The OT template and report was developed and organized by following the guidelines and samples from Best Practices For Documenting Occupational Therapy Services in Schools, Occupational Therapy Evaluation for Children 2nd Edition, AOTA Occupational Profile Template, and reviewing reports from many therapists across the country.
Yes, all reports are based on the individual's behaviors, scores, teacher/parent report, and individual performance.
Recently edited sentences, based on your answers to the questions, are highlighted in blue so you can quickly see your changes. If you rollover a sentence and it turns yellow, click on it and you will be taken to that specific question so that you can edit or change your answer.
All users must log in with a password to access DTD. Your secure login is the first security measure in effect, so please keep your password safe. DTD uses hashing (one-way encryption) to store your password in our database, keeping it secure. We cannot read your password in our database. You can use the forgot password link to reset it if needed.
Only you and the DTD admins have access to the docs that you create. Our admins have access only for the purposes of maintaining the services and carrying out day to day operations.
DTD uses industry-standard security practices when storing the doc's data in a secure database. We also utilize SSL (https) which encrypts all data being sent between your computer and our servers.
If you prefer to add an extra layer of security, you can use a fictitious first name for your student, download the Word doc, and do a quick search-and-replace for the first name. That way, the student's name will never be stored on our servers. The same can be done for the student's age, your school's name, etc.
DTD runs on a host that utilizes Amazon Web Service (AWS) data centers. AWS ensures a high level of physical security to safeguard their data centers. Among others things they employ two-factor authentication for all their authorized staff members, military grade perimeter controls and security staff at all ingress points.
As for environmental protection, AWS has sophisticated fire detection and suppression equipment, fully redundant power infrastructure with integrated uninterrupted power supply (UPS) units and high end climate control system to guarantee an optimal working environment for the hardware.
Our host employs a multi tier security strategy. On the inside, all operating systems and software components are kept up-to-date. On the outside, our host utilizes network firewalling and hardened TCP/IP stacks to mitigate hacking attempts.
More info can be found at our host, FortRabbit.