TUEL is built for the review work universities actually do before rollout: architecture review, identity and LMS fit, audit visibility, data ownership, and educational-data handling review.
Hosting and isolation
TUEL is delivered as an institution-aware service layer with tenant boundaries, environment controls, and operational monitoring.
Identity and access
We scope SSO, permissions, and administrative access with campus identity expectations before launch.
Data flow and ownership
Institutions review what enters the platform, what is stored, who can inspect it, and how export or deletion is handled.
Review and rollout support
Security questionnaires, procurement responses, and stakeholder review calls are part of the pre-launch process.
Institution inputs
Course materials
Syllabi, lecture notes, textbooks, and approved learning assets.
Policies and guardrails
Faculty intent, academic boundaries, supported tools, and institution rules.
Identity and LMS fit
SSO, LTI-ready workflows, enrollment context, and institution-specific access.
TUEL platform layer
TUEL keeps the product layer consistent while each institution controls the materials, behavior, access model, and governance boundaries around the deployment.
Delivered to teams
Student assistant
Course-grounded tutoring, interactive tools, and verifiable responses.
Faculty controls
Configuration, rollout settings, and per-course assistant governance.
Admin analytics
Operational oversight, adoption telemetry, and review-ready reporting.
Institutional trust anchors
This is the model institutional buyers review: approved inputs, controlled assistant behavior, observable operations, and deployment surfaces aligned to real campus stakeholders.
Review summary
Review support
Security questionnaire and procurement response support
Reference architecture and data-flow review for institutional stakeholders
Identity, SSO, and LMS integration scoping
Documentation for FERPA, audit logging, and institutional data ownership
Procurement note
TUEL is designed to enter procurement review as a governed institutional service, not as a generic chatbot with classroom branding layered on top.
Core controls
Designed to support institutional review of educational-data handling, policy control, and deployment boundaries before launch.
TUEL relies on managed infrastructure controls for transport security and encrypted storage, and we review that architecture with institutions during security conversations.
We can share policy drafts, templates, and control summaries during review. These materials should not be read as a completed SOC 2 audit report.
Operational visibility and review logs are part of the deployment model so institutions can inspect how the system is configured and operated.
Course materials, configuration, and institutional analytics remain your data. TUEL does not claim ownership or training rights.
Identity, SSO, and LMS requirements are scoped during review so TUEL can be evaluated against existing campus systems.
Managed HTTPS and encrypted storage controls reviewed with institutional teams
Role-scoped operational access and documented review responsibilities
Architecture and data-flow materials for stakeholder review
Documented sub-processor disclosure and agreement templates
Deployment-specific identity, LMS, and governance scoping
Incident-handling expectations documented in review materials and agreements
These are the providers TUEL currently discloses during review conversations. Provider mix, data handling, and any model-provider terms are confirmed during implementation and reflected in the applicable agreement package.
| Provider | Purpose | Data handled | Review note | Location |
|---|---|---|---|---|
| Vercel | Application hosting, edge network, serverless compute | Application requests, static assets | Hosting and delivery partner | US (multi-region) |
| Neon | PostgreSQL database (serverless) | All application data, user records, conversation history | Managed database provider | US East (AWS us-east-1) |
| Anthropic | AI language model provider (Claude) | Chat prompts and responses (no training on inputs) | Model provider disclosed during review | US |
| OpenAI | AI language model provider (GPT) | Chat prompts and responses (no training on inputs) | Model provider disclosed during review | US |
| Google AI | AI language model provider (Gemini) | Chat prompts and responses (no training on inputs) | Model provider disclosed during review | US |
| Upstash | Redis cache, vector database, background job queue | Session data, rate limits, document embeddings, job payloads | Cache and queue infrastructure provider | US East (AWS us-east-1) |
| Google Cloud Vision | OCR for scanned PDF documents | Document images (processed, not stored) | Optional OCR provider | US |
| xAI | AI language model provider (Grok) | Chat prompts and responses (no training on inputs) | Optional model provider | US |
| Sentry | Error tracking and performance monitoring | Error logs, stack traces (no student PII) | Monitoring provider | US |
| PostHog | Product analytics and usage telemetry | Anonymized usage events, feature engagement metrics (no student PII) | Analytics provider | US (Cloud) |
| Firecrawl | Web page scraping for URL-based course materials | Public web page content (processed, not stored by Firecrawl) | Optional ingestion helper | US |
TUEL does not publish procurement documents for anonymous download. After a live security or proof review, we manually approve the right packet and send the whitepaper or DPA PDFs to the named institutional contact by secure link. Contact us at contact@tuel.ai if you want to scope the review before the meeting.
FERPA deployment overview
Overview of deployment boundaries, education-record handling, and review questions institutional teams typically ask.
Shared after the live review and manual approval for the named institutional contact.
Data Processing Agreement
Institution-ready agreement in PDF format, tailored after the review conversation and sent only to the approved contact.
Shared after the live review and manual approval for the named institutional contact.
Deeper review packet
More sensitive materials are released only when the review requires them. TUEL requires NDA before sharing the deeper packet, which can include:
TUEL is designed to support institutional FERPA review conversations:
In the event of a security incident affecting institutional data:
For security-related questions or to report a vulnerability, contact the TUEL team and we will route the request to the appropriate stakeholder.