Security center
How to Contact Us
If you have any questions or concerns, please feel free to contact us at the following email.
Privacy Policy
Data Collection
Minimal Case Data Collected
Our tools can be used with little or no case data. Because our tools are focused on aggregating public information, our tools do not collect significant amounts of data – unless you or your users enter such data.
Data Security
Encryption everywhere
We use strong browser encryption, encrypt data at every stage of transit, store data only in encrypted storage systems, and implement strong processes and procedures for managing the encryption keys.
Review our Privacy Policy for more information.
Data Sharing
We do not share private or case data
We do not allow any data sharing outside of the team you have authorized.
For the purposes of demonstrating the value of our services, and to help you understand your own metrics, we may share very limited aggregate anonymized usage data.
Review our Privacy Policy for more information.
Data Portability
Complete data exports and integrations available
Our tools offer complete data exports and automated report generation. Our goal is to support your mission of caring for foster children – and that includes providing complete portability of data into other systems. We encourage you to consider how we can help you automate tedious data entry and sharing processes.
Review our Privacy Policy for more information.
Data Location
All data is in the U.S.
All data collected through our tools are stored in the United States. Family Connections data is stored in Google Cloud Central 1 Region located in Council Bluffs, Iowa. People Search and Impact Dashboard data is stored in AWS US-East-1 Region located in Northern Virginia.
Connect Our Kids personnel will never share case information with any party, even the account owner, and even when we are expressly asked to do so. You agree that under no circumstances will Connect Our Kids be considered a system of record for your case information, and under no circumstances can Connect Our Kids help you recover lost case information – except through the regular use of connectourkids.org and its Services. You agree that Connect Our Kids may collect and maintain anonymized information about the status and outcomes of each case you submit to connectourkids.org and its Services. Further, you agree that Connect Our Kids may report anonymized aggregate case status and outcome information for the purposes of advertising our services, and reporting information to our funders. Connect Our Kids shall make every effort to dissociate all reported anonymous and aggregate case information – except when you expressly request that we support you with non-anonymous or non-aggregate information.
Review our Privacy Policy for more information.
Access Control
You are in control of your access
Each “Team” in Connect Our Kids tools is directly managed by one or more persons in your organization. Team members and their permissions are controlled by the “Team Managers.” Each child’s data is protected by fine-grain security controls, and your Team Managers can grant or revoke privileges instantly.
Advanced Access Control
Integration with your user directory
We can offer your organization direct integration with your user directory servers. This allows your administrators to define their own methods of access control, including integrations with your existing policies and processes. Email security@connectourkids.org for more information.
System Monitoring
Automated Systems Monitoring
We leverage advanced systems monitoring tools to ensure the configurations deployed are in compliance with our policies and industry best practices. These tools are automatically updated with the latest rules to ensure our continual advancing security posture at a systems level.
Code Scanning
Automated Common Vulnerabilities and Exposures (CVE) detection
We leverage advanced code scanning tools to ensure that the code we produce is free of known CVE issues. These tools automatically review every version of the software that we produce, and are regularly updated with the latest vulnerability notifications.
Limited Access
Our tools are specifically designed to limit our own access to your data.
Our policies define “least privilege” access controls that limit cross-system access and the number of our internal operations team members that have the ability to affect access. We will never access your data unless we are directly serving your interests, at your direction.
System Architecture
We scale so you don’t have to
Our tools are specifically architected to achieve extreme scale. You do not have to worry about software security, upgrades, or maintenance. We focus on technology so you can focus on services for children in foster care. We allow all users to review our architecture documents. Simply contact security@connectourkids.org

