takes your information seriously.  This page provides you details on the security methods used to protect and secure your information.

SSL Connection
By using SSL (Secure Sockets Layer) we can be confident that the connection between your computer and our website is secure using encrypted keys.  You can also be assured that that the entity running the web site is who they say they are by a valid certificate.  To view our SSL certificate click here.  Web pages using this technology are designated by the "s" in "https" as well as a closed padlock symbol in your browsers address bar.  For a more detailed description of how this technology works click here.

Data Encryption
Data encryption is essential to ensure protection against a server breach.  All data on this website is encrypted with a minimum 128-bit (256-bit where applicable) RSA encryption technique, providing the highest level of security for your data.  Encryption typically uses a public and private key methodology.  The public key is given out but the data can only be viewed by using a private key to decode the information.  This key will only be located inside the firewall at the school district.  If a breach does occur on the server hosting the application, the encrypted data could not be discovered without also having the private key.

Secure Transfer
We digitally sign all information transferred from to your district’s central office.  This information has a unique code that only can be received and decoded by the district office administrator.  This signature ensures we are:

  • Receiving the file we expect
  • It is complete
  • And not altered

This is an added security measure on the data transfer while also giving the applications a reliable way to communicate a successful or unsuccessful file transfer.

Electronic Signature
The Uniform Electronic Transactions Act (UETA) ,which 48 states have adopted, defines an electronic signature as "an electronic sound, symbol or process attached to or logically associated with a record executed or adopted by a person with the intent to sign the record".  Many different types of electronic signatures can be used to identify and authenticate a particular person as the source of the electronic transaction. uses the "I agree" method for an electronic signature and displays the users name within the affirming statement.  By accepting this statement they indicate their intent to sign the application and transmit the data to the school district.