Agency|Insights

SOC 2 for EdTech: What We Tell Education Technology Companies About Compliance

Education technology companies handle some of the most regulated data in the SaaS landscape — student personally identifiable information (PII), learning.

Agency Team
Agency Team
·13 min read
Typographic card for SOC 2 for EdTech: What We Tell Education Technology Companies About Compliance in Industry Perspectives

After guiding dozens of EdTech companies through SOC 2, we have seen firsthand how student data requirements reshape every aspect of the compliance journey. This guide captures what we consistently advise our education technology clients — from navigating the FERPA-COPPA intersection to building the controls that school district procurement teams actually scrutinize.

Education technology companies handle some of the most regulated data in the SaaS landscape — student personally identifiable information (PII), learning records, assessment results, behavioral data, and in many cases, data belonging to minors under thirteen. School districts, universities, and state education agencies increasingly require SOC 2 reports from EdTech vendors as part of their procurement process, driven by growing concern over student data privacy, high-profile data breaches in education, and the expansion of state student privacy laws. We consistently advise our EdTech clients that their SOC 2 program must address not only standard security controls but also the regulatory intersection with FERPA, COPPA, and the patchwork of state student privacy legislation that governs how student data is collected, used, and shared.

This guide covers SOC 2 compliance specifically for education technology companies serving K-12 schools, higher education institutions, and corporate training markets. It addresses the regulatory landscape, Trust Service Criteria selection for EdTech, student data handling requirements, how school district and university procurement teams evaluate EdTech vendor SOC 2 reports, and the specific controls that distinguish an EdTech SOC 2 program from a general SaaS program.

The Regulatory Landscape for EdTech

FERPA (Family Educational Rights and Privacy Act)

FERPA governs the privacy of student education records at institutions receiving federal funding. When an EdTech company processes student data on behalf of a school, the company operates as a "school official" under FERPA and must handle student education records in accordance with the law.

FERPA RequirementImpact on EdTech SOC 2
Student data used only for authorized educational purposesSOC 2 controls must demonstrate data use limitations and access restrictions
No unauthorized disclosure of student recordsAccess management and confidentiality controls must prevent unauthorized data access and sharing
Parents have right to inspect education recordsPlatform must support data access requests
Schools retain ownership and control of student dataData handling controls must reflect school ownership; deletion and export capabilities required
Data security requirementsSecurity controls must protect student education records throughout their lifecycle

COPPA (Children's Online Privacy Protection Act)

COPPA applies to EdTech companies that collect personal information from children under thirteen. For K-12 EdTech platforms, COPPA compliance is often required because the student population includes children in this age range.

COPPA RequirementImpact on EdTech SOC 2
Verifiable parental consent before collecting personal information from childrenPrivacy controls must include consent management mechanisms
Limitations on data collection to what is necessaryData minimization controls must be documented
Parental access to collected informationPlatform must support parental data access
Data deletion upon requestData retention and deletion controls must be operational
Reasonable security measuresSecurity controls must be appropriate for the sensitivity of children's data

State Student Privacy Laws

Over forty US states have enacted student privacy legislation that adds requirements beyond FERPA and COPPA. Common state law requirements include:

  • Prohibition on using student data for targeted advertising
  • Requirements for data breach notification to parents and schools
  • Data deletion requirements when contracts end
  • Restrictions on selling student data
  • Transparency requirements about data collection practices
  • Vendor compliance certification obligations

The Student Privacy Pledge, administered by the Future of Privacy Forum, provides a voluntary framework that many EdTech companies sign to demonstrate commitment to student privacy. While not legally binding in the same way as FERPA or COPPA, school districts increasingly reference the pledge during vendor evaluation.

Trust Service Criteria for EdTech

Recommended Criteria

CriterionRecommendationEdTech-Specific Rationale
Security (Common Criteria)RequiredMandatory baseline; covers access controls, change management, and incident response for student data
AvailabilityStrongly recommendedClassroom-dependent tools must be available during school hours; downtime disrupts teaching and learning
ConfidentialityRequiredStudent data confidentiality is a core obligation under FERPA, COPPA, and state laws
PrivacyStrongly recommendedEdTech companies process student personal information; Privacy criteria align with FERPA and COPPA requirements
Processing IntegritySituationalRequired for assessment platforms, grade management systems, and learning analytics where data accuracy affects student outcomes

Why Availability Matters for EdTech

EdTech platform availability has direct educational impact:

  • Classroom disruption: When a learning management system (LMS), assessment platform, or classroom tool goes down during school hours, teachers cannot deliver planned instruction
  • Assessment integrity: Testing platforms must be available during scheduled assessment windows — downtime can invalidate test results or require rescheduling
  • Learning continuity: Students relying on EdTech platforms for homework, assignments, and study materials need consistent access
  • District-wide impact: A single EdTech platform may serve thousands of students across a district — downtime affects the entire educational community

We recommend documenting the following Availability controls:

