Privacy & Security Policy

Your data security is our priority.

We do not automatically capture personal info (name, phone, email) that identifies you individually.

Data Collection
  • Voluntary: You will be informed of specific purposes when asked for info.
  • Security: Adequate measures are taken to protect your data.
Sharing & Protection
  • No Selling: We do not sell/share your info with third parties.
  • Protection: Data is secured against loss, misuse, or unauthorized access.
Technical Logs

We gather standard non-personal logs including IP addresses, browser type, date/time, and pages visited.

We make no attempt to link these addresses with the identity of individuals unless an attempt to damage the site has been detected.

Information Security Policy

Transform | Succeed | Excel

Our Security Promise

We protect every piece of information entrusted to us.

"Information is one of our most valuable assets… protecting this information is essential to maintain trust."
ISMS Manual

We protect your data with an ISO 27001:2022 aligned security framework, ensuring confidentiality, integrity, and uninterrupted learning experiences.

What We Protect
  • Learner Data
    Personal information, assessments, progress records
  • Proprietary Content
    Courseware, cloud labs, IP on AI, Cybersecurity, DevOps
  • Cloud Platforms
    E-learning systems, virtual classrooms, assessment engines
  • Client Information
    Contracts, training data, enterprise integrations
Our Security Principles
  • Confidentiality
    Only authorized people access sensitive information
  • Integrity
    Data remains accurate, consistent, and tamper-free
  • Availability
    Training platforms and cloud labs stay reliable and accessible
How We Safeguard Information
Risk-Based Controls:
Across people, processes, technology, and cloud systems
Compliance:
Aligned with ISO/IEC 27001:2022 and India’s DPDP Act
Access Management:
Role-based access, secure authentication, vendor governance
Secure Operations:
Monitoring, incident response, vulnerability management
Awareness Training:
Every employee and trainer completes annual security training
Continuous Improvement

We follow the Plan–Do–Check–Act (PDCA) cycle:

Plan
Identify risks
Do
Implement measures
Check
Audit, monitor
Act
Improve findings

"The organization shall continually improve the suitability, adequacy and effectiveness of the ISMS."

Our Commitment to You

We ensure secure, reliable, and future-ready learning experiences — protecting your data while empowering your growth.

Leadership & Accountability

CEO & MR Heeresh Dubey
Strategic oversight & governance
CISO Anantha Bhaskar
anantha.bhaskar@tseedu.com
Everyone at TSE
Security is a shared responsibility