Training & Awareness
How we ensure all personnel understand their obligations to protect student data through comprehensive training programs.
Our Training Philosophy
Impact Suite recognizes that technology alone cannot protect student data—our people are our first line of defense. Every employee and contractor receives comprehensive training on federal and state privacy laws, security best practices, and their specific responsibilities in protecting the sensitive information entrusted to us by educational agencies.
Key Principles:
Universal Training: All personnel receive baseline privacy and security training
Role-Based Content: Additional specialized training based on job responsibilities and data access
Regular Reinforcement: Annual refresher training to maintain awareness
Tracked Completion: All training completion monitored and documented
Continuous Updates: Training content updated to reflect emerging threats and regulatory changes
Comprehensive Training Program
Our multi-layered training program addresses federal regulations, industry best practices, and emerging security threats through a structured approach delivered at onboarding and reinforced annually.
Training Schedule
Onboarding (Day 1): All new employees and contractors must complete required training before receiving access to any systems containing student data or personally identifiable information. This ensures every team member understands their obligations from day one.
Annual Recertification: All personnel complete refresher training annually to:
Maintain current knowledge of regulatory requirements
Learn about evolving security threats and best practices
Review updated policies and procedures
Reinforce critical concepts and obligations
Triggered Training: Additional training is required when:
Job responsibilities change significantly
New systems or processes are implemented
Security incidents reveal training gaps
Regulatory requirements change
Access levels are modified
FERPA & COPPA Training (Internally Managed)
All employees receive comprehensive training on the federal laws governing educational privacy and children's online privacy protection.
FERPA (Family Educational Rights and Privacy Act)
Content Coverage:
Understanding Educational Records:
Definition and scope of educational records under 34 CFR Part 99
What constitutes Personally Identifiable Information (PII) from education records
Distinction between educational records and other student information
Directory information and its special handling requirements
Role as "School Official":
Impact Suite's role as a school official with legitimate educational interest
Responsibilities and limitations of this designation
Appropriate access and use of educational records
Maintaining the educational purpose requirement
Consent and Disclosure Requirements:
When consent is required for disclosure
Exceptions to consent requirements
Proper authorization procedures
Annual notification requirements
Parent and Student Rights:
Parents' rights to access and request amendment of records
Transfer of rights to students at age 18 or college enrollment
Procedures for handling access requests
Responding to requests for record amendments
Consequences of Violations:
Individual and organizational consequences
Potential criminal penalties
Loss of federal funding implications
Professional and reputational impact
COPPA (Children's Online Privacy Protection Act)
Content Coverage:
Core Requirements:
Requirements under 15 U.S.C. § 6501-6506
Special protections for children under 13
Verifiable parental consent obligations
School consent acting as parent consent under COPPA
Restrictions on Data Collection:
What data can and cannot be collected from minors
Prohibition on requiring more information than necessary
Limitations on data use and sharing
Retention and deletion requirements
Prohibited Uses:
No use of student data for advertising or marketing
No sale or rental of student information
No building of profiles for non-educational purposes
No behavioral tracking outside educational context
Safe Harbor Provisions:
School consent provisions under COPPA
When educational agencies can provide consent
Limitations on school-provided consent
Obligations even with school consent
Educational Record Confidentiality
Proper Handling Procedures:
Classification of information by sensitivity
Storage requirements (encrypted, access-controlled)
Transmission security (encrypted channels only)
Appropriate sharing within authorized scope
Documentation of disclosure when required
Incident Reporting:
Recognizing potential privacy violations
Mandatory immediate reporting procedures
Internal escalation paths (Security Officer, Compliance Officer)
Timeline expectations for reporting
Confidentiality during investigations
Protection for good-faith reporting
HIPAA & Compliance Training (Thoropass Platform)
Our Thoropass compliance platform delivers comprehensive training on health information privacy, state-specific requirements, and general security practices.
