Third-Party Management

Our process for vetting, contracting, and monitoring third-party vendors who process educational data.

Our Approach to Third-Party Risk Management

Impact Suite recognizes that protecting student data requires not only securing our own systems, but also ensuring that every third-party vendor who processes educational data maintains equivalent security and privacy standards. We implement comprehensive vendor management processes to evaluate, contract with, and monitor all subprocessors who have access to student data or personally identifiable information.

Key Principles:

  • Selective Partnership: We work only with industry-leading providers with proven security track records

  • Thorough Vetting: Comprehensive security assessments before engagement

  • Contractual Protection: All subprocessors sign Data Processing Agreements or Business Associate Agreements

  • Continuous Monitoring: Ongoing oversight of subprocessor compliance and security posture

  • Transparency: Educational agencies informed of subprocessors and changes


Contracting Processes for Employees and Subprocessors

Impact Suite has established comprehensive contracting processes to ensure all employees, contractors, and subprocessors are bound by written agreements to protect student data and comply with applicable privacy laws.


Employee and Contractor Agreements

All Impact Suite employees and contractors are required to sign written agreements that include specific provisions protecting PII, Student Data, and Protected Health Information (PHI).

Binding Contractual Obligations

All Personnel Sign Agreements Including:

Confidentiality Obligations:

  • Explicit requirements to maintain confidentiality of all PII, Student Data, and PHI accessed or processed during employment or engagement

  • Protection obligations extending beyond employment termination

  • Acknowledgment of the sensitivity and importance of educational data

  • Legal consequences for unauthorized disclosure

Data Protection Commitments:

  • Adherence to all applicable privacy laws including FERPA, COPPA, HIPAA, and state-specific student data privacy regulations

  • Compliance with Impact Suite security and privacy policies

  • Implementation of reasonable safeguards to protect data

  • Prohibition on unauthorized use, access, or disclosure

Acceptable Use Requirements:

  • Proper handling, access, and processing of sensitive data

  • Use of data only for authorized business purposes within scope of employment

  • Prohibition on personal use of educational data

  • Restrictions on data storage, transmission, and copying

  • No unauthorized sharing with third parties

Code of Conduct:

  • Ethical standards and professional behavior expectations regarding data handling

  • Integrity and honesty in all data-related activities

  • Respect for student and family privacy

  • Commitment to organizational compliance culture

Incident Reporting:

  • Mandatory reporting of suspected or actual security incidents or privacy breaches

  • Immediate notification to Security Officer or Compliance Officer

  • Cooperation with incident investigations

  • Protection and non-retaliation for good-faith reporting

Termination Obligations:

  • Immediate return or destruction of all confidential information upon separation

  • No retention of student data or PII on personal devices

  • Continuing confidentiality obligations after employment ends

  • Device wiping and account deactivation procedures

Agreement Execution and Management

Before Access: All agreements must be fully executed before employees or contractors receive access to systems containing PII or Student Data.

Maintained By: Agreements are maintained by our Compliance Officer, Kris Kofoed (kris.kofoed@impactsuite.com).

Secure Storage: Digital copies are securely stored and tracked through our compliance management system.

Compliance Monitoring: Agreement compliance is monitored as part of our ongoing security program and periodic access reviews.


Subprocessor Vetting and Due Diligence

Before engaging any subprocessor that will have access to or process Student Data or PII, Impact Suite conducts thorough due diligence to ensure they meet our security and compliance standards.

Vetting Process

Phase 1: Security Assessment

We evaluate potential subprocessors across multiple security domains:

Security Practices and Controls:

  • Review of documented security policies and procedures

  • Assessment of security program maturity

  • Evaluation of incident response capabilities

  • Review of disaster recovery and business continuity plans

Encryption Capabilities:

  • Verification of encryption at rest (AES-256 or equivalent)

  • Verification of encryption in transit (TLS 1.2/1.3 or higher)

  • Assessment of key management practices

  • Review of encryption implementation across all data types

Access Control Mechanisms:

  • Evaluation of authentication methods (MFA support, SSO capabilities)

