Foundations of a Childcare Business

What SOC 2 Type II Compliance Means for Your Childcare Center: A CTO's Guide For Operators

Sourabh Agarwal
|
May 13, 2026
|
5 mins

About Tim Seldin

Author, Educator and President of The Montessori Foundation

Tim Seldin is an author, educator and the President of The Montessori Foundation and Chair of The International Montessori Council. His more than forty years of experience in Montessori education includes twenty-two years as Headmaster of the Barrie School in Silver Spring, Maryland. He is the author of several books including “The World In The Palm of Her Hand”

About Lara Hudson

Early Years Leader and Education Strategist

Lara is an early years professional with over 25 years of international experience, including two decades in the UAE education sector. She has held senior leadership roles such as Chief Operating Officer and Country Manager for major training and education groups. She is also a passionate advocate for the power of early experiences in shaping lifelong learning.

You carry a weight few other business owners do.

It is not just about payroll, enrollment, or building maintenance. It is the trust of hundreds of families. The personal information. The photos. The private messages about a child's hard day.

And somewhere in the back of your mind, usually around 3 AM, the question surfaces: is all of that data actually safe?

You have heard the standard answers from every software vendor — "bank-level security," "state-of-the-art encryption," "industry-leading protection." Those phrases have been said so many times they have stopped meaning anything. They are designed to reassure, but without something behind them, they are still just words. And in your line of work, you already know words are not enough.

So I want to talk about something we did this year that is meant to replace one of those phrases with something verifiable.


What is SOC 2 Type II Compliance?

I know… Another acronym? But stay with me, because the idea behind it is simpler than it sounds.

Picture this: you hire an independent inspection firm to spend months going through every safety procedure at your center. Fire drills. Food handling. Background checks. Medication storage. Drop-off and pick-up protocol. They interview your staff, test your processes, and try to find the weak point. At the end, they hand you a detailed report.

That is what we did, but for our digital operations.

SOC 2 Type II is an independent audit, conducted by a third-party CPA firm, that examines a technology platform against the AICPA's Trust Services Criteria over an extended observation period. The five criteria the audit examines are:

  • Security: protection against unauthorized access, both physical and digital
  • Availability: that the system is operational and accessible when you need it
  • Processing integrity: that data is processed accurately and as intended
  • Confidentiality: that sensitive information stays restricted to the people authorized to see it
  • Privacy: that personal data is collected, used, retained, and disclosed in line with stated commitments


The Type II part matters. A Type I report is a snapshot of the vendor's controls on one specific day. A Type II report covers a continuous period (typically six to twelve months), which means the auditor is verifying that those controls actually held up day after day, not just on the day they were tested.

For us, this was not a checkbox exercise. It was a sustained, deep examination of how we handle your data every single day.


What does this change mean for your center?

Here is the practical version.

Until now, if a parent or a board member asked you how the data on illumine was being protected, the honest answer involved a lot of trust in what we, as a vendor, told you. You were taking our word for it.

You no longer have to. The verification has been done by people whose job is to be skeptical of vendors like us. The result is documented in a report that you can reference when you need to.

That shifts a few things:

  • The proof burden moves off you. When a prospective family asks how their child's data is protected, you can point to an independently audited platform rather than recite vendor marketing.
  • Compliance gets simpler if you operate multiple centers. Instead of evidencing security controls separately at each location, you have a single audited platform underpinning all of them. For our enterprise customers, this is one of the more meaningful operational benefits.
  • Procurement conversations get easier. If you work with school districts, government-funded programs, or larger employers running on-site centers, SOC 2 Type II is increasingly something they ask for by name. Having it removes a friction point you may not have realized was costing you.
  • Your security posture becomes a differentiator. Parents are more digitally aware than they were five years ago. Being able to say your platform meets the same audit standard as enterprise software is the kind of detail that quietly builds confidence during a tour.


