Security at Hypothesis
Hypothesis understands the importance of protecting the security of our users’ data. In order to do this we employ a variety of development approaches and security controls based on industry best practices. For higher education customers, we have documented these in our HECVAT response. We have also completed a Cloud Security Alliance CAIQ assessment, available upon request. In addition to our internal practices, we contract with a third party that performs an annual evaluation of the security of our software and infrastructure. Please contact us for their latest report.
The methods we use to protect the security of users’ data include:
  • Following software development best practices to avoid common vulnerabilities
  • Following cloud infrastructure best practices to prevent unauthorized access to data
  • Static analysis of our code
  • Automatic vulnerability monitoring for third-party dependencies
  • Security awareness training for our staff
  • Regular security assessments of our infrastructure
  • Automated log analysis and security event alerting
  • Third-party audits for vulnerabilities in our software
  • Third-party penetration testing of our infrastructure
For more information on how we handle user data, see:
Liquid Margins, the regular show where we gather to talk about collaborative annotation, social learning, and other ways we make knowledge together.
LMS App
Install the Hypothesis LMS App in your LMS and learn more about our pilot program for educational institutions.
START A CONVERSATION
Talk with us about using collaborative annotation for teaching and learning.
CONTACT US
COMMUNITY
See the latest events and activities from the AnnotatED community: educators, researchers, and technologists engaging deeply with collaborative annotation in teaching and learning.
VISIT
NEWS
Everyone Included: Hypothesis Accessibility Reaches WCAG 2.1
Hypothesis has passed another inclusivity milepost: When used in a learning management system (LMS), our social annotation tool now meets the rigorous level of AA compliance with WCAG 2.1.
Breaking Boundaries With Social Annotation: An Interview With Amanda Licastro
Amanda Licastro talks about how she uses social annotation in a wide variety of different classes and assignments to build classroom community, digital literacies, and scholarly practice with her students.
Hypothesis Social Annotation Now With Blackboard Groups
Instructors using Blackboard Learn can now assign Hypothesis-powered readings using Learn's built-in Groups feature, enabling learners to annotate together with fully customizable group settings that fit any course configuration.
VIEW ALL NEWS
EVENTS
COMMUNITY, PRIVACY, SECURITY, ACCESSIBILITY, AND RESEARCH AT HYPOTHESIS
ABOUT US
About
Sponsors
Team
Jobs
Partners
Press
IN ACTION
Events
Education
Journalism
Publishing
Research
Demos
I Annotate
AAK
DEVELOPERS
Developers
Engineering Values
Documentation
GitHub
Roadmap
Hiring Process
HYPOTHESIS
Blog
Help
Contact Us
Accessibility
Community Guidelines
Privacy Policy
Security
Terms of Service
SUBSCRIBE & FOLLOW