Terms & Conditions
Clear guidelines that define how Asaman works and protects its users.

Terms of Services
Global Privacy Policy
Data Processing Agreement
Cookies And Tracking Policy
Acceptable Use Policy (AUP)
AI And Safeguarding Statement
Data Protection And Security Overview
Data Retention And Off-Boarding Policy
Parental Consent And Minor Data Notice
Asaman Data And Privacy Governance Framework
Data Protection And Security Overview
Effective Date: Oct 28th, 2025
Our Data Protection and Security Overview provides comprehensive information about the technical and organizational measures we implement to protect user data, including encryption, access controls, and incident response procedures.
- Purpose
- Our Commitment
- Governance And Compliance Framework
- ISO/IEC 27001-2022: Information Security Management
- SOC II: Service Organization Controls for SaaS operations
- GDPR (EU) / UK-GDPR: General Data Protection Regulation
- PIPL (China): Personal Information Protection Law
- FERPA / COPPA (USA): Student data privacy and child protection
- Singapore PDPA: Personal Data Protection Act
- Infrastructure And Data Hosting
- Global ArchitectureAsaman's multi-region, redundant cloud infrastructure operates on trusted global providers:
- Asia-Pacific: AWS Singapore, Azure Hong Kong
- Europe: AWS Frankfurt, Azure Netherlands
- North America: AWS Virginia
- Mainland China: Alibaba Cloud (Aliyun) - ICP-compliant regional environment
- Data Residency
- Data remains within the region selected by the school.
- No cross-border transfer occurs without the school's written authorization.
Data Security
Layer Core Protections Network & Perimeter Firewalls, intrusion detection & prevention, DDoS protection, and continuous monitoring. Application Secure development lifecycle (OWASP-based), code reviews, and automated vulnerability scanning. Encryption TLS 1.3 for data in transit, AES-256 for data at rest, and key management via cloud KMS. Access Management Role-based permissions, least-privilege model, and multi-factor authentication for administrators. Operational Security 24/7 monitoring, incident-response plan, change-management, and patching policies. Physical Security Data centers certified to ISO 27001 and SOC II, with biometric and CCTV controlled access. - Data Backup And Continuity
- Full encrypted backups are performed daily; incremental backups are performed hourly.
- Backups are stored in the same geographic region as the primary data.
- Retention follows a rolling 30-day cycle.
- Disaster Recovery objectives: Recovery Time Objective (RTO) ≤ 12 hours; Recovery Point Objective (RPO) ≤ 4 hours.
- Regular restoration tests are conducted to confirm data integrity.
- Access, Auditing, And Monitoring
- All administrative access is logged and reviewed.
- Audit trails record user and system activity for accountability.
- Annual internal audits evaluate compliance with security and privacy policies.
- Penetration testing is conducted by independent assessors at least once per year.
- Incident Response And Breach Management
- Immediate containment and internal escalation within one hour of detection.
- Assessment and notification to affected Schools within 48 hours once confirmed.
- Remediation and documentation of corrective measures.
- Post-incident review to prevent recurrence.
- Sub-Processors And Third Parties
- Schools retain ownership of all student, parent, and staff data
- Asaman never sells or transfers data for advertising
- Schools may export or delete their data at any time
- Data Subject rights (access, correction, deletion, portability) are handled through the School, with Asaman’s assistance as Processor
- Staff Awareness And Confidentiality
- Signs confidentiality and data-protection agreements
- Receives onboarding and annual privacy/security training
- Is bound by disciplinary policy for non-compliance
- Compliance Documentation
- ISO 27001 readiness summary and audit evidence
- Data-Processing Agreement (DPA)
- Security and Privacy Policy documents
- Results of external penetration tests (executive summary)
- Contact And Jurisdiction
- Security & Privacy Office: Asaman Technologies Ltd.
- Email: support@asaman.net
- Website: www.asaman.net
- Governing Law: Singapore
- Commitment Statement
This document provides schools, administrators, and partners with a summary of how Asaman Technologies Ltd. protects, manages, and processes information on its platform. Asaman's mission is to enable educational institutions to operate confidently in a secure, privacy-first digital environment.
Security and privacy are at the core of Asaman's design. We apply international standards, robust encryption, and transparent data-handling practices to ensure every School retains full control and ownership of its data. Asaman acts as a Data Processor, while each subscribing School is the Data Controller. Information is processed solely on behalf of the School and in accordance with the laws of its jurisdiction.
Asaman's governance model aligns with major global privacy and security frameworks. Data-protection policies, risk assessments, and staff security training are reviewed annually.
Asaman engages only vetted sub-processors for hosting, messaging, or analytics functions. Each provider:
Every employee and contractor:
Upon request, Asaman provides to contracted Schools:
Asaman Technologies Ltd. guarantees that every byte of school, teacher, parent, and student data is protected by design and by default. Our systems are designed to meet international standards for privacy, transparency, and operational excellence, enabling schools to focus on learning, not risk.