Skip to content

Security & privacy

Celia never sees a name.

Every other AI enrollment tool processes student PII in some form. CeliaConnect is designed so it cannot. This is not a policy commitment we could choose to break — it is a structural property of the system, verifiable by any technical review.

The analyses, under the microscope

What Celia sees (and what it doesn't).

CeliaConnect produces three structured analyses — Engagement, Readiness, and Yield. Each reasons on a narrow slice of anonymized signals. None of them receive PII. Ever.

Engagement

What Celia sees

Anonymized timestamps of logins, opens, clicks, form interactions, and outreach replies. Channel labels (email, SMS, portal), never the content of any message.

What Celia doesn't see

Who the student is. What the email said. Who sent it. Where the student lives.

Readiness

What Celia sees

Stage transitions, milestone completeness, document-checklist states (submitted / missing / pending), days-in-stage against your institutional baseline.

What Celia doesn't see

Document contents. Essay text. Recommendation letter text. Transcript text.

Yield

What Celia sees

Cohort code, program code, financial-aid package stage, historical conversion rate for the profile cluster, anonymized outcome labels for past cohorts.

What Celia doesn't see

Family income numbers. Household PII. SSNs. Bank account or routing numbers. Dates of birth.

We stop PII twice: once at the Slate side (we only read the fields your query allows), and again right before the AI (an automatic check rejects anything name-shaped). The full five-step breakdown is in the next section.

What we ingest

Only patterns, never people.

  • Anonymous Slate internal IDs
  • Behavioral signals (engagement, milestone transitions, form interactions)
  • Milestone statuses (application stage, FAFSA, checklist completion)
  • Demographic categories — first-gen flag, in-state, program type
  • Engagement patterns — days since last activity, response velocity
  • Per-Org Data Dictionary (field names + institution-defined semantics)
  • Institutional baselines (median days per stage, historical yield by cohort)

What we never ingest

Under any circumstances.

  • Names (first, last, preferred, or any variation)
  • Email addresses
  • Phone numbers
  • Physical addresses
  • Social security numbers or government IDs
  • Dates of birth
  • Health or disability information
  • Financial account numbers or routing information
  • Essay content, personal statements, or recommendation letter text
  • Photos, biometrics, or video recordings

Architectural boundaries

Every hop. What crosses. What does not.

At every step, we stop PII two ways: by only letting approved fields through in the first place, and by automatically checking again right before and after anything talks to the AI. If either check trips, the step fails and nothing moves forward.

  1. 01

    Slate institution (Slate Query — In Progress) CeliaConnect's Slate gateway

    Permitted
    Anonymous IDs and non-PII signals — things like login timestamps, application stage, and numeric scores.
    Forbidden
    Names, emails, phone numbers, addresses, SSNs, dates of birth, financial account numbers.
    Control
    Only fields from the In Progress query you approve can cross. If a query ever starts returning a new field, we stop and show your team before anything moves.
  2. 02

    CeliaConnect's Slate gateway Celia (the analysis layer)

    Permitted
    The anonymous rows from step 1, plus your institution's own field-meaning map and historical baselines.
    Forbidden
    Nothing new. Celia cannot ask for more than step 1 already let through.
    Control
    Each customer's data lives in its own isolated database — no cross-customer reads, ever. Before Celia handles a record, an automatic check rejects anything that looks like a name, email, or phone number.
  3. 03

    Celia (the analysis layer) AI model provider

    Permitted
    The anonymous record, plus the instructions Celia gives the AI.
    Forbidden
    No student names, no staff names, no free-text that could identify a person or a school.
    Control
    Every message to the AI passes through an automatic scrubber first. If the scrubber flags anything name-shaped, the message is canceled — nothing is sent.
  4. 04

    AI model provider Celia (return path)

    Permitted
    The AI's answers — a Risk level, a Recommendation, and the three scores (Engagement, Readiness, Yield) with the signals behind them.
    Forbidden
    Any echoed name, email, or phone number — even if the AI invents one.
    Control
    Every answer is scanned on the way back. If the scanner spots anything name-shaped, the answer is thrown away and Celia tries again.
  5. 05

    Celia (the analysis layer) Slate institution (Slate Source Format — Writeback)

    Permitted
    Celia's scores and Recommendation written into the ss_celia_* fields on the matching student record — matched by anonymous Slate ID.
    Forbidden
    Everything else. Celia can only write into the fields you gave it permission to write — nothing else in Slate.
    Control
    Every Writeback is recorded: what the field was before, what it is after, when, and who triggered it. That record is sealed into a tamper-evident weekly snapshot your team can verify.

