FERPA
The authors of the U.S. Federal Educational Rights and Privacy Act (FERPA) surely meant well, but compliance with the regulation can be a hot mess. ZenGRC can help you untangle it.
GET A DEMOPass the compliance test with flying colors
Enacted in 1974, FERPA protects the privacy of student records, and arguably was ahead of its time. Decades later, however, FERPA still creates confusion among students, parents, educators, and school administrators.
For example, what rights do post-secondary students have over their education records and student directory information? Where do their rights begin and their parents’ rights end? Which personally identifiable information (“PII,” such as test scores, attendance records, names, addresses, and Social Security numbers) can school officials disclose without consent, and to whom? Accreditation organizations can receive such information—but so can others with a “legitimate educational interest,” according to the statute. How should we define that in the modern era, nearly 50 years after FERPA was enacted?
Last, but not least: How can schools, colleges and universities that receive U.S. Department of Education funding know for certain that they comply with FERPA?
Relax. ZenGRC has your FERPA compliance covered. Our software-as-a-service can track your educational institution’s compliance with this important data privacy law and with related policies, issues, and risks. If you fall short, Zen’s user-friendly dashboards can show you exactly what you need to do to get compliant, and collect the documentation you’ll need to pass a compliance assessment.
Worry-free FERPA compliance is the Zen way. Contact us now for your free demo, and go to the head of your class in data protection.

Ebooks

Guides

Case Studies
ZenGRC increases audit efficiencies for Beeline while decreasing time, resources and risk
Read Case Study
Webinars
Top Initiatives for Infosec Teams to Consider in Implementing Business Continuity & Resiliency
Watch WebinarVendor Risk Management: What your organization can and cannot do under the GDPR
Watch Webinar
Articles
The Difference Between Vulnerability Assessment and Vulnerability Management
Read ArticleCCPA Exemptions: The California Consumer Privacy Act and the Gramm-Leach-Bliley Act
Read ArticleHow Big Data Analysis Helps Compliance & Business Leaders Make Better Decisions
Read ArticleCompliance Offers Internal Stakeholder Value: Automation as Transmogrifier
Read ArticleRisk Management Automation and Customer Engagement: Rupees in the Grass
Read Article7 Challenges of Being an IT Compliance Manager: Automation Makes You an American Ninja Warrior
Read ArticleCybersecurity Awareness Training Game to Celebrate Cybersecurity Awareness Month
Read ArticleiPhone X and Security: Becoming James Bond and Protecting Your Organization
Read ArticleProtecting Your Corporate Website as an Enterprise Risk Management Strategy
Read ArticleCloud Security Compliance: 11 Steps on the Stairway to Cloud Services Heaven
Read ArticleLegal Liability in Information Security: How Compliance Can Be Used to Protect Assets
Read ArticleWebinar Recording Now Available – 6 Time Saving Steps to Simplify Your GRC Strategy
Read ArticleHow to Conduct a Compliance Self-Assessment – an Excerpt from our GRC Software Buyers’ Guide
Read ArticleWhen to Implement a GRC Tool? – An Excerpt from Reciprocity’s GRC Software Buyer’s Guide
Read ArticleSmarter Compliance, Less Risk – an Excerpt from Reciprocity’s GRC Software Buyer’s Guide
Read ArticleWhat is GRC – an Excerpt from Reciprocity’s GRC Software Buyer’s Guide
Read ArticleZenGRC v2.4 Release Features New Audit and Evidence Request Dashboards, and More
Read Article“Competent Compliance” Webinar Recording Now Available, Learn How to Move Beyond Spreadsheets
Read ArticleJoin Our Live Webinar – Competent Compliance: 3 Ways to Move Beyond Spreadsheets
Read ArticleZenGRC v2.2 Release Features New System of Record Dashboard, Tree View Updates
Read ArticleZenGRC v2.1 Release Features Improved Audit Capabilities, Simplified Customer Support
Read ArticleHow to Tell if it is Time to Start a Compliance Program [Infographic]
Read ArticleA Perfect Nightmare: Compliance and Record Keeping Disaster Waiting to Happen
Read ArticleChanges Are Coming For The Trust Services Principles And Criteria – Are You Ready?
Read ArticleSelecting the Right Service Organization Control Report for Outsourced Operations
Read Article
FAQs

Infographics
Learn how we can fit into your business.
Schedule a demo to learn how we can help guide your organization to confidence in infosec risk and compliance.