined contractually in the MSA and executed within 30 days of termination unless otherwise specified.

Return
All customer data exported in machine-readable format (JSON + standard media files), delivered via signed S3 link within 14 days. A deletion certificate follows within 30 days.
Delete
All customer data cryptographically erased within 30 days. Backups age out within an additional 60 days. A signed deletion certificate is issued by Swati, our Head of Trust.
Archive
For customers with extended record-retention obligations (legal hold, IRB studies). Data is moved to a write-locked tier with documented access controls and held for the agreed term. Available on Enterprise contracts.

For data subject access, deletion, or portability requests under GDPR, CCPA, or comparable laws, write to privacy@pencilspaces.com. Verified requests are processed within 30 days.

Sub-processors.

Every third party that processes customer data on our behalf, what they do, where they do it, and what data class they touch. Updated quarterly. Customers receive thirty days' notice before any new sub-processor is added.

Vendor
Purpose
Location
Data class
Amazon Web Services
Primary infrastructure: storage, compute, networking, managed databases.
United States, EU
All
Google Cloud Platform
Active-passive failover, video transcoding, machine-learning inference.
United States
All
Cloudflare
Content delivery network, DDoS protection, web application firewall.
Global
Edge metadata
Stripe
Billing and payment processing for paid plans and add-ons.
United States
Billing only
Datadog
Application performance monitoring, log aggregation, infrastructure metrics.
United States
Operational
PagerDuty
On-call alerting and incident response coordination.
United States
Operational
Resend
Transactional email delivery (account, billing, system notifications).
United States
Email metadata
Twilio
SMS notifications and voice fallback for two-factor authentication.
United States
Phone numbers

To subscribe to sub-processor change notifications, email trust@pencilspaces.com.

What AI touches your data, and what doesn't.

Procurement teams in 2026 are right to ask this question. We answer it directly: no AI system, internal or external, is in the path of customer session data.

No customer data trains any AI model. We do not feed your students' video, audio, whiteboard, or chat content into any AI model — ours or any third-party model. We do not use customer data to train, fine-tune, or evaluate AI of any kind. This is contractual and survives termination.

No third-party AI agents are embedded in the customer experience without explicit opt-in. Where AI features exist, they are clearly labeled, configurable at the account level, and disabled by default for K-12 customers.

The full inventory is published. A complete list of any AI systems with access to production — including scope, controls, and audit-log paths — is included in the Customer Assurance Package and reviewed during our SOC 2 audit cycle. Material changes are published in the compliance changelog with thirty days' notice.

Incidents.

When something breaks in production, we publish a full post-mortem within five business days. Root cause, customer impact, remediation, and what we changed to prevent recurrence. No exceptions, no marketing edits.

No reportable incidents to date. When one occurs, the post-mortem will be published here within five business days. Root cause, customer impact, remediation, and what we changed. We won't hide it.

Real-time service status: status.pencilspaces.com → | Live control evidence: via Trust Vault

The compliance changelog.

Every audit, every certification renewal, every sub-processor change, every meaningful operational event. We publish them all, in one chronological feed.

Apr 2026
SOC 2 Type II in attestation

Audit fieldwork complete. Representation letter and final report under review by our external CPA firm. Available under mutual NDA upon attestation.

Mar 2026
Strong-password enforcement deployed

Password complexity requirements rolled out across our internal authentication system. Users with weak passwords required to update on next sign-in. Maps to SOC 2 CC6.6 (logical access controls).

Mar 2026
Internal access hardening — least-privilege defaults

Migrated all internal communication channels to private-by-default with role-based access. Provides verifiable audit-trail evidence that only personnel with legitimate need-to-know access have visibility into specific information classes. Maps to SOC 2 CC6.1.

Jan 2026
GDPR audit findings remediated

External GDPR audit findings — including DPO designation documentation and consent-flow remediation on signup — were closed in collaboration with our compliance partner.

Dec 2025
ISO 27001 internal audit completed

Internal audit findings reviewed and closed. Opening and closing meetings documented. Surveillance audit work continues with our certification body.