  • Assessment of authorization models (RBAC, least privilege)

  • Review of account management processes

  • Verification of access logging and monitoring

Incident Response Procedures:

  • Review of written incident response plan

  • Assessment of detection capabilities

  • Evaluation of notification procedures and timelines

  • Review of past incidents and lessons learned

Phase 2: Compliance Verification

We verify regulatory compliance and industry certifications:

Certifications:

  • SOC 2 Type II certification (preferred)

  • ISO 27001 certification

  • HIPAA compliance attestations where applicable

  • Industry-specific certifications

Regulatory Compliance:

  • FERPA compliance capabilities and experience

  • COPPA compliance for services involving children

  • State-specific privacy law compliance

  • Documentation of compliance programs

Data Handling Practices:

  • Assessment of data minimization practices

  • Review of retention and deletion procedures

  • Evaluation of data segregation and isolation

  • Verification of secure disposal methods

Third-Party Management:

  • Review of subprocessor's own vendor management

  • Understanding of their subprocessor relationships

  • Flow-down of security requirements

  • Monitoring of their third parties

Phase 3: Infrastructure Evaluation

We assess the technical infrastructure and operational practices:

Data Storage:

  • Physical location of data centers

  • Data residency and sovereignty compliance

  • Geographic restrictions and controls

  • Ability to meet US-only storage requirements if needed

Backup and Recovery:

  • Backup frequency and retention

  • Geographic distribution of backups

  • Disaster recovery capabilities and testing

  • Recovery time and recovery point objectives

Network Security:

  • Network architecture and segmentation

  • Firewall and intrusion detection systems

  • DDoS protection capabilities

  • Vulnerability management programs

Physical Security:

  • Data center physical security controls

  • Environmental controls (power, cooling, fire suppression)

  • Access controls and monitoring

  • 24/7 security operations

Phase 4: Approval Process

Final approval requires multiple stakeholders:

Compliance Officer Review:

  • Kris Kofoed reviews all security assessments

  • Evaluates compliance with educational data privacy requirements

  • Assesses alignment with Impact Suite standards

  • Determines acceptability of risk

Technical Team Evaluation:

  • Engineering team reviews technical security measures

  • Assesses integration security

  • Evaluates operational compatibility

  • Identifies any technical concerns

Legal Review:

  • Review of contractual terms and conditions

  • Assessment of liability and indemnification provisions

  • Evaluation of data processing terms

  • Identification of unacceptable terms or gaps

Leadership Approval:

  • Final sign-off from executive team before engagement

  • Resource allocation decisions

  • Strategic alignment assessment

  • Authorization to proceed with contracting

Contractual Requirements for Subprocessors

All subprocessors must execute comprehensive written agreements before receiving any access to Student Data or PII. We utilize industry-standard templates with strong data protection provisions.

Data Processing Agreements (DPA)

Standard Template: Impact Suite utilizes the 1EdTech Data Privacy and Security Agreement (DPSA) template as our standard DPA framework for educational technology vendors.

The 1EdTech DPSA Ensures:

Clear Scope Definition:

  • Precise definition of data processing activities

  • Specification of data types and categories

  • Limitations on permitted data uses

  • Alignment with educational purposes only

Data Use Restrictions:

  • Prohibition on use for subprocessor's own purposes

  • No data mining or profiling beyond educational services

  • No targeted advertising using student data

  • No sale or rental of student information

  • No disclosure to third parties without authorization

Security Standards:

  • Alignment with industry frameworks (NIST Cybersecurity Framework, ISO 27001)

  • Encryption requirements (at rest and in transit)

  • Access control and authentication requirements

  • Incident response and breach notification obligations

Data Retention and Deletion:

  • Specified retention periods aligned with educational needs

  • Deletion requirements upon contract termination

  • Secure destruction following NIST 800-88 standards

  • Certification of deletion provided

Subprocessor Management:

  • Flow-down of data protection requirements to subprocessor's vendors

  • Notification and approval requirements for new subprocessors

  • Liability for subprocessor acts and omissions

  • Right to audit subprocessor's subprocessors

Audit Rights:

