Security
Last Updated: January 25, 2026
Our Commitment to Security
At TeacherCommentsGenerator, we take security seriously. We understand that educators trust us with sensitive student information, and we are committed to protecting that data with industry-leading security measures. This page outlines our security practices and how we safeguard your information.
Security Measures
Encryption
All data in transit is encrypted using TLS 1.3, and data at rest is encrypted using industry-standard encryption algorithms. Your sensitive information is protected at every stage.
Authentication
We use secure OAuth 2.0 authentication through trusted providers (Google, GitHub) and implement multi-factor authentication capabilities. Passwords are never stored in plain text.
Access Control
Row-level security policies ensure that users can only access their own data. Service role keys are kept secure and never exposed to client-side applications.
Data Privacy
Student information provided for comment generation is processed securely and is not permanently stored. Generated content is only accessible to the account owner.
Infrastructure Security
Our infrastructure is hosted on secure, compliant cloud platforms with regular security audits, monitoring, and automated threat detection systems.
Compliance
We follow industry best practices and comply with relevant data protection regulations including GDPR, CCPA, and FERPA guidelines for educational data.
Data Protection
Encryption Standards
- In Transit: All communications between your browser and our servers are encrypted using TLS 1.3, the latest and most secure encryption protocol.
- At Rest: All stored data is encrypted using AES-256 encryption, ensuring that even if data storage is compromised, your information remains protected.
- Database Security: Our database (Supabase) implements encryption at multiple layers, including disk encryption and application-level encryption for sensitive fields.
Authentication Security
- We use OAuth 2.0 authentication through trusted providers (Google, GitHub), eliminating the need to store passwords.
- Session tokens are securely generated and expire after periods of inactivity.
- We implement rate limiting and monitoring to detect and prevent unauthorized access attempts.
Infrastructure Security
Hosting and Infrastructure
- Our application is hosted on secure, compliant cloud infrastructure with regular security audits.
- We use Supabase for database and authentication services, which maintains SOC 2 Type II compliance.
- All servers are regularly patched and updated to address security vulnerabilities.
- We implement network security measures including firewalls, DDoS protection, and intrusion detection systems.
Monitoring and Incident Response
- We continuously monitor our systems for security threats and anomalies.
- Automated alerts notify our team of potential security issues in real-time.
- We maintain an incident response plan to quickly address and mitigate any security breaches.
- Regular security audits and penetration testing help identify and address vulnerabilities.
Data Handling and Privacy
Student Information
We understand the sensitive nature of student information. Our practices include:
- Student information provided for comment generation is processed through secure AI services but is not permanently stored in our database.
- Generated comments and images are stored temporarily for your access but can be deleted upon request.
- We comply with educational data privacy laws including FERPA (Family Educational Rights and Privacy Act) guidelines.
- You are responsible for ensuring you have proper authorization to process student data in your jurisdiction.
Data Access Controls
- Row-level security policies ensure users can only access their own account data.
- Service role keys are kept secure and never exposed to client-side code.
- Access to production systems is restricted to authorized personnel only.
- All data access is logged and monitored for security purposes.
Third-Party Security
We work with trusted third-party service providers who maintain high security standards:
- Supabase: SOC 2 Type II compliant, provides secure database and authentication services.
- Creem.io: PCI DSS compliant payment processor, handles all payment transactions securely.
- Replicate: Secure AI service provider for comment generation, processes data according to their security policies.
- OAuth Providers: Google and GitHub maintain their own security standards for authentication.
Your Role in Security
Security is a shared responsibility. You can help protect your account by:
- Using strong, unique passwords for your OAuth accounts (Google, GitHub)
- Not sharing your account credentials with others
- Logging out when using shared or public computers
- Reporting any suspicious activity immediately
- Keeping your browser and devices updated with the latest security patches
- Ensuring you have proper authorization to process student data in compliance with applicable laws
Security Incident Reporting
If you discover a security vulnerability or suspect a security breach, please contact us immediately at security@teachercommentsgenerator.com. We take all security reports seriously and will investigate promptly. We appreciate responsible disclosure of security issues.
Security Updates
We continuously work to improve our security measures. This Security page will be updated to reflect any significant changes to our security practices. We recommend reviewing this page periodically to stay informed about how we protect your data.
Contact Us
For security-related questions or concerns, please contact us at:
Security Email: security@teachercommentsgenerator.com
General Contact: teachercommentsgenerator.com