Rationarium Information Security Policy

Effective Date: January 1, 2026 Review Cycle: Annual Policy Owner: Chief Executive Officer / Chief Technology Officer, Rationarium Inc. Last Documented Review: December 9, 2025

Purpose

This policy establishes the security principles, controls, and responsibilities that Rationarium Inc. applies to the systems and data entrusted to us by institutional customers. It is provided as a high-level summary; additional technical detail is available to customers under NDA.

Scope

This policy covers all Rationarium Inc. systems involved in delivering WeBWorK hosting services, including:

Guiding Principles

  1. Minimize data. Collect and retain only what is required to deliver the service.
  2. Isolate customers. Never commingle data from different customers.
  3. Default-deny access. Grant access only when and where it is needed, and only for as long as it is needed.
  4. Assume compromise is possible. Maintain monitoring, backups, and response capability that permit recovery even from a full host compromise.
  5. Be transparent. Tell customers what we do, how we do it, and promptly when something goes wrong.

Standards Alignment

Rationarium’s controls are informed by:

Access Control

Authentication

Network Security

Data Protection

Monitoring and Logging

Rationarium operates a centralized monitoring stack covering all production customer instances:

Customer WeBWorK instances record login, logout, action, timestamp, and source IP address for all user activity. Logs are available to institutional administrators.

Vulnerability Management

Incident Response

Rationarium maintains a written incident response runbook covering detection, containment, investigation, customer notification, and post-incident review. Customer notification commitments are described in the Incident Notification Policy. Key commitments:

Change Management

Rationarium’s Change Management Policy describes how changes to customer environments are planned, communicated, and executed. In summary: changes are coordinated with the customer administrator, scheduled during minimum-impact windows where practical, preceded by a backup snapshot, and logged.

Third-Party Sub-Processors

Rationarium uses one infrastructure sub-processor:

Rationarium does not share institutional or student data with any other third party. A current list of sub-processors is maintained and customers will be notified at least thirty days before any addition.

Physical Security

Rationarium does not operate physical data center facilities. Physical and environmental controls at the data-center layer are the responsibility of DigitalOcean, whose certifications are published at https://www.digitalocean.com/trust/certification-reports. Administrative workstations used by Rationarium staff are stored in private, access-controlled locations and use full-disk encryption.

Personnel

Policy Review

This policy is reviewed at least annually and updated in response to material changes in services, infrastructure, or the threat environment. The effective date above indicates the current version.

Contact

Security inquiries, vulnerability reports, and policy questions: andrew@rationarium.org