  • Right to audit subprocessor's security practices

  • Access to compliance documentation and certifications

  • Third-party audit rights with reasonable notice

  • Cooperation with regulatory audits

Breach Notification:

  • Immediate notification to Impact Suite upon discovery

  • Detailed incident information and impact assessment

  • Cooperation with investigation and remediation

  • Notification to affected parties as required

Business Associate Agreements (BAA)

For HIPAA-Covered Data: Subprocessors that will access, store, or process Protected Health Information (PHI) must execute HIPAA-compliant Business Associate Agreements.

Our BAAs Include:

Permissible Uses and Disclosures:

  • PHI use limited to providing contracted services

  • Disclosure restrictions and limitations

  • Specific authorization requirements

  • Prohibition on unauthorized uses

Required Safeguards:

  • Implementation of administrative safeguards per 45 CFR § 164.308

  • Implementation of physical safeguards per 45 CFR § 164.310

  • Implementation of technical safeguards per 45 CFR § 164.312

  • Documentation requirements per 45 CFR § 164.316

Breach Notification:

  • Notification to Impact Suite within 24 hours of discovery

  • Detailed breach information including affected individuals

  • Root cause analysis and remediation plans

  • Cooperation with regulatory notifications

Subcontractor Management:

  • Written authorization required before engaging subcontractors

  • Flow-down of BAA obligations

  • Business Associate Agreements with subcontractors

  • Liability for subcontractor compliance

Access and Audit Rights:

  • Right to audit PHI handling practices

  • Access to policies and procedures

  • Review of security assessments

  • Inspection of facilities when appropriate

Termination Provisions:

  • Return or destruction of all PHI upon termination

  • Certification of destruction

  • Retention only if required by law with continued protections

  • Survival of confidentiality obligations

Legal Compliance: All BAAs are based on legally-reviewed templates that comply with HIPAA Security Rule requirements and account for HITECH Act enforcement provisions.

Additional Contractual Protections

Our subprocessor agreements also incorporate:

Data Retention Limitations:

  • Maximum retention periods specified

  • Deletion upon expiration or termination

  • No retention for subprocessor purposes

  • Audit of retention compliance

Prohibited Uses:

  • Explicit prohibition on data use for advertising, marketing, or commercial purposes unrelated to services

  • No building of user profiles beyond educational purposes

  • No sale, rental, or disclosure for monetary gain

  • No combination with other data sources for non-educational purposes

Training Requirements:

  • Mandatory employee training on privacy and security

  • Training on FERPA, COPPA, HIPAA as applicable

  • Documentation of training completion

  • Annual refresher training

Insurance and Indemnification:

  • Minimum insurance coverage requirements (cyber liability, general liability)

  • Indemnification for subprocessor breaches or violations

  • Defense and hold harmless provisions

  • Additional insured status where appropriate

Compliance with State Laws:

  • Adherence to applicable state student privacy laws

  • Specific provisions for states with enhanced requirements (California, New York, Ohio)

  • Updates when state laws change

  • Cooperation with state regulatory requirements

Cooperation with Investigations:

  • Cooperation with regulatory investigations or audits

  • Provision of information and documentation as needed

  • Witness availability if required

  • No obstruction of compliance activities

Agreement Review and Oversight

All subprocessor agreements undergo rigorous review and ongoing management to ensure continued compliance and protection of student data.

Legal Review Process

All standard agreement templates undergo comprehensive legal review to ensure:

Legal Compliance:

  • Compliance with current federal privacy laws (FERPA, COPPA, HIPAA)

  • Compliance with state-specific student data privacy laws

  • Alignment with evolving regulatory requirements

  • Enforceability under applicable law

Adequate Protection:

  • Protection of Impact Suite's interests and obligations to educational agencies

  • Adequate protection of student data and PII

  • Appropriate allocation of liability and risk

  • Strong data protection provisions

Enforceability:

