Content security and piracy
When you upload a file to a Teachable course, you have the option to enable or disable that file for student downloading. If you do not want students to be able to download your content onto their computers or devices, you can turn off the Show download link toggle for each file within your lessons. This way students will only be able to view your lesson content within Teachable.
Users will only be able to access and view your course content if they enroll in the course, unless you have the lesson set to public preview. Public previews are available to all visitors. If a lesson is set to free preview, course comments will also be publicly available.
Videos you add to your school are protected with enhanced piracy protection. This includes blocking downloads by right-clicking content, as well as blocking popular third-party plugins (like HLS Downloader, SparkC, etc.) from exporting the videos from your school. Additionally, these video files are not crawled by search engines.
NOTE: Crawling is when a search engine, such as Google, discovers new content on the web. If a file is not crawled, it should not display in search engine results.
It’s important to note that even with these security precautions, it is impossible to completely stop content theft, sharing, and piracy. Any piece of content that’s accessible online can be copied, either with software or as a direct recording—this is true for all online content, including content on Teachable.
The Digital Millennium Copyright Act, or DMCA, is a copyright law that protects content creators when somebody posts their work online without their consent. If you believe that any content appearing on our platform violates your intellectual property, please submit a DMCA takedown notice form. Sections IX and X of our Terms of Use provide further guidance on how to provide Teachable and its Designated Agent with a Notice of Claimed Infringement regarding any copyrights or trademarks that you own.
Data protection
Teachable has received a SOC (Service Organization Control) 2 Type II Accreditation. Teachable undergoes an annual audit that reviews the effectiveness of our security controls over time, not just at a single point. This includes everything that touches how customer data is stored, accessed, monitored, and protected. The resulting audit report provides detailed validation that Teachable follows industry-standard security practices across infrastructure, software, policies, and operations.
Key Capabilities Included in Our SOC 2 Program
Secure data handling and storage
Access and authentication controls across internal systems
Audit logging and continuous monitoring
Infrastructure reliability and uptime policies
Risk management and incident response procedures
Vendor- and supply-chain security controls
Governance, HR, and onboarding/offboarding processes
To request our SOC 2 report, please email us at [email protected].
Teachable uses Amazon Web Services (AWS) for data storage and infrastructure.
We apply a range of safeguards to customer data that we may process, handle, and store. We protect personal data using appropriate physical, technical, and organizational security measures.
Teachable takes all reasonable steps to protect data we receive from our users from loss, misuse or unauthorized access, disclosure, alteration and/or destruction. We give additional attention and care to personally identifiable information and sensitive personal data, and respect all laws and regulations governing personal data, as applicable.
For more details about Teachable’s data handling practices, please visit our privacy policy.
For more information on the technical, administrative, and physical security measures we employ at Teachable, please review our security overview.
Downtime and incident management
Teachable strives for and generally exceeds an average of 99.99% uptime—which refers to the time the platform is up and available for both you and your students.
Teachable has an incident response plan and associated procedures in case of a service or security incident. The Incident Response Plan defines the responsibilities of key personnel and identifies processes and procedures for notification. The execution of the Incident Response Plan is tested periodically. An incident response team is responsible for providing an incident handling capability for incidents that includes preparation, detection and analysis, remediation, and recovery.
For any major performance, outage issues and incidents, our engineers will post an update on the Teachable status page.
GDPR, CCPA, and other data regulation procedures
As part of our commitment to data privacy any Teachable user can request that Teachable give them access to or delete their personal data. To do so, start a conversation in the messenger, or email [email protected].
For more information on your personal data and Teachable, please see our privacy policy.
Change management
Teachable maintains a change management process to ensure that all changes made to the platform and production environment are applied in a deliberate manner.
Changes to the platform infrastructure, and other system components are monitored and controlled through a change control process. Changes are reviewed, approved, tested and monitored post-implementation to ensure that the expected changes are operating as intended.
Encryption
Teachable has procedures to mandate encrypted transmission and storage of sensitive information. Teachable continually works to develop products that support the latest recommended secure protocols to encrypt traffic while in transit. This means that when transmitting electronic data, the messages are encrypted so that only the sender and intended recipient can view the contents.
We monitor industry best practices and work to upgrade our products when new weaknesses are discovered and implement best practices as they evolve.
Protection against security vulnerabilities
Teachable is committed to ensuring the safety and security of all of our users. We assess our applications against the OWASP Top 10 to ensure we minimize any security risks. The OWASP Top 10 is a standard awareness framework for developers and web application security. It represents a broad consensus among the security community about the most critical security risks to web applications. We also perform an annual A third-party penetration test is when an outside company attempts to breach or hack your platform's security, with the intention of identifying any weak points that need to be improved.third-party penetration test to improve existing security procedures.
Teachable also automatically provides SSL certificates for all schools on our platform, which is a standard security protocol that encrypts any data shared between a web browser and web server.
We believe in having continuous engagement with the security community in order to keep Teachable as secure as possible with the latest safeguards. If you believe you have identified a potential security vulnerability, please follow our Responsible Disclosure Policy.

