Quick read
This article is written for teams evaluating platforms, rollout priorities, and the tradeoffs between adoption, workflow depth, and implementation effort.
FERPA, the Family Educational Rights and Privacy Act, is a federal law that governs how educational institutions handle student records. It was enacted in 1974, and it applies to every institution that receives federal funding, which means essentially every college and university in the United States. For Student Affairs teams evaluating campus engagement software, FERPA applies more broadly than it might initially seem. Student organization membership, event attendance, RSVP records, and involvement activity are education records in most institutional contexts. That means every platform that stores this data has FERPA obligations, and the institution is legally responsible for making sure those obligations are met.
This guide covers what FERPA actually protects, how it applies to the specific types of data that engagement platforms collect, what questions campus teams should ask vendors during procurement, and how to build FERPA compliance into your evaluation process so you catch problems before they become institutional liabilities. If you're a Student Affairs director, a campus IT administrator, or anyone involved in selecting or managing campus engagement technology, this is the reference you need.
What FERPA Actually Protects
FERPA protects "education records," which the law defines as records, files, documents, and other materials that are directly related to a student and maintained by an educational agency or institution, or by a party acting for the agency or institution. That last part is important: when a vendor stores student data on behalf of the institution, that vendor is "acting for" the institution, and the data is still subject to FERPA.
FERPA gives students (or their parents, if the student is under 18) two primary rights. First, the right to inspect and review their education records. Second, the right to request amendments to records they believe are inaccurate or misleading. FERPA also restricts the disclosure of education records to third parties without student consent, with specific exceptions for school officials with legitimate educational interests, directory information that the institution has properly designated, and a few other categories.
The penalties for FERPA violations are institutional, not individual. The U.S. Department of Education can withdraw federal funding from institutions that have a policy or practice of violating FERPA. In practice, funding withdrawal is extremely rare, but FERPA complaints and investigations create real operational burden, reputational risk, and legal exposure. Institutions take FERPA seriously not because the penalties are draconian but because the compliance obligation is clear and the institutional risk of getting it wrong is meaningful.
What Counts as an Education Record in This Context
Under FERPA, education records include records, files, documents, and other materials that are directly related to a student and maintained by an educational agency or institution, or by a party acting on its behalf. For campus engagement software, this typically includes:
- Student organization membership lists and role records
- Event attendance and check-in records
- RSVP data linked to individual students
- Participation logs used for co-curricular transcripts or reporting
- Any student-identifiable engagement metrics stored by the platform
- Form responses collected during event registration or organization onboarding
- Communication records tied to student identities within the platform
There's an important distinction here that many campus teams overlook. FERPA doesn't just apply to records that are formally labeled "academic." If a student's event attendance is recorded in a system maintained by the institution (or by a vendor acting on the institution's behalf), and that record is directly related to the student, it's an education record under FERPA. This is true whether the data lives in your SIS, your LMS, or your campus engagement platform.
The exception is what FERPA calls "sole possession records," which are notes maintained by a single person that aren't shared with anyone else. But the moment a record is in a shared platform, accessible by multiple staff members or stored in a vendor's system, it doesn't qualify for that exception.
Directory Information: What It Is and Why It Matters
FERPA distinguishes between education records generally and "directory information," which is a subset that institutions can designate as publicly releasable. Directory information typically includes things like student name, email address, enrollment status, major, and dates of attendance. Institutions define their own directory information policy, and students have the right to opt out of directory information disclosure.
This matters for engagement platforms because some of this data may be displayed within the platform itself. If a student's name appears on an organization membership list that other students can see, or if their attendance at an event is visible to event organizers, the institution needs to consider whether that display is consistent with its directory information policy and whether students who've opted out of directory disclosure are properly excluded.
Most engagement platforms don't handle directory information opt-outs automatically. That means campus staff need to either configure the platform to respect opt-out status or implement a manual process for excluding opted-out students from visible lists. If you're evaluating a vendor and they can't explain how their platform handles directory information opt-outs, that's a gap worth flagging.
The School Official Exception: How Vendors Qualify
FERPA allows institutions to disclose education records to "school officials" who have a "legitimate educational interest" in the records. This is the primary mechanism by which institutions share student data with third-party vendors without obtaining individual student consent.
For a vendor to qualify as a school official under FERPA, the institution must meet several conditions. The vendor must be performing a function that the institution would otherwise perform itself. The vendor's use of the data must be controlled by the institution through a written agreement. The vendor must not re-disclose the data except as permitted by the institution. And the vendor must be subject to the same conditions on use and re-disclosure that apply to the institution's own employees.
