🔐 Data Security & Protection

LSM AI HUB - Comprehensive Security Overview

← Back to Login

1. Security Framework Overview

LSM AI HUB implements a comprehensive, multi-layered security framework to protect your data. We follow industry-leading standards and best practices to ensure the highest level of data protection. The Learning Plan AI tool is part of this secure system.

Our Commitment: We maintain the highest security standards and continuously update our systems to protect against emerging threats. Your data security is our top priority.

2. Encryption Technology

2.1 Data in Transit (Encryption)

All data traveling between your device and our servers is protected using:

Protocol: TLS 1.2+ | Cipher Suites: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Key Exchange: ECDHE | Symmetric Encryption: AES-256-GCM

2.2 Data at Rest (Storage Encryption)

All data stored in our systems is encrypted using:

Algorithm: AES-256-GCM | Key Size: 256 bits
Storage Backend: Google Cloud Firestore | Compliance: FIPS 140-2 validated

3. Authentication & Authorization

3.1 Authentication Methods

We use industry-standard authentication protocols:

3.2 Access Control

We implement strict access controls:

4. Firestore Security Rules

Our database is protected with comprehensive Firestore security rules:

match /users/{userId} {
  allow read, write: if request.auth.token.email.matches('.*@lsm.edu.ph');
}

match /lessonPlans/{docId} {
  allow read, write: if request.auth.uid == resource.data.userId;
}

This ensures:

5. Infrastructure Security

5.1 Google Cloud Platform

We utilize Google Cloud Platform's enterprise-grade infrastructure:

5.2 Firebase Security

Firebase provides additional security layers:

6. Application Security

6.1 Code Security

We maintain secure coding practices:

6.2 Security Testing

We perform continuous security testing:

7. Data Backup & Recovery

7.1 Backup Strategy

7.2 Recovery Process

In case of data loss:

8. Monitoring & Incident Response

8.1 Continuous Monitoring

We monitor your account and systems 24/7:

8.2 Incident Response

In case of a security incident, we follow this protocol:

  1. Detection & Assessment - Immediately identify and assess the incident
  2. Containment - Stop the threat from spreading (within minutes)
  3. Investigation - Thorough forensic analysis (24-48 hours)
  4. Notification - Affected users notified within 24 hours
  5. Remediation - Implement fixes and prevent recurrence
  6. Follow-up - Post-incident review and process improvement
Security Incident Reporting: If you suspect a security breach, contact your administrator immediately. Do not use the compromised account further.

9. Compliance & Certifications

9.1 Regulatory Compliance

We comply with international data protection regulations:

9.2 Google Cloud Certifications

10. Secure Development Practices

10.1 Development Lifecycle

10.2 Deployment Security

11. Third-Party Security

11.1 Vendor Assessment

All third-party service providers undergo:

11.2 Google Firebase Commitment

Firebase (our primary infrastructure) is:

12. Employee Security

12.1 Staff Training

12.2 Access Restrictions

13. Your Security Responsibilities

While we maintain robust security measures, you play an important role:

14. Security Updates & Patches

We maintain continuous security updates:

15. Contact for Security Concerns

If you have security concerns or wish to report a vulnerability:

Responsible Disclosure: We appreciate security researchers who responsibly report vulnerabilities. Please allow 30 days for us to address the issue before public disclosure.
Last Updated: November 25, 2025
Effective Date: November 25, 2025
Next Review Date: May 25, 2026