HIPAA Requirements
Understanding PHI:
Definition of Protected Health Information (PHI)
What student health information qualifies as PHI
Distinction between educational records and health records
Intersection of FERPA and HIPAA
Minimum Necessary Standard:
Accessing only the PHI necessary for job function
Limiting disclosure to minimum necessary
Reasonable efforts to limit access
Role-based access controls
Business Associate Obligations:
Our obligations under 45 CFR §§ 164.308, 164.310, 164.312, 164.316
Required safeguards (administrative, physical, technical)
Subcontractor management requirements
Breach notification obligations under HITECH Act
Security Rule Requirements:
Administrative safeguards (policies, training, access management)
Physical safeguards (facility access, workstation security, device controls)
Technical safeguards (access controls, audit controls, encryption)
Implementation specifications and requirements
Privacy Rule Requirements:
Use and disclosure limitations
Individual rights (access, amendment, accounting)
Notice of privacy practices
Minimum necessary determinations
Breach Notification:
Definition of a breach under HIPAA
60-day notification requirement
Notification to covered entity (educational agency)
Individual notification requirements
Media and HHS notification thresholds
State-Specific Privacy Laws
Coverage Includes:
California:
Student Online Personal Information Protection Act (SOPIPA)
AB 1584 (Student Privacy)
Restrictions on use of student data
Deletion requirements
Prohibition on targeted advertising
New York:
Education Law 2-d requirements
Parents' Bill of Rights
Supplemental agreements and certifications
Data encryption requirements
Specific breach notification timelines
Ohio:
Ohio Student Data Privacy laws
Data minimization requirements
Parental access rights
Vendor security requirements
Background check requirements for employees
Other States:
State-by-state variations in requirements
Consent and notification differences
Breach notification timeline variations
Local educational agency policy requirements
General Security & Privacy
Impact Suite Policies:
Comprehensive security and privacy policies
Acceptable Use Policy requirements
Code of conduct expectations
Disciplinary procedures for violations
Data Classification and Handling:
Identifying sensitive data types
Appropriate handling based on classification
Secure storage requirements
Transmission and sharing protocols
Information Security Principles:
Confidentiality, Integrity, Availability (CIA triad)
Defense in depth approach
Least privilege access
Separation of duties
Privacy by Design:
Building privacy into systems and processes
Privacy as default setting
Proactive not reactive approach
Privacy embedded into design
Data Minimization:
Collecting only necessary data
Limiting retention to required periods
Secure deletion when no longer needed
Regular data audits
Security Awareness Training
All personnel receive comprehensive security awareness training covering the most common threats and vulnerabilities that could compromise student data.
Phishing & Social Engineering
Content Coverage:
Recognizing Phishing:
Common phishing email indicators (urgent language, suspicious links, requests for credentials)
Spear phishing and targeted attacks
SMS phishing (smishing) and voice phishing (vishing)
Business Email Compromise (BEC) attacks
Social Engineering Tactics:
Pretexting and impersonation
Authority and urgency manipulation
Trust exploitation
Tailgating and physical social engineering
Response Procedures:
Never clicking suspicious links or attachments
Verification procedures for unusual requests
Reporting suspicious communications immediately
Using designated reporting channels
Password Security
Best Practices:
Strong Password Creation:
Length over complexity (passphrases)
Unique passwords for each system
Avoiding personal information
No password reuse across systems
Password Manager Usage:
Benefits of password managers
Impact Suite-approved tools
Secure master password practices
Syncing across devices securely
Multi-Factor Authentication (MFA):
Why MFA is critical
Types of second factors (TOTP, SMS, hardware keys)
Setting up MFA on all accounts
Recovery procedures
Password Rotation:
When to change passwords (compromise, suspicion, scheduled)
Creating new strong passwords (not incrementing)
Updating across all systems
Credential Sharing Prohibition:
Never share credentials with anyone
Each person needs unique account
Accountability and audit trail requirements
Disciplinary consequences for sharing
Secure Data Handling
Training Topics:
Data Classification:
Public, Internal, Confidential, Restricted classifications
Student PII as Restricted data
PHI handling requirements
Proper labeling and marking
Encryption Requirements:
When encryption is required
Approved encryption tools
Encrypted email for sensitive data
Encrypted file storage and transfer
Secure Transmission:
Never emailing unencrypted student data
Using approved secure file transfer methods
SFTP, secure portals, encrypted email
Verifying recipient before sending
Proper Storage:
Only storing data in approved systems
No local storage of student data on personal devices
Cloud storage must be approved and encrypted
Regular data inventory and cleanup
Clean Desk Policy:
No sensitive information left visible
Locking screens when leaving workstation
Secure disposal of printed materials
Visitor awareness in workspace
Secure Disposal:
Shredding paper documents
Secure deletion of electronic files
Device sanitization before disposal or reuse
Certificate of destruction for media
Physical Security
Training Coverage:
Device Security:
Laptop encryption (required for all devices)
Screen lock when unattended
Theft prevention (cables, awareness)
Lost or stolen device reporting immediately
Workspace Security:
Locking doors and cabinets
Visitor management and escorting
Secure areas access controls
Shoulder surfing awareness
Remote Work Security:
Securing home office space
Family member access restrictions
Public space work precautions
VPN usage for remote access
Lost or Stolen Devices:
Immediate reporting procedures (within 1 hour)
Remote wipe capabilities
Incident investigation
Replacement procedures
Mobile Device Security
Requirements:
Device Encryption:
Full disk encryption enabled
iOS and Android encryption settings
Backup encryption
Remote wipe enrollment
App Security:
Only approved apps for work data
Regular app updates
Permission review and management
No unauthorized apps with access to data
Public Wi-Fi Risks:
Never accessing sensitive data on public Wi-Fi without VPN
Man-in-the-middle attack risks
VPN usage requirements
Mobile hotspot as alternative
BYOD Policies:
Bring Your Own Device (BYOD) requirements
Separation of personal and work data
Mobile Device Management (MDM) enrollment
Acceptable use expectations
Role-Based Specialized Training
In addition to universal baseline training, personnel receive specialized training based on their roles and data access levels.
