Teachers

Introduction

Why are there two planning pathways?

Incorporating Emergent Learning

Security

Introduction

LIFT uses a 'dashboard' approach to managing all of your program planning activities.  Key tasks and references are viewable from the screen that you need them in, to make cross referencing and post planning reflection much simpler.  

LIFT uses a highly secure environment where users can be granted three levels of access to service records:

  1. Parent access - ability to view only thier own child's information.  Families can submit their own 'home' observed learning/observations and edit key family/child contact information.  While there is limited access to update teacher edited data, there is provision to provide input and feedback on the records they view. 
  2. Teacher access - ability to create & edit observations and plans associated with a particular service (this gives teachers flexibility who are working with a variety of groups.
  3. Administration access - ability to add children and families to LIFT and link online registrations to this data.  

LIFT adapts well understood and practical program planning techniques with emergent & flexible child based planning by:

Getting started tips:

  • you must always click the 'submit' or 'update' to update your records.  If this is not done, all entered information will be lost when the screen refreshes. 


Incorporating emergent learning  




Platform Security

Our platform implementation is based on state-of-the-art infrastructure and best practices that far surpass the requirements of most security-sensitive organizations and applications.

To maintain the highest level of service, our deliver partner Caspio ensures security measures that are applied to multiple layers:


Physical Layer

Caspio's servers are owned and managed by Caspio and are co-located at a SAVVIS Tier 1 data center in the United States. Security measures provided by SAVVIS include:
  • On premise security guards
  • Exterior-building cameras, false entrances, vehicle blockades, parking lot design, bulletproof glass/walls, unmarked buildings
  • Biometric systems which include palm scanners
  • Security cameras with digital recorders, Pan-Tilt-Zoom (PTZ) capabilities
  • Portals and man traps, only a single person authenticated at one time

Network and Systems Layer
  • Our network is protected by top-of-the line firewalls from industry-leading vendors. These firewalls remain up-to-date with upgrade and patches provided by vendors and they are configured to allow only the absolute minimum level of access to internet users.
  • Various security measures are employed and enforced inside of the perimeter firewalls and on internal systems. The exact nature of these measures is kept confidential. 
  • All operating systems are kept current with all the patches recommended by their vendors. All unnecessary users, protocols, and ports are disabled and monitored. 
  • Our databases can only be accessed through trusted authentication and are kept inside layers of protection. 
  • A report of Caspio's server performance and service availability is published at http://status.caspio.com. The service status report is accessible 24 hours a day from the Support Center, with data being refreshed every 5 minutes by a third-party monitoring service. 

Application Layer

All clients log into LIFT with a username and password. LIFT does not store sensitive user data in cookies or utilize other high-risk user or session tracking methods.

Data Encryption – When you login LIFT your session is secured with 100% data encryption using industry-standard SSL security 


Web Application Security – LIFT also provides CAPTCHA human verification security to eliminate spam or malicious non human access. 


SAS 70 Type II Compliance

Our partner Caspio’s network infrastructure is housed in a state-of-the-art data center which conforms to the Statement on Auditing Standards No. 70 (SAS 70). SAS 70 evaluates company controls related to managed security services, change management, service delivery, support services, backup and environmental controls, logical and physical security.

A SAS 70 examination is widely recognized, because it represents that a service organization has been through an evaluation of their internal controls as they relate to an audit of the financial statements of its customers. A Type II report not only includes the service organization's description of controls, but also includes detailed testing of the design and operating effectiveness of the service organization's controls.

Caspio is focused on developing and refining systems and processes that fully secure our service delivery infrastructure. Our customers are faced with increasing compliance requirements and the SAS 70 examination is an important factor as they evaluate outsourcing their IT infrastructure.


PCI Compliance

Our partner Caspio has been deemed PCI compliant by the Payment Card Industry Security Standards Council. This means that we implement the highest security standards when it comes to tractions involving a payment card. You can rest assured that every time Caspio process your payment, your credit card and personal information is secure.

Caspio meets all six categories of PCI standards. We:

  • Protect Cardholder Data
  • Maintain a Vulnerability Management Program
  • Implement Strong Access Control Measures
  • Regularly Monitor and Test Networks
  • Maintain an Information Security Policy
  • TRUSTe EU Safe Harbor Compliance