How do I fill in the CSVs required for 24 by Securly onboarding?

The 24 onboarding process requires that you upload CSVs mapping students, OUs/Security Groups, and students and parents so that 24 analysts can get help from the student in case of an emergency. The onboarding process includes a sample CSV for your reference. 

Per OU/Security group CSV

When uploading this CSV please ensure that you have filled out all the fields in the CSV accurately. These are the expected entries for each of the columns:

  1. School Name: This is the name of the school that the contact person belongs to. 
  2. Contact Name: This is the name of the person assigned for the specific OU/security group as the point of contact for the 24 analysts.
  3. Contact Order: You can assign multiple people to one OU/security group. The numbers in this column indicate the order in which the 24 analysts can contact the individuals listed in the CSV. For example, if Mr. Smith is assigned, number 1 in the Contact Order field and Ms. Robertson is number 2, then the 24 analysts will first attempt to contact Mr. Smith and in case they fail to contact them, they will contact Ms. Robertson. 
  4. Contact Title: This should include the designation of the contact person.
  5. Contact Office Phone: This should include the office/school number for the contact person.
  6. Contact Cell Phone: This should include a cell number that can be used to contact the person in case the Office Phone number is not reachable at the time of the emergency.
  7. Contact Email: This should include the email address of the contact person.
  8. Contact Notes: You can add any additional notes that you would want the 24 analysts to follow when contacting this person. This could include information such as “Do not contact on weekends.” or “Use Cell Phone number only on weekends.” etc. 
  9. Contact OU Groups/ Contact Security Group: This column should list the OUs/security groups to be monitored by the contact within the school indicated.* contactOU.jpg

Per parent CSV

When uploading this CSV please ensure that you have filled out all the fields in the CSV accurately. While not all fields are mandatory, it is recommended that you provide complete information to allow the 24 analysts to provide law enforcement with accurate information if a wellness check is needed for the student.

Here are the expected entries for each of the columns.

  1. Student First Name: This should include the student’s first name as listed with the school.
  2. Student Last Name: This should include the student’s last name as listed with the school.
  3. Student Email: This should include the student’s email address belonging to the school domain.
  4. Parent First Name: Include the parent’s first name if available.
  5. Parent Last Name: Include the parent’s last name if available.
  6. Address: This is the student's address.
  7. Parent Email: The email address of the parent as registered with the school.  
  8. Parent Contact Number: This should include one contact number (cell phone, home, work, etc.) that the 24 analysts can share with law enforcement in case of an emergency. 
  9. Relationship to Student: Please specify how the contact is related to the student.
  10. Contact Order: You can list multiple parents for one student.   Please specify which parent is most likely to know where the student may be in case of an emergency.
  11. Grade: Include the grade the student is in
  12. Additional Information 1: Any other information that you want to add about that student and/or parent.
  13. Additional Information 2: Any additional information about the child or parent.

Accurate and updated information is critical to ensuring that 24 analysts can respond to a flagged incident on time. We recommend that you upload your CSVs whenever there are any changes to the contacts assigned to the OUs/Security Groups or parent information on file with your school. 

*It is recommended that you avoid duplication of security group names so that contacts are mapped accurately. If multiple groups with the same name are found, then contacts are mapped to each of the security groups. For example: If Contact 1 is assigned to security group named "Teacher", and if you have five security groups named "Teacher", then Contact 1 will be assigned to all five security groups with that name.    

Was this article helpful?
11 out of 15 found this helpful
Have more questions?
Submit a request

Comments

0 comments

Article is closed for comments.

Articles in this section