  • Clear and unambiguous terms

  • Reasonable and enforceable provisions

  • Proper jurisdiction and venue clauses

  • Dispute resolution mechanisms

Termination and Data Disposition:

  • Clear termination rights and procedures

  • Data return or destruction requirements upon termination

  • Timing and verification of data disposal

  • Survival of critical provisions post-termination

Compliance Officer Management

Kris Kofoed, Compliance Officer, oversees all aspects of subprocessor contracting:

Pre-Execution:

  • Reviews and approves all subprocessor agreements before execution

  • Ensures alignment with Impact Suite security and privacy standards

  • Identifies any unacceptable terms or missing provisions

  • Coordinates with legal counsel on complex terms

Agreement Repository:

  • Maintains current inventory of all subprocessor relationships

  • Tracks agreement execution dates and renewal dates

  • Manages amendments and updates

  • Ensures accessibility for audit purposes

Ongoing Monitoring:

  • Monitors subprocessor compliance with contractual obligations

  • Coordinates security assessments and certification reviews

  • Manages updates when regulatory requirements change

  • Addresses compliance issues or violations

Educational Agency Notification:

  • Ensures timely notification to educational agencies of new subprocessors

  • Provides subprocessor information upon request

  • Communicates material changes to subprocessor services

  • Maintains transparency with educational partners

Continuous Monitoring and Enforcement

Signing a contract is only the beginning. We maintain active oversight of all subprocessor relationships to ensure ongoing compliance with contractual obligations and security standards.

Ongoing Compliance Verification

Annual Reviews:

  • Review of subprocessor compliance with agreement terms

  • Verification that security controls remain effective

  • Assessment of any material changes to services or infrastructure

  • Evaluation of incident history and response

Security Assessment Updates:

  • Request and review current SOC 2 or ISO 27001 certifications

  • Review of penetration testing results when available

  • Monitoring for security breaches or incidents

  • Validation of continued compliance with security requirements

Certification Tracking:

  • Tracking of expiration dates for certifications

  • Proactive request for updated certifications

  • Gap analysis if certifications lapse

  • Escalation if certifications are not renewed

Incident Monitoring:

  • Monitoring for security incidents or breaches affecting subprocessors

  • Review of subprocessor incident reports

  • Assessment of impact on Impact Suite and educational agencies

  • Evaluation of subprocessor incident response effectiveness

Performance Monitoring

Service Availability:

  • Tracking uptime and service availability

  • Monitoring for service disruptions

  • Assessment of impact on educational agencies

  • Escalation of performance issues

Incident Response Effectiveness:

  • Evaluation of response to security incidents

  • Assessment of notification timeliness

  • Review of remediation effectiveness

  • Lessons learned integration

Support Responsiveness:

  • Monitoring support ticket response times

  • Assessment of issue resolution effectiveness

  • Evaluation of communication quality

  • Escalation of support issues

Adherence to SLAs:

  • Tracking against defined service level agreements

  • Reporting on SLA compliance

  • Remediation for SLA violations

  • Contract enforcement when necessary

Contract Updates

Subprocessor agreements are updated as needed to address:

Regulatory Changes:

  • New privacy laws or amendments to existing regulations

  • Updated guidance from federal or state regulators

  • Enhanced security requirements

  • New compliance obligations

Security Enhancement:

  • Emerging security threats and vulnerabilities

  • Industry best practice evolution

  • New security standards or frameworks

  • Technology changes requiring updated controls

Service Changes:

  • Material changes to subprocessor services or features

  • Changes to data processing activities

  • New integrations or capabilities

  • Infrastructure or architecture changes

Incident Response:

  • Lessons learned from security incidents

  • Enhanced security requirements based on incidents

  • Improved breach notification procedures

  • Strengthened remediation obligations

Enforcement and Remediation

In the event of subprocessor non-compliance:

Issue Identification:

  • Immediate notification to Compliance Officer

  • Documentation of the non-compliance

  • Impact assessment on student data protection

  • Risk evaluation

Investigation:

  • Root cause analysis of non-compliance

  • Determination of whether breach of contract occurred

  • Assessment of harm or potential harm

  • Evidence collection and documentation

Remediation Requirements:

