Articulate Trust Center
We keep your information safe and data secure.
We take security seriously at Articulate. We understand how important data protection is to our customers and we work hard to maintain your trust. And we’re transparent about our data management practices so you can feel comfortable using our software. Download our Articulate 360 Security and Global Data Security and Privacy policies to learn about our approach and review our privacy notice to get additional details on how we protect personal information. Explore AI Security and Privacy at Articulate to learn how we’re developing AI-powered product enhancements that boost productivity while prioritizing safety and confidentiality.
Compliance and certifications
Articulate’s privacy-by-design mandate ensures that only necessary data is collected, and makes it easy to see and manage your data. Articulate partners with carefully selected industry leaders with first-rate security practices.






Encryption
We apply the most advanced encryption technology publicly available to secure data. Using 256‑bit TLS/SSL encryption and a minimum of 2048‑bit RSA encryption, Articulate encrypts all data at rest and all network traffic, including on payment pages, into and out of Amazon Web Services (AWS).
Hiring & training policies
Using a rigorous hiring process, we hire and retain only the industry’s best engineers; they must have superlative track records and references to be part of our team. We provide extensive internal and external training opportunities to all of our developers.
Engineering practices
A limited number of trusted, qualified engineers can access customer data, and we have multiple protections in place to protect access to production servers. Engineers have restricted access to production content, allowing them to troubleshoot production outages.
Technology advancement
We have rigorous processes for vetting and implementing emerging technology to maintain a state-of-the-art infrastructure. We partner with third-party testing companies to continuously monitor our security infrastructure for vulnerabilities and implement fixes immediately. We also closely monitor developments in the infrastructure sector to address emerging vulnerabilities rapidly.
Hosting
We partner with industry-leading hosting providers to create redundant and reliable hosting infrastructure. All Articulate services are hosted on Amazon Web Services (AWS) in the us-east-1 region located in northern Virginia in the United States. We make frequent automated backups of customer data and have implemented up-to-the-minute recovery options where feasible. We store backups in a redundant way and test our recovery frequently to reduce the likelihood of data loss and minimize downtime in a large-scale disaster. We have built redundancy into all our services to eliminate single points of failure in our infrastructure.
Have questions? Contact us
If you’d like to report a security issue, contact us at security-disclosure@articulate.com
Explore our resources
Everything you need to know, all in one place. Browse our resources to learn more about our commitment to security, data protection, responsible innovation, and more.
Certified security you can trust. Our platform is built on strict compliance frameworks, with rigorous audits and certifications like SOC 2, ISO, and FedRAMP. Dive into our policies to understand how we safeguard your information.
Supporting Documents | Access |
---|---|
ISO | View PDF |
FEDRAMP | View PDF |
Security White Paper | View PDF |
Security Policy | View PDF |
Self Attestations | View PDF |
Status Page | View online |
SOC2 Preview | View PDF |
SOC2 Full Report | Request access |
Network Diagram | Request access |
Pentest Summary | Request access |
Audit Reports | Request access |
Bridge Letters | Request access |
AI with integrity. Our AI meets your needs, so you can pass security reviews quickly. We have a zero data retention policy with our AI subprocessors, and we never use your content to train our AI. Your team can rest easy knowing our AI tools are built for transparency, equity, security, and privacy.
Supporting Documents | Access |
---|---|
AI Security and Privacy White Paper | View PDF |
AI Subprocessors | View online |
AI FAQs | View online |
AI Detailed Security FAQ | Request access |
Transparency in everything we do. Our policies outline when and where your data is retained, how it’s handled, and your rights as a user. Review the attached documents to learn about our commitment to your privacy and safety.
Supporting Documents | Access |
---|---|
Global Data Security and Privacy | View PDF |
Regional Data Hosting Policy | View online |
Subprocessors | View online |
GDPR | View online |
Privacy Notice | View online |
Data Processing Agreement | View online |
Data Retention and Handling Policies | Request access |
E-learning should be for everyone. We continually enhance our accessibility features and provide key resources to help course creators design training that meets the needs of all learners.
Supporting Documents | Access |
---|---|
Accessibility Statement and Policy | View PDF |
WCAG Guide | View online |
Section 508 Guide | View online |
EN 301 549 Guide | View online |
Rise 360 Accessibility Conformance Report | View online |
Storyline 360 Accessibility Conformance Report | View online |
Reach 360 Accessibility Conformance Report | View online |
Rise 360 Accessibility Maturity Plan | View online |
Storyline 360 Accessibility Maturity Plan | View online |
Reach 360 Accessibility Maturity Plan | View online |
More accessibility questions? Contact us
Secure access, seamless integration. Enable Multi-Factor Authorization for added security, and utilize our API to integrate our platform directly into the systems that power your business.
Supporting Documents | Access |
---|---|
SSO Setup | View online |
Reach 360 API | View online |