Trust & Security
Your training data deserves the same attention to detail you put into your flying.
Last updated: January 2025
Our Commitment to Security
At VectoredOps, we understand that you're trusting us with your training progress and personal information. We take that responsibility seriously. Our security practices are designed to protect your data while enabling you to focus on what matters most—becoming a safer, more proficient pilot.
Security Framework
Our security program is built on industry-recognized frameworks and best practices:
NIST Cybersecurity Framework
Our controls align with NIST CSF guidelines for identifying, protecting, detecting, responding to, and recovering from security events.
SOC 2 Type II Infrastructure
We build on infrastructure providers with independently audited SOC 2 Type II compliance for security, availability, and confidentiality.
Data Protection
Encryption at Rest
All data stored in our systems is encrypted using AES-256 encryption—the same standard used by financial institutions and government agencies.
Encryption in Transit
All communications between your device and our servers are secured with TLS 1.2+ encryption, protecting your data as it travels.
Sensitive Data Protection
Personal information is encrypted at the field level with encryption keys stored separately from your data for additional protection.
Secure Backups
Your data is automatically backed up with point-in-time recovery capabilities, ensuring your training progress is never lost.
Infrastructure Security
VectoredOps is hosted on enterprise-grade cloud infrastructure with:
- SOC 2 Type II certified data centers with 24/7 physical security monitoring
- Automated threat detection and DDoS protection
- Geographic redundancy to ensure high availability
- Regular security assessments and vulnerability scanning
Access Controls
We implement strict controls over who can access your data:
Secure Authentication
Support for Google OAuth and secure password authentication with protection against credential compromise.
Role-Based Access
Students only see their own data. Instructors only access students they're actively training.
Audit Logging
All data access is logged for accountability and security monitoring.
Data Isolation
Row-level security ensures your data is isolated and protected from unauthorized access.
Your Privacy Rights
You maintain control over your personal data:
- Access: Request a copy of all data we hold about you
- Correction: Update or correct inaccurate information
- Deletion: Request permanent deletion of your account and data
- Portability: Export your training data in standard formats
For more details, please review our Privacy Policy.
Educational Compliance
For users affiliated with educational institutions:
- FERPA: We operate as a “School Official” for university aviation programs, handling education records in accordance with FERPA requirements.
- Data Minimization: We only collect information necessary to provide our learning retention services.
Continuous Improvement
Security is not a destination—it's an ongoing commitment. We continuously:
- • Monitor for emerging threats and vulnerabilities
- • Update our systems with the latest security patches
- • Review and enhance our security practices
- • Train our team on security best practices
Security Questions?
We welcome questions about our security practices. For security-related inquiries:
To report a security vulnerability, please email us directly. We take all reports seriously and will respond promptly.