IT Security Outline

Education Modified IT Security

Education Modified is committed to keeping your sensitive data safe and secure. We are fully FERPA compliant, and secure student & teacher data through a variety of safeguards. These include: IT security policy and training for our team, the use of best-in-class technologies for accessing, transferring and storing sensitive data, and continual monitoring for any security issues. 

All together, these steps have allowed us to work with schools in some of the most security conscious school districts in the country, including Los Angeles Unified School District, Denver Public Schools and various districts under the Massachusetts Student Data Privacy Agreement. 

Policy and Personnel 

Education Modified will never sell, rent or lease any of your data. All data will only be used for purposes directly relating to the usage and improvement of Education Modified. Further details can be found in our Privacy Policy

Education Modified maintains a Written IT Security Plan (WISP) which dictates how all employees and contractors must interact with sensitive data. Employees are periodically trained on the contents of this plan and the consequences of violating it. Access to the most sensitive data is restricted to only those employees and contractors who require it to conduct their jobs. 

Tools and Technologies 

Education Modified uses industry-standard technologies to handle the transfer and storage of all sensitive data. Sensitive data is encrypted both during transfer and in storage. All data access is logged and monitored. The tools we use to do this include: 

Amazon Web Services (AWS). All of our Web Servers, Databases and Document Storage are hosted on AWS. This service uses industry-standard access controls and encryption to keep your data safe and secure. Education Modified follows all AWS best-practices related to security and periodically audits data access logs to ensure no unauthorized access occurs. 

Box Storage. We use Box to handle the transfer of data between us and our schools, as well as storage for data-types which don't fit neatly in AWS. Box maintains some of the highest security standards in the industry. Access to Box is tightly controlled to only employees who require it, and data access is logged and monitored. 

Continual Monitoring 

To ensure we stay one step ahead, Education Modified continually monitors our data infrastructure and makes any improvements as needed. Monthly vulnerability scans are conducted with Intruder to keep on top of emerging threats. All data access logged and monitored to ensure no unauthorized attempts are made to access sensitive data.

PDF Print Out: Education-Modified-IT-Security.pdf

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us