Engineering & Development Teams
Enhanced Training Includes:
Secure Coding Practices:
OWASP Top 10 vulnerabilities
Input validation and sanitization
SQL injection prevention
Cross-site scripting (XSS) prevention
Authentication and session management
Secure API development
Error handling and logging
Privacy by Design:
Privacy considerations in system design
Data minimization in code
Purpose limitation in features
User consent management
Privacy impact assessments
Encryption Implementation:
When and how to encrypt data
Proper key management
Encryption libraries and best practices
Avoiding common encryption mistakes
Code Review:
Security-focused code review
Peer review requirements
Automated security testing
Vulnerability remediation
Secure Development Lifecycle:
Security requirements gathering
Threat modeling
Security testing integration
Deployment security
Customer Support Personnel
Enhanced Training Includes:
Identity Verification:
Multi-step verification before disclosing information
Questions to verify caller/requester identity
Red flags for social engineering
When to escalate to supervisor
Appropriate Data Disclosure:
What information can be disclosed to whom
Student data access restrictions
Authentication requirements
Documentation of disclosure
Handling Sensitive Information:
Secure communication channels for support
No sensitive data in email unless encrypted
Ticketing system security
Screen sharing precautions
Escalation Procedures:
Recognizing security concerns in support requests
When to involve security team
Unusual request patterns
Suspected data breach reporting
Sales & Business Development
Enhanced Training Includes:
Accurate Representation:
Truthful representation of data practices
No overpromising on security capabilities
Referring technical questions appropriately
Compliance with marketing regulations
Prohibited Commitments:
Cannot promise custom data handling without approval
Cannot commit to non-standard security measures
No agreements on data practices without legal review
Escalation path for custom requests
Security as Competitive Advantage:
How to discuss security positively
Certifications and compliance to highlight
Appropriate references to security features
When to involve compliance team
RFP/Security Questionnaire Response:
Understanding common security questions
Resources available for responses
Compliance team involvement
Consistency in messaging
Administrative Personnel
Enhanced Training Includes:
Access Control Management:
Provisioning and deprovisioning procedures
Least privilege principle application
Role-based access assignment
Access request verification
Audit Trail Maintenance:
Importance of audit logs
What actions are logged
Log review procedures
Retention requirements
Vendor Management:
Security considerations in vendor selection
Required security questionnaires
Contract review for data clauses
Ongoing vendor monitoring
Training Tracking & Accountability
All training completion is tracked through our Thoropass compliance management platform, ensuring accountability and providing audit trails for compliance verification.
Completion Monitoring
Thoropass Platform Tracking
Automated enrollment for new hires based on role
Training assignment and scheduling
Progress tracking with dashboards
Automated reminder emails for overdue training
Completion certificates automatically generated
Permanent audit trail maintained
Access Control Integration: Access to systems containing student data or PII is contingent upon:
Current training completion status (within last 12 months)
Annual recertification being up to date
Role-appropriate specialized training completed
Acknowledgment of policies and procedures signed
Compliance Officer Oversight: Kris Kofoed, Compliance Officer, monitors:
Training completion rates across the organization
Overdue training and follow-up actions
Training effectiveness measures and feedback
Updates needed based on incidents or regulatory changes
Compliance with contractual training requirements
Documentation & Attestation
Training Records Include:
Employee or contractor name and role
Training modules assigned and completed
Completion dates and timestamps
Test scores where applicable
Time spent in training materials
Certificate of completion
Digital acknowledgment signatures
Record Retention: Training records are maintained for:
Duration of employment/engagement plus six (6) years (HIPAA requirement)
Available for audit and compliance verification purposes
Stored securely in Thoropass platform with access controls
Accessible to authorized personnel only (Compliance Officer, HR, management)
Employee Acknowledgments
All personnel acknowledge understanding of:
Federal and state privacy and security obligations (FERPA, COPPA, HIPAA)
Impact Suite policies and procedures
Consequences of violations (disciplinary action up to termination)
Ongoing obligation to maintain confidentiality
Requirement to report incidents, violations, and concerns immediately
Continuing obligation after employment ends
Acknowledgment Process:
Electronic signature in Thoropass
Annual re-acknowledgment with training recertification
New acknowledgment when policies are materially updated
Stored with training records for audit purposes
Binding Confidentiality Obligations
In addition to training, all Impact Suite employees and contractors sign legally binding confidentiality agreements as part of their employment or engagement contracts.
