Cart 0
 

Programs | Learning Experiences


In this section, you'll find information on Inspire-Prepare-Succeed, JADE, the Digital Collaboration Framework and Roadmap, the LMS, and more!


Join the LX, Tech, and Innovation Community

This community of practice connects the global JA network with peer-to-peer learning related to JA learning experiences, technology, and innovation. Keep and eye on the community for upcoming learning opportunities, peer-to-peer webinars, fireside chats, and specialty training. Join the LX, Tech, and Innovation Community on Microsoft Teams today!


JA ID

JA ID is an online identity management system that allows users—students, volunteers, alumni, board members, staff, and more—to access multiple JA platforms and applications using one account (that’s one email address and one password for everything!). We’re currently doing a staff-only beta test of JA ID that coincides with registering for GLC Virtual.

When the system is fully up and running, you and other JA stakeholders will have a consistent user interface and experience for seamless navigation across various JA resources and online platforms.


Key Features of JA ID

There’s a lot to love about JA ID:

  • Single sign-on capability across JA platforms (one username; one password)

  • Enhanced security to ensure the protection of user information

  • Improved connectivity and interoperability between JA applications, whether created locally, nationally, regionally, or globally

  • Simplified access for users across different JA locations, without loss of local control over sites and apps

JA ID streamlines access to JA’s digital resources while enhancing security and user experience. 


Benefits to You and Your JA Location

In addition to the security benefits mentioned above, JA ID benefits you personally, as well as your JA location:

  • You’ll have a streamlined user experience. When the system is fully operational, you’ll have only a single login for all your JA platforms . . . no more time spent trying multiple usernames or passwords or repeatedly logging in.

  • For your JA location, fewer password resets mean less strain on Help Desk and system administrator resources. 


JA ID Support and Troubleshooting

 JA ID enables students, volunteers, alumni, board members, and staff to access multiple JA platforms and applications using only one account—that’s one email address and one password for everything! We count on our system to work flawlessly but, sometimes, things happen. This document guides you through creating your account and helps you troubleshoot when issues arise. (Download a PDF of this guide, if you prefer.)

Creating your account

Step 1: Go to portal.oneja.org

Step 2: On the login page, click “Register for JA ID.”

 

Step 3: Fill in the information:

  • First Name and Last Name: Enter your full name.

  • Your Email: Enter your JA work email.

  • Your Job Title: Enter the current title of your job.

  • Your JA Regional Operating Center: Select the Regional Operating Center in which your JA location resides. Not sure which ROC you’re in? Check out the global locations page.

  • Your JA Location: Select the country which your office resides in.

  • Your Preferred Language: From this dropdown, please select your preferred language. This does not mean that all the platforms will have your preferred language, but if the language you chose is supported by the platform, it will be auto selected upon login.

Notes:

  • After filling out the form, your account may take a few minutes to be created.

  • If you have already created your account, you will get an error stating that your account has already been created. Please login with your JA ID.

 

Activating your account

After creating your account, you’ll get an activation email from JA ID.

Step 1: Wait for the email to arrive in your inbox; this might take up to two minutes.

Step 2: Click Activate JA ID Account. Please note that this link is valid for only 30 days.

 

Step 3: Set up your password.

 

Step 4: After entering your password twice, click Next.

 

Step 5: Set up your multi-factor authentication (using either Google Authenticator or Okta Verify).

 

Using Google Authenticator

If you choose the Google Authenticator option, do not scan the QR Code with your phone’s camera. Instead, open the Google Authenticator App (or Microsoft Authenticator) on your phone, click the + icon on the bottom right of your screen and then click Scan QR Code.

 

After scanning the QR Code, Google Authenticator will show a six-digit code that expires every 60 seconds. Click Next on the JA ID screen and enter the six-digit code.

Using Okta Verify

If you choose the Okta Verify option, do not scan the QR Code with your phone’s camera.

Step 1: Open the Okta Verify App on your phone.

Step 2: Click the + icon on the top left of your screen.

Step 3: Choose Organization as account type.

Step 4: Click Skip if prompted to Add Account from Another Device.

Step 5: Click Yes, Ready to Scan.

Step 6: Scan the QR code.

 

Step 7: Optionally, enable biometric login.
Step 8: Optionally, enable FastPass for faster logins in the future.

Congratulations! You have successfully created your secure JA ID Account.

Resetting Your Password

If at some point you forget your password, you can reset it by following these steps:

Step 1: Click Login with JA ID.

 

Step 2: Select where you work for JA (JA local area, JA national, JA ROC, or JA Worldwide), and click Next.

 

Step 3: Enter your JA work email address and click Next.

Step 4: Click Forgot password?

 

Step 5: Click Send Me an Email.

Step 6: Wait for the email with the verification code.

Step 7: Either click the link in the email OR click Enter a Verification Code.

Step 8: Enter your new password.

Notes:

  • If you created your account but never activated it, you will not be able to reset your password. In this scenario, please contact us on support@jaworldwide.org.

  • After resetting your password, you will still need to enter a multi-factor authentication code. If you have a new phone or lost the code, please contact support@jaworldwide.org.


Additional FAQs about JA ID

  • JA ID is compatible with the latest versions of major web browsers, including Google Chrome, Microsoft Edge, Mozilla Firefox and Apple Safari. JA ID also works on a wide range of devices, including desktop computers (Windows, macOS, Linux), laptops, tablets (iOS, Android), and smartphones (iOS, Android).

  • JA ID runs on the Okta platform, which you may already be using for other (non-JA) logins. From Harvard University’s website to your favorite online store for flowers or pet supplies, Okta’s business is to secure connections between people and technology, managing passwords, sign-ons, access to apps, and multifactor authorization.