Data lifecycle

From first query to final deletion.

At rest

Per-tenant database, encrypted at rest. Slate credentials live in encrypted secret storage with envelope encryption — a per-tenant Data Encryption Key wrapped by an infrastructure-held Key Encryption Key.

In transit

TLS 1.3 everywhere, between every hop. No plaintext egress.

During processing

Celia runs at the edge. No persistent student data leaves the edge during analysis.

Audit

Every read and write is logged with who did it, when, what the value was before, and what it is after. Once a week the full log is sealed into a tamper-evident snapshot your team can verify on their own.

Retention

Active customer data is retained for the life of the subscription. On cancellation: 30-day grace (in case of re-activation), then permanent deletion of your per-tenant database, Vectorize index, and Slate credential cache. We keep a tamper-evident cryptographic receipt of the deletion for verification. Long-term encrypted archives of tenant data are not retained by default; extended retention is available by written agreement in the DPA.

Export

Customer-initiated export on demand, delivered as a signed, encrypted bundle.

Why it matters

Four architectural benefits.

01

FERPA posture is dramatically simpler

We don’t process education records with identifiable information. Most FERPA concerns don’t apply — the conversation shifts from "how do we comply while using this tool?" to "we’ve reviewed the architecture and there is nothing to comply with."

02

Breach blast radius approaches zero

If we were breached tomorrow, the maximum data an attacker could access is anonymous IDs and scores. No names. No emails. No way to identify or contact a student.

03

Security review shortens

Sales cycles for AI tools in higher ed are often delayed by 3–6 months of security and legal review. Our architecture removes most of those blockers. Institutions that need board approval for FERPA-processing AI can often approve CeliaConnect at the department level.

04

Bounded write surface

Celia can only write into the ss_celia_* fields you authorize during setup — never into any other Slate field, never into student records you didn't include in the Flow. The ss_ prefix is a hard wall, not a convention.

05

Reversible — uninstall leaves Slate as it was

There is no Slate-side configuration to roll back. The ss_celia_* fields and the Source Format we wrote to remain in your Slate instance and can be deleted by your administrator on your schedule. CeliaConnect has no mechanism to reach back into your data after you leave.

06

Exit is painless

If you leave, there is nothing sensitive for us to delete. Scores written back to Slate belong to you. We retain anonymous behavior history for our models that is meaningless to anyone else.

Compliance posture

Built for the audits that matter.

FERPA

Architecture aligned with FERPA Directory Information handling; no restricted student data ever touches CeliaConnect by design.

SOC 2 Type II

On roadmap. Preparation documented in internal ADR. Targeted within the first 12 months of paid operation.

GDPR / UK GDPR

Data minimization by design (no PII). Sub-processor list published. DPA template available.

CCPA / state privacy laws

No sale of data. No advertising. No PII collection. Minimized exposure by design.

See the full sub-processor list →

Current AI model: Claude Sonnet 4.6 (tenant-selectable; Haiku for batch scoring, Opus available on request).

Security whitepaper

Need the details for your IT review?

A full-length technical whitepaper covers the guardrail implementation, key management, audit chain verification, incident response, and sub-processor flow. Start your pilot to receive the current draft and future revisions as they ship.

Report a vulnerability: [email protected]. We acknowledge within one business day.

90-day free pilot

Pilot Celia on your Slate. Free for 90 days.

Tell us about your institution and your Slate setup. We'll book your kickoff, provision your workspace on the call, and you have 90 days to verify Celia moves the metric you care about. No card. No commitment. Real Slate integration.