Employment/Contractor Agreements Include:
Data Protection Commitments:
Explicit requirements to maintain confidentiality of all PII, Student Data, and PHI
Adherence to FERPA, COPPA, HIPAA, and state-specific student data privacy regulations
Prohibition on unauthorized access, use, or disclosure of educational data
Obligation to protect data with the same care as their own sensitive personal information
Acceptable Use Requirements:
Use of data only for authorized business purposes within scope of employment
Proper handling, access, and processing of sensitive data
Prohibition on personal use of educational data
Restrictions on data storage, transmission, and sharing
No unauthorized copying or downloading of data
Code of Conduct:
Ethical standards and professional behavior regarding data handling
Integrity and honesty in all data-related activities
Respect for student and family privacy
Commitment to compliance culture
Incident Reporting Obligations:
Mandatory immediate reporting of suspected or actual security incidents
Reporting of policy violations or compliance concerns
Reporting of privacy breaches or unauthorized access
Protection and non-retaliation for good-faith reporting
Cooperation with incident investigations
Termination Obligations:
Immediate return or destruction of all confidential information upon separation
Continuing confidentiality obligations after employment ends
No retention of student data, PII, or PHI on personal devices or systems
Device wiping and account deactivation procedures
Ongoing legal liability for post-employment violations
Third-Party Subcontractor Requirements
While Impact Suite cannot directly train subcontractor employees, we ensure subprocessors maintain equivalent training standards through contractual requirements and verification.
Subprocessor Training Requirements
All subprocessors must:
Maintain comprehensive privacy and security training programs for their employees
Provide training on FERPA, COPPA, HIPAA, and applicable state laws
Conduct training at employee onboarding and annually thereafter
Track and document training completion
Provide evidence of training programs upon request
Verification Process:
Review of subprocessor training programs during vendor assessment
Request for training completion statistics
Annual certification of ongoing training compliance
Right to audit training records as part of vendor oversight
Major Subprocessor Examples
Amazon Web Services (AWS):
Comprehensive employee security training programs
Regular security awareness and compliance training
Role-based security training for cloud operations
Documented in AWS compliance certifications and reports
Evidence available through AWS compliance documentation
Ednition:
Training on educational data privacy requirements
FERPA and state law training for personnel handling student data
Secure data handling procedures training
Ongoing compliance training and updates
Training Program Continuous Improvement
Impact Suite's training program is regularly reviewed and updated to ensure it remains effective and addresses evolving threats and requirements.
Regular Program Reviews
Quarterly Reviews:
Assessment of training completion rates
Review of training effectiveness metrics
Analysis of security incidents for training gaps
Feedback collection from employees
Identification of needed updates or additions
Annual Comprehensive Review:
Full curriculum review and update
Incorporation of new regulatory requirements
Addition of emerging threats and best practices
Updating of examples and scenarios
Revision of testing and assessment methods
Updates Based On:
Regulatory Changes:
New privacy laws or amendments to existing laws
Updated guidance from regulators (ED, FTC, HHS)
Changes in state requirements
New compliance obligations
Security Incidents:
Lessons learned from internal incidents
Industry-wide breach trends
New attack vectors and tactics
Evolving threat landscape
Industry Best Practices:
Participation in education technology industry groups
Review of peer training programs
Adoption of new training methodologies
Integration of latest security awareness trends
Employee Feedback:
Surveys and feedback on training effectiveness
Requests for additional training topics
Suggestions for improvement
Learning preferences and accessibility needs
Questions About Our Training Program?
For questions about our training program, curriculum, or employee qualifications, please contact our Compliance Officer.
Primary Contact: Kris Kofoed, Compliance Officer kris.kofoed@impactsuite.com
Note: Our training program is reviewed quarterly and updated to reflect current regulatory requirements, emerging threats, and industry best practices. All training materials are documented in our Thoropass compliance platform. </artifact>