In practice, this means the institution needs a written agreement with the vendor that specifically addresses FERPA. This is sometimes called a data processing agreement, a data sharing agreement, or a FERPA addendum to the main contract. The specific label matters less than the content: the agreement needs to establish the vendor as a school official, define the legitimate educational interest, restrict what the vendor can do with the data, and require compliance with FERPA's disclosure limitations.
If a vendor won't sign this type of agreement, or if they say their standard terms of service already cover FERPA (without actually specifying the school official designation and use restrictions), that's a serious red flag. Standard terms of service are written to protect the vendor, not to satisfy FERPA's requirements for institutional control over education records.
Key FERPA Questions to Ask Every Vendor
When you're evaluating campus engagement platforms, these are the FERPA-specific questions that should be part of every vendor conversation:
Data classification and storage
- Does your platform store student-identifiable participation records? If so, how do you classify this data?
- Where is student data physically stored? What's the hosting infrastructure?
- Is data encrypted at rest and in transit? What encryption standards do you use?
- Are institutional data boundaries enforced so that one institution's data is isolated from another's?
Third-party access and data sharing
- What third parties have access to student data through your platform? This includes sub-processors, analytics providers, and infrastructure vendors.
- Does your platform share student data with advertising networks, data brokers, or other commercial entities?
- Do you use student data for product analytics or product improvement? If so, is that data aggregated and de-identified, or does it include student-identifiable information?
- Can you provide a complete list of sub-processors who handle student data?
Student rights and data access
- How does your platform handle data access requests from students under FERPA's inspection and review rights?
- Can students see what data the platform has collected about them?
- How do you handle directory information opt-outs?
Data retention and deletion
- What is your data retention policy for student records?
- When the contract ends, what happens to the institution's student data?
- Can you provide a full data export in standard formats (CSV, JSON)?
- Do you have a written data destruction policy with a specific timeline?
- Does data destruction include backup copies?
Contractual protections
- Will you sign a FERPA-compliant data processing agreement that designates you as a school official?
- Can you provide a copy of this agreement during the evaluation process, before contract signature?
- What is your incident notification process and timeline if a data breach affects student records?
What to Watch for in Vendor Responses
The way a vendor responds to FERPA questions tells you as much as the answers themselves. Here's what to look for:
Red flags:
- Vague references to "standard security practices" without specific answers about data handling
- Reluctance to share the data processing agreement before contract signature
- Claims that their standard terms of service "cover FERPA" without specific FERPA language
- Any mention that student data is used for platform analytics or product improvement without explicit de-identification and institutional consent
- Inability to provide a list of sub-processors who handle student data
- No written data destruction policy or vague timelines for data deletion after contract termination
- Defensiveness or deflection when asked direct FERPA questions
Positive signals:
- Willingness to share the data processing agreement during evaluation, not after contract signature
- Specific, documented answers about data classification, storage, encryption, and access controls
- Clear institutional data boundaries with no cross-institution data sharing
- A transparent list of sub-processors and their roles
- A written incident response plan with specific notification timelines
- Experience working with institutional IT security and legal teams during procurement
How to Build FERPA Compliance into Your Procurement Process
Don't treat FERPA as a legal review that happens after you've already chosen a vendor. Build it into the procurement process from the start. Here's a practical sequence:
- Include FERPA questions in your RFP. Send the questions listed above as part of your initial vendor outreach. This saves time by filtering out vendors who can't answer them before you invest time in demos and trials.
- Request the data processing agreement during evaluation. Don't wait until contract negotiation. If there are FERPA issues in the agreement, you want to find them while you still have other options on the table.
- Involve your institution's data privacy officer and IT security team. Student Affairs shouldn't be evaluating FERPA compliance alone. The data privacy officer understands the legal requirements, and IT security can evaluate the technical controls. Include both in vendor review meetings.
- Test data visibility during the trial. If the vendor offers a trial period, use it to test how student data flows through the platform. Create test accounts, check what data is visible to different user roles, and verify that data boundaries are enforced.
- Document the FERPA evaluation. Keep a written record of the questions you asked, the vendor's answers, and the agreement language you reviewed. This documentation is valuable if a FERPA question comes up later, and it demonstrates institutional diligence.
Campuses that catch FERPA issues during procurement avoid the much more painful process of discovering them after student data is already in the system. The cost of a thorough evaluation is a few extra hours during procurement. The cost of a FERPA problem after launch is measured in legal review, remediation, student notification, and reputational risk.