  • Notification to subprocessor of non-compliance

  • Required corrective action plan with timelines

  • Enhanced monitoring during remediation period

  • Verification of effective remediation

Escalation:

  • Notification to executive leadership for significant issues

  • Legal involvement for contract breach

  • Notification to affected educational agencies

  • Consideration of contract termination

Termination: If compliance cannot be achieved:

  • Termination of subprocessor relationship

  • Transition to alternative provider

  • Data recovery and secure deletion from subprocessor

  • Notification to educational agencies

Documentation and Transparency with Educational Agencies

Impact Suite maintains comprehensive documentation of all subprocessor relationships and provides transparency to our educational agency partners.

Subprocessor Documentation

Maintained Documentation Includes:

Current Subprocessor List:

  • Name and description of each subprocessor

  • Services provided and data accessed

  • Location of data processing

  • Security certifications held

  • Available to educational agencies upon request

Executed Agreements:

  • Data Processing Agreements (DPAs)

  • Business Associate Agreements (BAAs)

  • Master service agreements

  • Statements of work

  • Amendments and updates

Security Assessments:

  • Initial security assessment results

  • Annual review documentation

  • Penetration testing summaries

  • Vulnerability assessment findings

Compliance Certifications:

  • SOC 2 Type II reports

  • ISO 27001 certificates

  • HIPAA compliance attestations

  • Other relevant certifications

Incident Documentation:

  • Security incident reports

  • Breach notifications

  • Remediation actions taken

  • Post-incident analysis

Educational Agency Notifications

Impact Suite notifies educational agencies:

New Subprocessors (30 Days Advance Notice):

  • Name and description of subprocessor

  • Services to be provided

  • Data that will be accessed or processed

  • Location of data processing

  • Security certifications

  • Right to object if concerns exist

Material Changes (30 Days Advance Notice):

  • Changes to subprocessor services affecting data handling

  • Changes to data processing locations

  • Changes to security posture or certifications

  • Ownership changes or acquisitions

Incident Notifications (Within 72 Hours):

  • Security incidents at subprocessors affecting educational agency data

  • Nature of the incident and data affected

  • Actions taken by subprocessor

  • Impact assessment and remediation plans

Annual Updates:

  • Current subprocessor list

  • Any changes during the year

  • Updated security certifications

  • Summary of any incidents and resolutions

Our Current Subprocessors

Impact Suite works with a carefully selected, limited number of subprocessors. For detailed information about each subprocessor, their services, and security measures, please visit our dedicated Subprocessors page.

Current Subprocessors:

  • Amazon Web Services (AWS) - Cloud infrastructure and hosting

  • Ednition - Student Information System integration services

View Complete Subprocessor Details →

Vendor Management Best Practices

Impact Suite's vendor management program incorporates industry best practices and evolves to meet emerging challenges.

Key Best Practices

Selective Engagement:

  • Work only with established, reputable vendors

  • Prefer vendors with education sector experience

  • Require strong security track records

  • Verify financial stability and viability

Defense in Depth:

  • Multiple layers of vendor security requirements

  • Both contractual and technical controls

  • Continuous monitoring not just initial vetting

  • Redundancy in critical services where feasible

Transparency:

  • Open communication with educational agencies about subprocessors

  • Proactive notification of changes

  • Availability of subprocessor security documentation

  • Willingness to discuss vendor selection rationale

Continuous Improvement:

  • Regular review and enhancement of vendor requirements

  • Incorporation of lessons learned from incidents

  • Adoption of emerging security standards

  • Benchmarking against peer organizations


Questions About Our Vendor Management?

For questions about our vendor management practices, specific subprocessors, or to discuss custom vendor requirements, please contact our Compliance Officer.

Primary Contact: Kris Kofoed, Compliance Officer kris.kofoed@impactsuite.com

Note: Our vendor management program is reviewed quarterly and updated to reflect evolving security requirements and best practices. All vendor relationships are documented and managed through our compliance management platform. </artifact>