Oct 2025
Internal audit cycle launched

Independent internal audit conducted across our control framework. All identified findings tracked to closure within Scrut, our GRC platform.

Sep 2025
Vulnerability assessment & penetration test (VAPT L1) completed

Third-party penetration test report completed and uploaded to our control-evidence vault. Executive summary available under NDA.

Sep 2025
Continuous control monitoring active

Scrut platform actively monitoring control posture across SOC 2, ISO 27001, GDPR, HIPAA, and CCPA framework requirements.

Showing the most recent operational events. Full audit history and live control state are available via Trust Vault.

What we won't do.

Most trust pages list what a vendor will do. The harder list — and the more useful one — is what a vendor commits not to. These commitments are contractual.

We do not and will not hide an incident. Every reportable production incident gets a public post-mortem within five business days — with root cause, customer impact, and what we changed. No marketing edits.

We do not and will not use customer data to train AI models. Not ours, not anyone else's. This is written into our DPA and survives termination.

We do not and will not sell, share, or monetize student data. Ever, under any condition. There is no advertising layer, no data brokerage, no analytics partnership that touches student records.

We do not and will not change sub-processors silently. You get thirty days' notice before any new vendor touches your data. The full sub-processor list is published and refreshed quarterly.

We do not and will not delay a deletion. When you terminate, your data is cryptographically erased within 30 days. A signed deletion certificate follows. Backups age out within an additional 60.

We do not and will not bury bad news in a footer. If something material changes — a sub-processor we removed under pressure, a finding we couldn't close, a customer we lost over compliance — it goes in the changelog where everyone can see it.

The people responsible.

When something goes wrong — a question, a concern, a vulnerability, an outage — these are the people who pick up.

Swati
Swati Khandelwal
Chief Operating Officer & Head of Trust

Swati owns Pencil Spaces' compliance, security, and operational posture. Privacy reviews, audit response, customer security questionnaires, and vendor risk assessments all route through her.

swati.khandelwal@pencilspaces.com
Amogh
Amogh Asgekar
Chief Technology Officer & Co-Founder

Amogh owns the engineering systems behind every trust claim on this page — production access, encryption, infrastructure controls, and the technical evidence that backs every audit.

amogh.asgekar@pencilspaces.com
Ayush
Ayush Agrawal
Chief Executive Officer & Co-Founder

For board-level escalations, category-defining concerns, or anything that needs to bypass the standard intake. He responds to direct email personally.

ayush.agrawal@pencilspaces.com

For general security inquiries, write to security@pencilspaces.com. For legal or contractual matters, write to legal@pencilspaces.com.

Common questions, direct answers.

Procurement, IT, and parents tend to arrive with the same questions. The answers are below — short, sourced, and quotable. For anything not covered, the Trust team responds at trust@pencilspaces.com.

Is Pencil Spaces FERPA compliant?

Is Pencil Spaces COPPA compliant?

Does Pencil Spaces have a SOC 2 report?

Is Pencil Spaces GDPR compliant?

Does Pencil Spaces sign a HIPAA Business Associate Agreement?

Is Pencil Spaces CCPA compliant?

Is Pencil Spaces ISO 27001 certified?

Is Pencil Spaces a signatory to the National Data Privacy Agreement?

Where is Pencil Spaces customer data stored?

Does Pencil Spaces use student data to train AI models?

What sub-processors does Pencil Spaces use?

What happens to my data when our contract ends?

Has Pencil Spaces had a data breach?

How do I get access to the SOC 2 report?

Who is responsible for compliance and security at Pencil Spaces?

How do I report a security vulnerability?

Vulnerability reporting.

If you have found a vulnerability, write to security@pencilspaces.com. We acknowledge new reports within one business day, triage within five, and treat coordinated disclosure as a partnership — not a legal threat. Researchers acting in good faith have our full safe-harbor commitment.

Need something specific?

Self-serve through the Trust Vault, or write to a real human.