The P-20W+ Community of Innovation creates and stewards resources that provide support, guidance, and immediately deployable approaches to modernization efforts taking place across the P-20W+ landscape. Explore these tools below to see what might help you in your work.
Contact us to share feedback or suggestions for adding new resources.
Project management teams face common challenges related to planning, coordinating, and executing their SLDS work, regardless of team composition. This guide examines several challenges that SLDS project teams face in the areas of human and organizational capacity, project administration, communications and engagement, and vendor management and offers solutions from state SLDS project teams for navigating those challenges.
The CEDS Open Source Community (OSC) is a P20W education data community that exists to provide collaborative development between CEDS stakeholders to expand and improve CEDS through adding and updating CEDS Elements, the CEDS Integrated Data Store and the CEDS Data Warehouse and to contribute exchangeable code to the CEDS Open Source Repository for stakeholder use.
Credential Engine provides a suite of web-based services that creates for the first time a centralized Credential Registry to house up-to-date information about all credentials, a common description language to enable credential comparability, and a platform to support customized applications to search and retrieve information about credentials. The mission is to map the credential landscape with clear and consistent information, fueling the creation of resources that empower people to find the pathways that are best for them.
The Cyber Security Evaluation Tool (CSET®) is a stand-alone desktop application that guides asset owners and operators through a systematic process of evaluating Operational Technology and Information Technology. CSET was recently updated to include a new module: Ransomware Readiness Assessment (RRA). The RRA is a self-assessment based on a tiered set of practices to help organizations better assess how well they are equipped to defend against and recover from a ransomware incident.
The Data Breach Scenario Trainings are a series of packaged trainings designed to help educational organizations at all levels conduct internal staff development on data breaches. Each scenario has been developed into a training package, providing ready-to-use resources for the scenario leader(s) and participants, including a Facilitator’s Guide, Scenario Presentation, and Participant Handout, allowing for a more personalized, customizable experience.
Data governance is an essential component of a successful SLDS program. It is how organizations or groups of organizations make decisions about their collective information assets. This toolkit provides an overview of data governance, a description of the organizational structure and implementation elements recommended for an effective data governance program, and links to additional resources on data governance and related topics.
The Data Maturity Model provides a roadmap and method for evaluating SLDS practices to maximize the value of the data system, understand a system’s current state, and determine where the system needs to go. The Data Maturity Model Overview describes the four capacity areas and five stages of the Data Maturity Model. The accompanying Data Maturity Model Rubric and Data Maturity Model Facilitator Tip Sheet can help organizations assess the current human, organizational, structural, and material capacities of their SLDSs.
Breaches of educational data are common and can lead to a violation of FERPA, as well as to a host of negative consequences for students such as identity theft, fraud, and extortion. This page is a portal to guidance and best practice resources for the educational community to use to enhance the security of their information systems. While these resources are principally geared to K-12 agencies and institutions, the security principles are the same regardless of grade level.