FERPA and State Privacy Laws
FERPA is the federal floor, but it's not the only privacy law that applies. Many states have their own student privacy laws that add additional requirements. California's SOPIPA (Student Online Personal Information Protection Act), for example, prohibits operators of educational websites and apps from using student data for targeted advertising, building advertising profiles, or selling student information. New York's Education Law 2-d requires vendors to maintain industry-standard security protocols and report data breaches within a specific timeline.
When you're evaluating vendors, ask whether they're aware of and compliant with the specific state privacy laws that apply to your institution. A vendor that serves campuses in multiple states should be able to explain how they handle the patchwork of state requirements. If they can't, that's a gap in their compliance infrastructure.
Comparison Table: FERPA Compliance Evaluation Criteria
Use this table when you're comparing vendors side by side on FERPA-specific criteria:
| Evaluation Criteria | What Strong Compliance Looks Like | Red Flags |
|---|---|---|
| Data processing agreement | Vendor provides FERPA-specific agreement during evaluation; designates vendor as school official; restricts data use and re-disclosure | Agreement only available after contract signature; standard ToS claimed as sufficient; no school official designation |
| Data classification | Vendor clearly distinguishes between education records, directory information, and de-identified data in their documentation | No data classification documentation; all student data treated the same regardless of sensitivity |
| Sub-processor transparency | Complete list of sub-processors available on request; each sub-processor's role and data access clearly documented | Can't provide a sub-processor list; claims "standard cloud providers" without specifics |
| Data monetization | No use of student data for advertising, data brokering, or commercial analytics; explicitly stated in agreement | Vague language about "improving the product" using student data; third-party analytics that touch student records |
| Directory information handling | Platform supports opt-out enforcement; institutional control over what data is visible to other users | No mechanism for handling directory information opt-outs; all student data visible by default |
| Data retention and destruction | Written policy with specific timelines; full data export in standard formats; destruction includes backups | No written policy; unclear timelines; no export capability; backups not addressed |
| Incident response | Written plan with notification timelines; vendor notifies institution before notifying students | No written plan; no defined notification timeline; vendor may notify students directly without institutional coordination |
| Access controls | Granular role-based permissions; institutional admin controls over who sees what data; audit logging | All-or-nothing permissions; no distinction between staff and student access levels |
| State privacy law awareness | Vendor can discuss specific state laws (SOPIPA, Ed Law 2-d, etc.) that apply to their campus clients | Vendor is unaware of state-level requirements or claims FERPA covers everything |
Where iCommunify Fits
iCommunify treats student participation data as institutional records rather than product analytics. The platform captures attendance, membership, and engagement data through normal usage (RSVP, QR check-in, organization membership), and that data stays within the institutional context. Here's how the platform addresses the FERPA concerns covered in this guide:
- No data monetization: iCommunify doesn't sell student data, share it with advertising networks, or use student-identifiable records for commercial purposes. The business model is the platform subscription, not the data.
- Institutional data boundaries: Each institution's data is isolated. One campus can't see another campus's student records, organization data, or event attendance.
- Role-based access controls: Staff administrators have granular controls over what student leaders and general members can access. Student leaders can manage their organizations without seeing campus-wide data or other organizations' information.
- Verified participation data: QR code check-in creates a timestamped, verified attendance record. This data is more reliable than manual sign-in sheets and creates a clean audit trail for co-curricular reporting.
- Data stays in the platform: Because iCommunify handles organizations, events, RSVP, ticketing, and check-in in one system, student data doesn't need to flow between multiple platforms, which reduces the number of vendors with access to education records.
Colleges evaluating the platform should use the colleges site and the contact form to ask specific questions about data handling before making a decision. The goal is clarity and directness, not a compliance marketing checklist.
For campuses that also want to connect student engagement with employment readiness, iCommunify Jobs provides a student employment platform within the same ecosystem. This means students don't need separate accounts or separate data flows across multiple vendors.
Common FERPA Mistakes Campus Teams Make During Procurement
Based on patterns we see across campus procurement processes, here are the most common FERPA-related mistakes and how to avoid them:
- Treating FERPA review as a contract cleanup item. If you wait until contract negotiation to raise FERPA questions, you've already invested significant time in a vendor that might not meet your compliance requirements. Front-load FERPA evaluation.
- Assuming "SOC 2 certified" means FERPA compliant. SOC 2 is a security audit framework that evaluates a vendor's controls against industry standards. It doesn't specifically address FERPA's requirements around education records, school official designation, or data re-disclosure restrictions. SOC 2 is useful context, but it's not a substitute for FERPA-specific evaluation.
- Not involving IT security in the evaluation. Student Affairs teams own the functional requirements, but IT security needs to evaluate the technical controls. A vendor might give great answers to functional questions but have weak infrastructure security. Both perspectives are needed.
- Accepting verbal assurances instead of written commitments. During a demo, a vendor might say "we don't share student data with third parties" or "we'll delete everything when the contract ends." Those statements are worthless unless they're in the written agreement. If it's not in writing, it doesn't exist.
- Ignoring state privacy laws. FERPA is the baseline, but your state may have additional requirements. Make sure your evaluation accounts for state-specific obligations, not just federal ones.
Get Started
Explore iCommunify for Colleges to see how the platform handles student data and institutional privacy. Check out more guides on the colleges blog for practical advice on campus engagement, security, and procurement. And if connecting students with employment opportunities matters to your campus, see how iCommunify Jobs fits into the same ecosystem.
Frequently Asked Questions
Does FERPA apply to student engagement software?
Yes. If the platform stores records that are directly related to a student and maintained by the institution or by a vendor acting on the institution's behalf, those records are education records under FERPA. This includes student organization membership, event attendance, RSVP data, and participation logs. The institution is responsible for ensuring that any vendor handling this data meets FERPA's requirements, which typically means having a data processing agreement that designates the vendor as a school official with a legitimate educational interest.
What FERPA considerations matter most for campus engagement platforms?
The most important considerations are: whether the vendor will sign a FERPA-compliant data processing agreement, how the vendor handles third-party access to student data, whether student data is used for commercial purposes beyond the contracted service, how directory information opt-outs are enforced within the platform, and what happens to student data when the contract ends. Access controls, encryption, and incident response planning are also important, but the data processing agreement is the foundation that everything else builds on.
How can colleges ensure their engagement software is FERPA compliant?
Start by requesting the vendor's data processing agreement during evaluation, not after contract signature. Verify that the agreement designates the vendor as a school official, restricts data use and re-disclosure, and includes data destruction requirements. Test the platform's access controls during a trial period. Involve your institution's data privacy officer and IT security team in the evaluation. Document the FERPA-specific questions you asked and the answers you received. And don't assume that SOC 2 certification or general security claims are sufficient substitutes for FERPA-specific compliance evaluation.
What's the difference between FERPA and GDPR for campus platforms?
FERPA is a U.S. federal law that applies to institutions receiving federal funding and governs education records specifically. GDPR is a European Union regulation that applies to organizations processing personal data of EU residents, regardless of the organization's location. The key practical differences: GDPR creates individual rights (right to access, right to deletion, right to data portability) that are broader than FERPA's inspection rights. GDPR requires explicit consent for data processing in most cases, while FERPA allows disclosure to school officials without consent. If your institution has EU students or operates study-abroad programs in Europe, both laws may apply, and the vendor needs to be able to explain how they handle both.
Can vendors use student engagement data for their own analytics or product improvement?
This depends on the data processing agreement and how the data is handled. If a vendor uses student-identifiable education records for product analytics or improvement, that likely violates FERPA unless the agreement specifically authorizes it and the use falls within the vendor's legitimate educational interest designation. However, if the vendor aggregates and de-identifies the data so that no individual student can be identified, FERPA doesn't apply to the aggregated data. The key question is whether the de-identification is genuine and irreversible. Ask the vendor to explain their de-identification methodology and verify that it meets recognized standards.
What should happen to student data when the vendor contract ends?
The vendor should provide a full data export in standard formats (CSV, JSON, or similar) within a defined timeframe. After you've confirmed receipt of the export, the vendor should delete all copies of your institution's data from their systems, including backup copies, according to a written data destruction policy with a specific timeline. Get these commitments in the data processing agreement before you sign the contract, not during exit negotiations. If a vendor can't explain what happens to your student data when the relationship ends, that's a significant FERPA and institutional risk concern.
How does FERPA apply to student data stored in cloud infrastructure?
FERPA doesn't distinguish between on-premises and cloud storage. If student education records are stored in cloud infrastructure by a vendor acting on behalf of the institution, the same FERPA protections apply. The institution is still responsible for ensuring that the vendor's cloud infrastructure meets appropriate security standards (encryption at rest and in transit, access controls, etc.) and that the data processing agreement covers the cloud storage arrangement. Ask the vendor where data is physically stored, whether it's in a shared or isolated environment, and whether their cloud sub-processors (AWS, GCP, Azure, etc.) are listed as sub-processors in the data processing agreement.