Examity and Online Cheating

Online test proctoring software is part of a booming market that experts predict will enjoy exponential growth in the coming years. Among the most successful is Examity, which labels itself as the “world's leading solution for learning validation.” As a backup to its claims, the platform raised $90M in funding from the private equity firm Great Hill in April 2020 and now employs over a thousand proctors.

Schools around the nation are using the service to monitor students as they take tests, but not all experiences are positive. If you're facing allegations of online cheating while using Examity, knowing how the platform works helps you understand the flaws in the platform's flagging and notification system.

This knowledge enables you to avoid long-term penalties from your college or university administration.

How Examity Works

Examity is a platform that monitors exam-taking and other online activities via proctors or technology. Founded in 2013 by Michael London, the platform generates roughly $28M a year and boasts over 1,100 employees. London is an Edtech veteran and the founder of similar companies like College Coach and Ed Assist. Examity's main competitors are ProctorU and Kryterion, and over 400 colleges and universities use it in the US.

One of the positive aspects of Examity is that it offers flexibility for both professors and students. Professors can choose what type of monitoring they need, and students can choose when to take their test. Regardless of the location or time, all they need is WiFi, laptops, or a desktop to get started.

Sometimes, proctors ask students to show them their surroundings and desks before starting the test. The proctors can also request remote access to student devices at any time to check for cheating or a hidden browser.


Students must create an Examity profile to access the system and their tests. The process involves multiple authentication levels to verify the student's identity. Students must upload a photo of a government-issued ID and log in using biometric data. This authentication process helps reduce fraudulent activity, but logging in is merely scratching the surface when it comes to security measures.