  • Uptime commitments appropriate for educational use (availability during school hours across US time zones)
  • Capacity planning for peak periods (back-to-school, standardized testing windows, end-of-term)
  • Redundancy mechanisms that maintain service during infrastructure failures
  • Communication procedures for notifying districts and schools of planned or unplanned downtime

Why Privacy Is Important for EdTech

The Privacy criterion is more relevant for EdTech companies than for most SaaS verticals because:

  • Student personal information is subject to specific privacy regulations (FERPA, COPPA, state laws)
  • School districts and parents are increasingly sensitive to how student data is used
  • Privacy violations involving children's data carry significant reputational and regulatory consequences
  • Including the Privacy criterion demonstrates proactive commitment to student privacy beyond minimum legal requirements

EdTech-Specific Controls

Student Data Handling

Control AreaWhat to Implement
Data purpose limitationTechnical and administrative controls ensuring student data is used only for authorized educational purposes — no use for advertising, marketing, or purposes beyond the educational service
Data minimizationCollect only the student data necessary for the educational service; document what data is collected and why
Data retention and deletionDefined retention periods for student data; automated or procedural deletion when retention period expires or contract ends; ability to delete data upon school request
Data portabilityAbility to export student data in a standard format upon school request; supports school's ownership of student data
Age-appropriate data handlingDifferentiated data handling procedures for students under thirteen (COPPA requirements) versus older students
Parental and school accessMechanisms for parents and schools to access, review, and request deletion of student data

Access Management for Student Data

ControlEdTech-Specific Requirement
Role-based access by educational roleAccess differentiated by role — teacher (access to own students), administrator (access to school/district data), student (access to own records), parent (access to child's records)
Teacher-student data boundariesTeachers can access only their assigned students' data; cross-classroom access restricted
District data isolationMulti-district platforms must isolate data between districts — one district cannot access another's student data
Student data access loggingComprehensive logging of all access to student records for FERPA compliance and audit purposes
Minimum necessary accessAccess limited to the minimum data necessary for each role's educational function

Assessment and Grade Data Integrity

For EdTech companies that process assessments, grades, or learning analytics:

ControlPurpose
Assessment data immutabilityOnce submitted, assessment responses and scores are protected from unauthorized modification
Grade calculation accuracyAutomated grade calculations are validated for accuracy; manual overrides are logged
Score transmission integrityAssessment scores transmitted between systems (LMS, SIS, state reporting) maintain accuracy throughout the data flow
Testing environment securityOnline assessment environments include controls preventing unauthorized access to test content and student responses

Incident Response for Student Data

Student data breaches carry unique requirements:

RequirementDetail
School notificationNotify affected schools within contractual timeframe (typically twenty-four to seventy-two hours)
Parent notificationSupport schools in notifying parents of affected students per state law requirements
Regulatory notificationComply with state breach notification laws specific to student data
Incident documentationDocument the scope of student data affected, root cause, and remediation for school review
Post-incident cooperationCooperate with school districts' own incident response and investigation procedures

How Education Procurement Teams Evaluate SOC 2 Reports

K-12 School District Procurement

School district technology directors and IT coordinators evaluate EdTech SOC 2 reports with particular attention to:

Evaluation FocusWhat They Look For
Student data protectionControls specifically addressing student PII, education records, and age-appropriate data handling
FERPA alignmentEvidence that the SOC 2 program addresses FERPA requirements for data use limitation, access restrictions, and school data ownership
Data deletion capabilityConfirmation that student data can be deleted when the contract ends or upon school request
Availability during school hoursUptime commitments and incident communication procedures relevant to school operating hours
Third-party data sharing restrictionsControls preventing student data from being shared with unauthorized third parties
Privacy criterion inclusionMany districts specifically look for the Privacy criterion in EdTech vendor SOC 2 reports

Higher Education Procurement

Universities and colleges evaluate EdTech SOC 2 reports with broader security expectations:

Evaluation FocusWhat They Look For
Integration securityControls for integrating with campus identity systems, student information systems (SIS), and LMS platforms
Research data handlingControls for handling potentially sensitive research data (if the EdTech platform supports research functions)
FERPA complianceStudent data protection aligned with FERPA requirements for higher education records
Multi-institution data isolationFor platforms serving multiple institutions, clear tenant isolation and data segregation controls
Accessibility complianceWhile not part of SOC 2, universities often evaluate accessibility alongside security during procurement

State Education Agency Requirements

State education agencies that manage state-level educational technology contracts often require:

  • SOC 2 Type II report covering Security, Availability, and Confidentiality at minimum
  • Evidence of FERPA compliance alignment
  • State-specific student privacy law compliance
  • Data residency documentation (where student data is stored and processed)
  • Penetration testing results
  • Incident response and breach notification procedures

Building an EdTech SOC 2 Program

Implementation Priority Order

Based on what we see working with EdTech clients, we recommend the following priority order:

PriorityControl AreaWhy First
1Student data access managementFERPA compliance and the highest-scrutiny control area for EdTech
2Data purpose limitation and minimizationCore regulatory requirement; districts evaluate this closely
3Encryption for student data at rest and in transitBaseline protection for sensitive student information
4Multi-tenant data isolationDistricts must be confident their data is separated from other customers
5Monitoring and logging of student data accessFERPA audit trail requirements; essential for incident investigation
6Data retention and deletion controlsContract-end data handling is a top district concern
7Availability and capacity planningClassroom-dependent tools must be reliable during school hours
8Incident response with school notificationDistricts need confidence in rapid breach notification

Complementary Certifications and Attestations

In our experience, EdTech companies that pursue additional certifications alongside SOC 2 strengthen their position during procurement:

CertificationPurposeRelationship to SOC 2
Student Privacy PledgeVoluntary commitment to student privacy best practicesDemonstrates privacy commitment; referenced during procurement
iKeepSafe COPPA Safe HarborCOPPA compliance certificationAddresses COPPA specifically; complements SOC 2 Privacy criterion
1EdTech (IMS Global) certificationInteroperability standards complianceAddresses integration standards; separate from SOC 2
State-specific certificationsVarious state student privacy certificationsAddresses state law compliance; complements SOC 2

Key Takeaways

  • We consistently see that EdTech SOC 2 programs must address the regulatory intersection with FERPA, COPPA, and state student privacy laws — standard SOC 2 controls alone are not sufficient
  • What we recommend: include Security, Availability, Confidentiality, and Privacy at minimum — school districts increasingly expect the Privacy criterion from EdTech vendors
  • In our experience, student data handling controls (purpose limitation, minimization, retention, deletion, portability) are where EdTech programs diverge most from general SaaS SOC 2
  • We advise all EdTech clients to build access management that differentiates by educational role (teacher, administrator, student, parent) with appropriate data boundaries
  • Availability is critical for classroom-dependent tools — we have seen district relationships damaged by downtime during school hours
  • What we tell every EdTech client: data deletion capability when contracts end is a top concern for school district procurement teams
  • K-12 districts focus on FERPA alignment, student data protection, and data deletion; universities add integration security and research data handling
  • We recommend treating multi-tenant data isolation between districts as non-negotiable — one district must never access another's student data
  • Over forty US states have enacted student privacy laws creating a patchwork of requirements beyond FERPA and COPPA — we help clients map these to their SOC 2 controls
  • Student data breaches require school notification within contractual timeframes and may require parent notification per state law

Frequently Asked Questions

Does SOC 2 satisfy FERPA requirements?

What we tell clients is that SOC 2 does not directly satisfy FERPA — they are different frameworks with different requirements. However, a SOC 2 program with appropriate EdTech-specific controls (data purpose limitation, access restrictions, deletion capability) demonstrates many of the security safeguards FERPA requires for school officials handling student data. Based on what we see in procurement cycles, school districts view SOC 2 as complementary to FERPA compliance, not a substitute for it. Your SOC 2 report provides independent verification of security controls that support your FERPA obligations.

Do EdTech companies need the Privacy criterion?

Based on what we see advising K-12 EdTech companies, we strongly recommend including the Privacy criterion. It covers personal information lifecycle management (notice, consent, collection, use, access, disclosure, disposal) that aligns with FERPA and COPPA requirements. School districts increasingly look for the Privacy criterion when evaluating EdTech vendor SOC 2 reports. For higher education EdTech, the Privacy criterion is less commonly required but still valuable for demonstrating comprehensive data governance.

How does COPPA affect our SOC 2 program?

What we tell clients is that if your platform collects personal information from children under thirteen (most K-12 EdTech platforms do), COPPA adds specific requirements: verifiable parental consent mechanisms, data minimization, parental access to collected information, and data deletion upon request. We recommend that your SOC 2 Privacy and Confidentiality controls incorporate these COPPA-specific requirements. In our experience, some EdTech companies pursue separate COPPA Safe Harbor certification alongside SOC 2 to specifically address COPPA compliance.

What do school districts care about most in our SOC 2 report?

Based on what we see across dozens of district procurement reviews: (1) student data access controls with role-based restrictions, (2) data deletion capability when contracts end, (3) data purpose limitation (student data used only for educational purposes), (4) breach notification procedures, and (5) availability during school hours. What we consistently hear from procurement teams is that they care less about the auditor's brand and more about whether the controls specifically address student data protection. A SOC 2 report that covers general SaaS security without EdTech-specific controls may be viewed as insufficient.

Should an EdTech company pursue SOC 2 or a student privacy certification first?

What we recommend is pursuing SOC 2 first. SOC 2 provides the broadest security attestation recognized across all buyer types — school districts, universities, corporate training buyers, and enterprise education departments. Student privacy certifications (Student Privacy Pledge, iKeepSafe COPPA Safe Harbor) are complementary and should be pursued alongside or after SOC 2. In our experience, the SOC 2 program establishes the security infrastructure that supports all other compliance efforts.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.