Skip to the main content.
Quest Nav Graphic

Gain access to Quest™, our innovative and powerful platform that delivers quick access to service requests, real-time project status, and powerful automation for onboarding new employees and more.

 

 

PROFESSIONAL SERVICES

Leverage our expertise to optimize your IT environment and work towards compliance goals.

GOV Rounded Edge Images_Short (5)

 

ABOUT SOURCEPASS GOV

Our team is comprised of industry experts with a deep history in working with the public sector.

2 min read

Are You Keeping Up with New York State Education Law 2-D Compliance?

Are You Keeping Up with New York State Education Law 2-D Compliance?

What Is NYS Education Law 2-d?

First enacted in 2014, Education Law 2-D was developed to protect the personally identifiable information (PII) of students and education professionals.

The intention was to better protect this data as it was collected, accessed, and stored in centralized school board databases, which were becoming targets for more and more sophisticated cyber-attacks.

In 2019, new additions to Education Law 2-d were proposed, including the adoption of the National Institute for Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 (CSF, or Cybersecurity Framework).

Furthermore, school districts must appoint at least one “protection officer”, similar to information security roles defined in HIPAA compliance for the healthcare industry.

Are you sure you’re compliant with Education Law 2-D? If your last review was in 2014, you may not have kept up with the more recent developments.

 


 

3 Tips for Managing Your Education Law Compliance

 

These tips will both help to give you a clearer idea of where your organization currently stands, and help you better understand your obstacles as you prepare to make the changes needed to reach compliance.

 

Delegate Important Roles

Someone on your staff, or your IT support provider, should be taking on the role of Privacy and Security Officer for your organization. While not specifically asked for, you’ll also need to have members of your team handling compliance documentation.

Individuals with good organizational and writing skills are needed in this position, given that documenting your actions is a substantial requirement of education law compliance.

 

Gather Necessary Information Through Assessment

You can’t make any of the necessary changes to your current education law compliance if you don’t know your current situation. Whomever you delegate as the compliance officer will need to start by gathering crucial information about the state of your compliance. This is one way in which your IT partner can be so helpful.  
 
An IT company like Sourcepass that specializes in education law compliance offers assessment and audit services that double-check an organization’s compliance against widely accepted best practices.

 

Train Your Employees

One the right organizations and policies are in place, the last part of your cybersecurity defense that needs attention is you and your employees.  
 
A comprehensive compliance and cybersecurity training program will teach your staff how to handle a range of potential situations including:

    • How to participate in the compliance management process, 

    • How to identify and address suspicious emails, phishing attempts, and social engineering tactics,

    • How to use business technology without exposing patient data and other assets to external threats by accident,

    • How to respond when you suspect that your organization is non-compliant. 

 

IT and Compliance Services with Sourcepass

 

Don’t put your compliance at risk.  Work with a qualified partner to develop aassessment, strategy, remediation plan, and on-going compliance management process to improve the efficiency and effectiveness of your program. 
 

The Role of IT in Enhancing Public Safety Communications Systems

11 min read

The Role of IT in Enhancing Public Safety Communications Systems

In today’s rapidly evolving technological landscape, public safety agencies rely on robust communication systems to protect communities and respond...

Read More
Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

6 min read

Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

In November 2021, the Department of Defense (DoD) announced the transition from CMMC 1.0 to CMMC 2.0, streamlining the certification process and...

Read More
What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

3 min read

What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

The Cybersecurity Maturity Model Certification (CMMC) 1.0 was a groundbreaking initiative introduced by the U.S. Department of Defense (DoD) to...

Read More
What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

The Cybersecurity Maturity Model Certification (CMMC) 1.0 was a groundbreaking initiative introduced by the U.S. Department of Defense (DoD) to...

Read More
Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

In November 2021, the Department of Defense (DoD) announced the transition from CMMC 1.0 to CMMC 2.0, streamlining the certification process and...

Read More
Does Your Organization Need to Comply with CMMC 2.0 Level 1?

Does Your Organization Need to Comply with CMMC 2.0 Level 1?

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is a critical framework designed to safeguard sensitive information within the Defense...

Read More