How Leap Log IEP protects Special Education student records
Last updated: March 11, 2026
Leap Log IEP LLC · Kansas City, Missouri
Security at a Glance
Leap Log IEP handles Special Education student records — among the most sensitive data in K-12 education. IEP files contain disability classifications, behavioral histories, and personally identifiable information about children, much of it protected by FERPA and IDEA. We built our security architecture around that reality from day one.
This page describes our technical and organizational security controls. For data use practices, see our Privacy Policy. For contractual security obligations, see our Data Processing Agreement.
Security questions or vulnerability reports: support@leaplogiep.com
All student data stored in our database is encrypted using AES-256 encryption — the same standard used by financial institutions and federal agencies. This applies to every record in the system: IEP goals, progress entries, service logs, behavioral data, messages, and audit logs.
All data transmitted between your browser and our servers uses TLS 1.2 or higher (HTTPS). The platform does not accept unencrypted HTTP connections. Sensitive data — including student PII — is never transmitted over unencrypted channels.
Every account is assigned one of five roles: Department Head, Administrator, Teacher, Paraprofessional, or Parent. Each role has precisely scoped permissions enforced at both the application layer and the database layer:
Our database enforces access controls at the row level, independent of the application. A request that bypasses application logic — including URL manipulation, direct API calls, or session token abuse — cannot retrieve data the requesting user is not authorized to see. Authorization is enforced at the data layer, not just the UI.
All student references in URLs use UUIDs (randomly generated identifiers). Student names, IDs, and other identifiable information never appear in URLs, browser history, or server logs.
Staff accounts automatically expire after 30 minutes of inactivity, with a 2-minute warning before logout. This is a FERPA-aligned control designed for shared school devices where a staff member may walk away from an active session.
All sessions use signed, server-validated tokens. Sessions cannot be replayed, transferred between devices, or extended without re-authentication.
Every access to and modification of student records is logged with:
Audit logs are tamper-resistant and retained for 5 years to support IDEA compliance timelines and dispute resolution. School administrators and Department Heads can view the full audit log in real time through the platform's Settings screen. Read-access logs (who viewed which student's record and when) are also available for FERPA compliance review.
The platform runs on Vercel (application hosting) and Supabase (managed PostgreSQL). Both providers:
Cloudflare sits in front of the platform providing DDoS mitigation, rate limiting, and automated bot filtering. All traffic is inspected before reaching our application servers.
Transactional email notifications (new messages, IEP reminders, progress updates) are designed to contain no student personally identifiable information. Emails contain only the recipient's first name and a link to log in to the platform. This is a deliberate FERPA safeguard — student data is viewable only after authenticated login, never in an email inbox.
In the event of a security breach affecting student data:
Our full breach notification obligations are defined in our Data Processing Agreement.
These controls are implemented specifically to support FERPA's requirement that vendors protect student education records:
Access limited to legitimate educational interest
Role-based permissions enforced at both API and database layer
Audit trail of record access and modification
Every read and write to student records is logged with user, timestamp, and action
No PII in email notifications
Notifications contain first name + authenticated login link only
No PII in URLs
All record references use UUIDs — never names or student IDs
Session controls for shared devices
30-minute auto-logout on all staff accounts
Data use limited to educational purpose
Student data processed only to deliver the contracted service
Data return and deletion
CSV/PDF export available on demand; deletion confirmed in writing
Breach notification
School notified within 72 hours; support for parent and regulatory notification
| FERPA Requirement | Our Implementation |
|---|---|
| Access limited to legitimate educational interest | Role-based permissions enforced at both API and database layer |
| Audit trail of record access and modification | Every read and write to student records is logged with user, timestamp, and action |
| No PII in email notifications | Notifications contain first name + authenticated login link only |
| No PII in URLs | All record references use UUIDs — never names or student IDs |
| Session controls for shared devices | 30-minute auto-logout on all staff accounts |
| Data use limited to educational purpose | Student data processed only to deliver the contracted service |
| Data return and deletion | CSV/PDF export available on demand; deletion confirmed in writing |
| Breach notification | School notified within 72 hours; support for parent and regulatory notification |
| Registration / Certification | Status |
|---|---|
| SDPC — Student Data Privacy Consortium | Registered at privacy.a4l.org |
| Student Privacy Pledge | Signatory |
| COPPA 2024 Rule | Compliant (full compliance deadline April 22, 2026) |
| FERPA School Official Exception | Formalized in our DPA with each school |
| Supabase SOC 2 Type II | Available on request |
| Vercel SOC 2 Type II | Available on request |
Security: security@leaplogiep.com
Privacy: privacy@leaplogiep.com
Legal / DPA: support@leaplogiep.com
Leap Log IEP LLC
Kansas City, Missouri