DATA PRIVACY

Privacy and Security

Wiley is committed to protecting the privacy of all individuals whose personal data we hold and process. We comply with applicable laws and regulations as well as contractual obligations. Additionally, we are EU-US Data Privacy Framework (DPF) certified, as reflected and detailed in our privacy policy. For more information, please see www.wiley.com/privacy.

Disclaimer: The information provided should not be taken as legal advice. We recommend that you seek legal advice on what you need to do to comply with the requirements of GDPR or other privacy regulations.

Privacy and Your Clients

Your client organizations may come to you with requests for information about the privacy and security of Wiley products and platforms, as well as how your company interacts with their organization around data privacy and security. Sometimes these come in as single questions, other times, they have a full security questionnaire that needs to be completed by you (the Partner) and Wiley.

Wiley can provide responses to the client company’s questions that are specific to data privacy and security of our products and platforms.

Best Practice: If your client emails you with a question about data privacy or security, ask if their organization has any formal questionnaires or forms they need to have completed prior to using Wiley products first.

  • Many client organizations begin with one “simple” question and then continue to send additional questions after that.
  • This takes time, and often results in frustrated Partners and clients. That’s why we recommend trying to get everything they need before bringing their one question to Wiley.

Please Note:

  • Oftentimes, your client contact is not the one asking for the information—they’re just the messenger.
  • Instead, the requests tend to come in to your client contact via the client’s security, privacy, or procurement teams as they are assessing risk for that client organization.
  • This can be frustrating for your client contact, because they’re usually ready to proceed with sending assessments and training, but their organization’s requirements are preventing them from moving forward.
  • While Wiley does our best to respond within 30 days of receiving the request, it can take longer, depending on the level of information your client organization needs. For example, if they have additional questions after reviewing our responses, need more information, or for other reasons on the client’s end that Wiley is not privy to. With larger organizations, it’s not unusual for these requests to take several months to come to completion. While this is not the norm, we’re sharing this information with you in the interest of transparency and expectation setting.

If your client sends you a request for privacy and security-related information, please complete this form. We require up to 30 days to complete it. The form must be fully completed before Wiley can begin working on the request.

PLEASE NOTE: Some client requests may require that the client sign an NDA because they are requesting sensitive or confidential information. Privacy & Security Request Form.

Partners or Associates wishing to enter into a Data Processing Agreement (DPA) with Wiley should complete the DPA Request Form.

If you experience any difficulties in finding the appropriate documents or have a general security or privacy question, please contact your local Partner Success team.

Data Storage

Wiley uses Amazon Web Services (AWS) as a cloud platform provider. Data is stored in Northern Virginia, United States. AWS is a leading provider with robust controls in place to maintain security and compliance in the cloud. Please visit AWS Compliance for information on certifications and attestations or download the AWS Data Storage document available on MindLab Connect.

Data Security

Wiley protects its infrastructure and the personal data within it according to the information security principles of confidentiality, integrity, and availability. Our security program is based on the NIST Cybersecurity Framework (CSF), including but not limited to our policies, standard operating procedures, and technical controls.

Document Library

The Document Library is intended to serve as a resource for your information security needs. The library contains a comprehensive listing of policies and other documentation related to our Security and Privacy Programs.


The below documents can be shared with your clients when asked for: