PlayPosit’s interactive video platform and instructional design tool is recognized by the National Science Foundation as significantly positively affecting student outcomes and knowledge acquisition. We work in partnership with our clients to create a product that is dynamic and powerful, addressing engagement, retention, & other learning concerns.
Ensuring that PlayPosit is accessible to all users is a high priority for us. We have tested the PlayPosit 3.0 dashboard, designer, and player for screen reader compatibility, keyboard navigation, color contrast, and well-structured code extensively.
For details on our adherence to leading global accessibility standards, including U.S. Section 508 standards and WCAG 2.3, please refer to our Voluntary Product Accessibility Templates (VPATs). If you have additional questions, please reach out to firstname.lastname@example.org.
HECVAT available upon request.
Data is encrypted while in motion and at rest.
Countries of data storage
Data storage method
Critical data is to be encrypted and stored on a server that receives, at minimum, daily backups. Disk level redundancy is required on drives containing confidential data. Confidential information must be securely stored and removed from desks, computer screens, and common areas unless it is currently in use.
Data retention policy
It is PlayPosit policy to retain data based upon the type of data. Operational data must be retained for five years. Confidential data must be retained for one year after the conclusion of the contractual relationship with the client who owns or provided the data unless PlayPosit is otherwise directed by the client.
Incident management program, policy, and testing
PlayPosit has an extensive incident management program, policy, and testing practices that are available upon request.
Disaster recovery and business continuity plan and testing
PlayPosit offers an extensive Disaster Recovery and Business Continuity Plan upon request.
Security Standard Certificates
This information is available upon request.
Third party testing and security controls practices