Your Data Privacy and Security

At Yellowdig your data privacy and security is a top priority.  All of the following are relevant to our use and treatment of your data.


Data Privacy and Terms of Service

Yellowdig Terms of Service can be found at The key parts of it, as it relates to privacy and security are:

  • All posted content is owned by the user that posts it, or the organization to which the user belongs. In practical terms, content posted to Yellowdig is owned by the organization or university that is using the platform.
  • Yellowdig does not resell any data to third parties. Any use of the data is for the sole purpose of providing and enhancing the service.
  • We take all reasonable measures to protect user data, including conformance to software security best practices, including use of encryption, firewalls, and limited access to production data.

Any use of Yellowdig is governed by these terms of service, however, any contract we enter into can add to or supersede any other existing terms, at the discretion of the customer.


FERPA Compliance

Yellowdig is fully FERPA compliant. The platform only uses and has access to non-sensitive directory information, such as the name and email address of the user.


GDPR Compliance

The European Union General Data Protection Regulation (GDPR) is an important change in data privacy regulations which had a major influence on how technology companies can operate in the European Union.  Since the GDPR regulations are among the most user-friendly in the world in terms of giving users control over what companies can do with their data, the regulations have become an important privacy and data-handling benchmark.  Complying with regulations requires that companies provide users some important protections and functionality, like allowing users to delete their data from a system.  Yellowdig has the necessary capabilities to make it fully GDPR compliant.


Software Security

The Yellowdig application is developed using the currently accepted best practices for applications dealing with sensitive information and deployed on the Internet for access by end-users and partners, including encryption and highly restricted access to the development, deployment, and data storage environments. This includes following the OWASP Top 10 recommendations for web application security. All user passwords are encrypted with the industry best-of-breed Bcrypt algorithm.

Yellowdig successfully passed all manual and automated audits and security scans of our application by a number of University IT departments.


Infrastructure Security

Yellowdig employs many best practices for securing networks and servers:

  • All traffic is encrypted using SSL/TLS with 256 bit encryption.
  • Yellowdig application and database servers are protected by multiple firewalls, with external WAN access as well as internal LAN restrictions.
  • Server access is granted only to those employees who need it.
  • Yellowdig’s platform itself maintains all access logs and every action by every Application user is recorded.
  • Critical operating system and application security patches are installed automatically as soon as they are available.
  • All servers run within a Virtual Private Network (VPC), further isolating and securing servers.


Physical Security

Yellowdig is hosted using Amazon Web Services (AWS). AWS data centers conform to the highest standards of physical security and processes, and have achieved ISO 27001, ISO 9001, SOC 3 and other certifications. Please refer to AWS security infrastructure information documentation at and for additional details.


Data Security

User data's are automatically backed up at regular intervals to the Amazon Elastic Block Store (EBS) service and EBS has inbuilt redundancy, saving multiple copies at different locations.

All data is maintained for a period of 5 years. Yellowdig can provide a data dump or delete data as request from the customer. Backups and snapshots use encrypted storage using AWS’s snapshotting features.

  • We host our services in the Oregon datacenters of Amazon
  • We generate most of our queries by using the query generation libraries our development framework provides
  • We take daily backups of our data on a separate server. These backups are currently complete versions of the production data. In the future as our data grows, we plan to have in place a more sophisticated backup strategy using AWS’ storage infrastructure.
  • Multiple code backups exist in the form of git repositories and 3 multi-purpose servers which are used explicitly for backups
  • Under extreme circumstances should our production server become unavailable, we can bring up another server to production in a relatively short period of time (within an hour at best, to a couple of hours)



Yellowdig applications are hosted on comprehensively firewalled servers. These firewalls default to disabling any unsupported access mechanism, and carefully configured to only allow access for known services. We build on top of the well-defined and implemented security policies of the AWS services we depend on.


Data Integrity and Disaster Recovery

Yellowdig is architected for High Availability and 100% uptime. User data is backed up frequently, and Yellowdig servers are distributed across several Availability Zones. Recovery from backups is tested regularly, and is in fact part of the normal server deployment process, ensuring that even in the event of serious malfunctions (such as data center issues), service can be restored quickly.


Breach Notification

We look for our service providers to provide us timely notification of breaches and work with us. If a security breach occurs, we will work with our customers and users to notify them in a timely manner. Yellowdig is covered for breaches under our Professional Liability insurance policy.


Anonymous Posting

Board owners have the ability to decide whether or not they and their board followers have the option of posting anonymously.  When a Pin or Comment is posted anonymously, other board followers do not see who made the most.  Only board owners are able to know the identity of the poster.



Have more questions? Submit a request


Please sign in to leave a comment.