We designed Populi for security.

Our technology choices, programming decisions, and development standards all work to keep your college’s information private, safe, and secure.

Secure hardware

Populi’s servers are stored in an SSAE 16 Type II compliant data center that is physically secured behind a battery of compartmentalized security zones with biometric access controls. Numerous security, power supply, and infrastructure redundancies layer on additional safeguards.

Daily backups

Security isn’t just about preventing unauthorized access; Populi also actively protects your data against loss. Daily, weekly, and monthly data “snapshots” back up all your information in a fully-encrypted “cloud” in real-time.

Encryption

Your computers access Populi over 256-bit SSL-encrypted connections. That’s the same technology that secures things like online bank transactions.

Proactive monitoring

Populi keeps the software and your data behind secure firewalls and actively monitors for hacking or probing attempts.

Design standards

We built Populi on the open-source “LAMP” stack (Linux, Apache, MySQL, PHP), availing you of the same powerful, secure technology undergirding web companies like Google, Vimeo, Facebook, and Amazon.

Responsive development

Keeping a close eye on emerging internet security threats, the Populi team quickly updates the program with safeguards and security patches. Security is an ongoing process here, and we’re continually strengthening Populi’s defenses.

Strong passwords

Populi requires hacker-resistant, alphanumeric passwords, considered to be one of the best defenses against hijacked user accounts—which are, in turn, the leading cause of security breaches.

User access privileges

Populi’s user privilege levels and per-item visibility settings ensure that sensitive data is kept confidential.

Timed logouts

The system automatically logs users out after a short period of inactivity. That helps prevent unauthorized users from accessing an account on an unattended computer.

Change log

Populi keeps a detailed change log on important records—recording the change, who performed it, and when.