What you should ask any software vendor (including us)

If reading this prompts you to evaluate other tools you use at your center, a few questions are worth asking every vendor:

  • Are you SOC 2 Type II audited, or only Type I?
  • What audit period does your most recent report cover?
  • Who was the auditor, and is the report available under NDA?
  • How is customer data encrypted, both at rest and in transit?
  • What is your incident response process if a breach occurs?
  • Are you GDPR-compliant if you handle data for families in regulated regions?


A vendor who can answer all six clearly is a vendor worth trusting with your family's information. A vendor who deflects on any of them is telling you something.


The bigger picture

Childcare software has, for a long time, been built and sold like any other small-business tool. But the data inside it is not small-business data. It includes medical notes, allergies, photographs of children, family contact information, payment details, and custody arrangements. The sensitivity profile is closer to a hospital's than a typical SaaS product's.

We think the security standards should match. That is why we built illumine on Google Cloud Platform infrastructure, why we encrypt data with AES-256 at rest and in transit, why we operate under strict role-based access controls, and why we believe child privacy has to be a first-principles commitment, not a feature.

The SOC 2 Type II audit is the part of that commitment we can hand you on paper.

If you want the full technical details, like the controls, the infrastructure, the certifications, the audit scope, it lives on our Security Policy page. And if you would rather just have a conversation about what any of this means for your specific setup, our team is available. 

contact us here.

You have always been the trusted hands that families place their children in. Now the technology you run on can be held to the same standard.

Frequently Asked Questions

Is illumine SOC 2 Type II certified?
+
Yes. illumine has completed its latest SOC 2 Type II audit. The full report is available to customers and qualified prospects on request.
Where is illumine data hosted?
+
illumine runs on Google Cloud Platform. Customer data is stored in the region selected at onboarding, with options across the EU, US, and APAC.
Is illumine GDPR compliant?
+
Yes. illumine is fully compliant with GDPR for customers and end-users in the EU and UK. A signed Data Processing Agreement (DPA) with Standard Contractual Clauses is available on request.
Does illumine use customer data to train AI models?
+
No. illumine does not use customer, child, or family data to train AI models without explicit, separate customer consent.
How can I request illumine's SOC 2 report?
+
Email info@myillumine.com or contact your account manager. We will share the report under NDA.
Who conducts illumine's SOC 2 audit?
+
illumine's most recent SOC 2 Type II audit was conducted by an independent CPA firm.
What is illumine's breach notification policy?
+
illumine will notify affected customers without undue delay, and in line with the timelines specified in our Data Processing Agreement and applicable regulations (including GDPR's 72-hour requirement where it applies).
Can I get a list of illumine's subprocessors?
+
Yes. Our subprocessor list is maintained in our Data Processing Agreement and updated when changes occur. Email info@myillumine.com for the current list.
FeatureillumineProcareBrightwheelLillioFamly
PricingVaries by planPremiumFreemiumQuote-basedModular pricing
Parent Communication
  • Real-time
  • easy to use
  •  in 20+  languages
Basic messaging toolsQuick updates and messagingDetailed parent updatesFriendly messages in several languages
Billing
  • Easy to use
  • Customizable
  • automated invoices
Deep financial toolsSimple billing in-appBuilt-in invoicesFlexible billing options
Lesson Planning
  • EYFS, Montessori, Reggio, and more!
  • linked to portfolios
  • AI-powered lesson plan creation in less than 5 seconds
May need extra toolsBasic note-takingCurriculum tools includedDaily logs and learning diaries
ScalabilityWorks well for single or many centersGreat for large systemsBest for smaller centersLimited for big organizationsFlexible for different sizes
Data SecurityGlobal encryption standardsUS regulatory focusUS cloud complianceStandard encryptionBuilt with GDPR in mind
Support24/7 help and guided setupTraining-intensiveResponsive, slower for complex issuesTeacher-focused help toolsSupport depends on region