StudyTrackStudyTrack CompanionEnterprise

Self-hosting for regulated enterprises

StudyTrack Enterprise runs entirely inside your own cloud project. Raw data never leaves your boundary. Only structured academic summary reports are sent to Woolf for credit issuance.

Standard Business vs Enterprise

How the enterprise deployment differs from the standard business offering.

FeatureStandard BusinessEnterprise
Backend infrastructureWoolf cloud projectEnterprise's own cloud project (GCP, Azure, or AWS)
Learning record storageWoolf cloud storageEnterprise cloud storage (CMEK)
AI processingWoolf cloud AIEnterprise cloud AI service or offline model
App distributionDirect download from WoolfEnterprise MDM (Intune, JAMF)
Auto-updatesAutomaticEnterprise IT controls update rollout
Whitelist managementUser-configurableEnterprise IT-managed via MDM config
Data sent to WoolfActivities + summariesSummaries only
Woolf data accessFullPermissioned view-only (troubleshooting)
Encryption at restGCP defaultCMEK (enterprise-managed keys)

Enterprise data remains in the enterprise environment

Raw activity logs, screenshots, and learning records never leave your cloud project. Woolf only receives the structured summaries needed for academic credit.

What Stays in the Enterprise

DataLocationLeaves Enterprise?
Learning recordsEnterprise object storage (e.g., GCS bucket with CMEK encryption)No
Application activity logsEmployee device + enterprise database (e.g., Cloud SQL or Firestore)No
Usage report generationEnterprise AI service (e.g., Vertex AI or Azure OpenAI)No
User metadataEnterprise database (e.g., employee ID, enrollment status)No

What Is Sent to Woolf

DataContentPurpose
Daily summaryText narrative of learning activities (e.g., "Completed 2 hours of Python data structures")Academic record
Learning eventsStructured data: domain, duration, tools used (no screenshots)Credit calculation
Total minutesAggregate study time per dayCredit milestones
Credit milestone reportText report mapping learning to degree outcomesCredit issuance

No activity logs, no raw screen content crosses the enterprise boundary.

Security Controls

Enterprise-grade controls designed for regulated industries and financial services.

1. Whitelist-Only Tracking

Enterprise IT decides exactly which applications the tracker can observe. Nothing outside the whitelist is monitored.

  • Granular control down to specific websites and URLs
  • Messaging, video calls, and system processes permanently excluded
  • Tracking pauses automatically outside whitelisted apps

2. Encrypted in Transit and at Rest

In transit: All communication uses TLS/HTTPS

At rest: Cloud Storage uses Customer-Managed Encryption Keys (CMEK) via the enterprise's own Cloud KMS. The enterprise holds the encryption keys.

On device: Authentication tokens are encrypted with AES-256-GCM using machine-specific keys

3. End-to-End Processing on Enterprise Servers

The entire backend stack runs in the enterprise's own cloud project (GCP, Azure, or AWS):

Compute: Processing service runs as a container in the enterprise project
Object Storage: Learning records uploaded to the enterprise's own storage bucket
Database: All user data and summaries stored in the enterprise's database
AI processing: Runs on the enterprise's own AI endpoint (or offline model)

Woolf receives permissioned view-only access for troubleshooting and support, but does not have access to the raw learning record storage.

4. Flexible AI Processing

OptionDescriptionWhen to Use
Woolf's ModelsProcessing runs on Woolf's AI infrastructure. The fastest path to deployment — no additional AI agreements required.Default option for most deployments
Enterprise Cloud AIUses the enterprise's existing cloud AI agreement. The model runs in the enterprise's cloud project using their credentials.Enterprise already has a cloud AI agreement in place
Offline Open-Source ModelA ring-fenced open-source model running on enterprise infrastructure with no internet access.Enterprise requires on-premise AI processing

In all cases, no raw data is sent to Woolf or any third party.

5. Only Summary Reports Reach Woolf

  • Single outbound endpoint: Woolf's Academic Management System API
  • Only structured text is transmitted (daily summaries, credit reports)
  • Non-academic activity is identified and deleted before summary generation
  • Outbound request audit log captures every external API call for security review
  • Processing container is signed and verified — enterprise IT can confirm the code has not been modified

Enterprise Architecture

The entire tracking and processing infrastructure runs inside your own cloud project. Woolf receives only structured summary reports.

Deployment Process

Provisioning in a streamlined, IT-approved process.

Initial Setup
1

Woolf provisions the enterprise cloud project

Woolf provisions the enterprise cloud project (GCP, Azure, or AWS) using an automated infrastructure template — compute, object storage, database, scheduling, IAM roles, encryption, Woolf viewer access.

2

Enterprise IT reviews and approves

Enterprise IT reviews and approves the infrastructure configuration.

3

Woolf deploys the signed container image

Container images are cryptographically signed; Binary Authorization ensures only Woolf-signed images can run.

4

Enterprise IT configures the desktop app via MDM

Deploys the installer with an enterprise configuration file specifying the backend URL and whitelist.

5

Employees install the app

Employees install the app through their standard software distribution process.

Ongoing Operations

Updates

Woolf publishes signed releases. Enterprise IT reviews and pushes updates on their schedule.

Monitoring

Woolf has permissioned view-only access to logs and summaries for support and debugging.

Audit

All outbound API calls are logged. Enterprise security can audit what data leaves their project at any time.

User Authentication Model
  • Employees authenticate with Woolf using standard credentials
  • Enterprise backend verifies tokens using Woolf's public key (no shared secrets)
  • Backend-to-Woolf communication uses OIDC service-to-service auth

FAQ for Enterprise IT

Common questions from enterprise IT and security teams.

What data does the desktop app collect?

Usage data from whitelisted applications only, used to generate usage reports and select key photos that document learning. The whitelist is controlled by enterprise IT. Messaging, email, video conferencing, and system processes are permanently excluded.

Where are learning records stored?

In the enterprise's own cloud storage bucket, encrypted with enterprise-managed keys (CMEK). Raw activities are never sent to Woolf.

Can Woolf see our employees' activities?

No. Woolf does not have access to the storage bucket. Woolf receives permissioned view-only access to the processing infrastructure for troubleshooting and support, but only text-based summary reports are transmitted to Woolf. Additionally, even within whitelisted apps, any non-academic activity is identified and deleted during processing — it never appears in reports.

What AI model generates the usage reports?

Either the enterprise's own cloud AI service (using the enterprise's existing AI agreement) or an offline open-source model running on enterprise infrastructure with no internet access. All processing happens entirely within the enterprise's infrastructure.

Can the processing code be tampered with?

The container image is cryptographically signed by Woolf. Binary authorization prevents deployment of unsigned or modified images.

How are updates handled?

Woolf publishes signed releases. Enterprise IT reviews each release and pushes it through their standard MDM process on their own schedule. There are no automatic updates.

What happens if we want to stop using the service?

The enterprise owns all infrastructure. Delete the cloud project and uninstall the desktop app via MDM. No data remains with Woolf except the summary reports already submitted for credit issuance.

What compliance frameworks does this support?

The enterprise-isolated model is designed to support SOC 2, GDPR, and financial services regulatory requirements. The enterprise retains full control of data residency, encryption keys, and access controls.