  • This is our favorite question! To integrate JA ID locally, please contact JA Worldwide support at support@jaworldwide.org

  • If you have checked the “Remember me” checkbox when you are logging into a website or app, the browser will remember you and you would not need to login again, unless you are inactive for five days. 

  • Yes, nobody (not even your helpdesk) has access or visibility into your password data. 

  • Yes, your information is secure. Okta, the JA ID technical partner, protects your information with extensive security measures and controls. Among other measures, JA ID offers flexible, multifactor authentication (MFA). With MFA, you’ll authenticate yourself with both your regular password and a second factor of your choice. For example, you may authenticate with a pin that you receive via text message, a security question, or by simply accepting a push notification on your phone. 

    Your personal data is stored in the region associated with your JA ID account, which is typically determined by your location or the location of your regional JA operating center. Your data remains within your selected region, with only a non-identifiable ID stored in the global hub. No personally identifiable information moves between your regional JA ID center and the global hub. The global hub is hosted in Europe, to ensure maximum security compliance. The global hub also deletes any residual data once you log out or your session expires, ensuring data privacy and compliance with regional data storage requirements. 

  • If your account is locked, enter your email address in the JA ID login screen and then click ‘Forgot Password’ on the bottom right on the screen. If you are still unable to login, please email JA Worldwide support on support@jaworldwide.org. During this beta, if you’re having issues, please don’t just give up. Hearing from you will help us make updates to the system, and we will also make sure you can register for GLC Virtual, no matter what issues you may be encountering.


Take a Bite Out of Cybercrime: IT Tips to Protect Your JA Location

Multifactor Authentication (MFA) Registration Process

Introduction to MFA

Multifactor authentication (MFA) is an account-security measure intended to verify and confirm you are the person actively logging into your account. MFA and basic security defaults should be enabled for everyone. Identity-related attacks like password compromise, replay, and phishing are common in today's environment. More than 99.9% of identity-related attacks are stopped by using MFA and blocking legacy authentication. The goal is to ensure that JA Worldwide establishes a higher level of account security.

MFA Registration Process

Users can register for MFA through multiple methods, as shown below.

  1. Log in to https://aka.ms/mfasetup

  2. Login with your email ID & password

  3. Users can either set up MFA with the Microsoft Authenticator App or a phone number.
    Recommendation: Users should register for MFA multiple ways (such as using both the authenticator app and a phone number) to enable a backup login method if one doesn’t work.

Reviewing Mail Rules and RSS Feeds

Always make sure that your computer is running antivirus software approved by the IT department, as malware can be used to create malicious mail rules and RSS feeds or run malicious code that can grant remote access or leak data to an attacker.

Ensure you use secure passwords for all accounts. If any of your accounts have suffered a data leak, the IT Department should be notified and you must take further action, such as resetting the account password. Check if your account has been compromised at haveibeenpwned.com.

Finally, make sure you regularly update all your devices and software to ensure you are protected by the latest patches, which will help keep you safe and secure.

Mail Rules

Rules in Outlook allow you to automatically perform an action based on the characteristics of an incoming message. This tool can be used for a wide variety of functions; however, like any feature, it can be misused for malicious purposes. Some examples of malicious uses include . . .

  1. Email filtering and deletion: Malicious users can create rules that automatically filter or delete specific emails, such as those from competitors, whistle-blowers, or regulatory authorities. This can help them conceal important information or evade legal actions.

  2. Email forwarding: Attackers can set up a rule to automatically forward incoming emails, including sensitive or confidential information, to an external email address, potentially exposing sensitive data to unauthorized individuals.

  3. Email redirection: Like forwarding, malicious rules can redirect emails to another mailbox without the sender or recipient's knowledge. This can be used for corporate espionage or data theft.

  4. Phishing and spam: Malicious actors can create rules to mark legitimate emails as spam or move them to the junk folder, making it more likely users will miss important messages while tricking them into thinking malicious emails are legitimate.

  5. Spoofing and impersonation: By creating rules that automatically reply to or forward emails with misleading information, attackers can impersonate trusted individuals or organizations, potentially tricking recipients into taking harmful actions.

  6. Automatic reply attacks: Malicious rules can set up automatic replies with malicious links or attachments to anyone who emails the compromised account, potentially spreading malware or phishing links.

  7. Exfiltration of data: Attackers can use rules to systematically search for and extract sensitive information from incoming emails, which can then be collected and used for malicious purposes, such as extortion or fraud.

To mitigate these risks, every individual should review and audit existing email rules regularly to identify any suspicious or unauthorized configurations. If you find any such suspicious or unauthorized configurations, immediately report them to your IT team for further action and risk mitigation.

RSS Feeds

RSS (Really Simple Syndication) feeds deliver frequently updated content from websites, blogs, news sources, and other online publishers to users in a standardized format. RSS feeds allow users to subscribe to their favorite websites and receive updates automatically, often through a reader application or by email. While RSS feeds are generally a legitimate and convenient way to stay informed, they can be used maliciously in a few ways:

  1. Spreading malicious content: Malicious actors can create fake RSS feeds that appear to deliver legitimate content but contain links to malware, phishing sites, or malicious downloads. Unsuspecting users who subscribe to these feeds may inadvertently expose their systems to security threats.

  2. Phishing attacks: Attackers can use RSS feeds to distribute phishing content. They might set up feeds that appear to provide updates from a trusted source, but the links within the feed direct users to fake login pages or sites designed to steal sensitive information.

  3. Distributing malware: Malicious RSS feeds can contain links to infected files or exploit kits. When users click on these links, they may inadvertently download and execute malware on their devices.

  4. Content manipulation: In some cases, attackers may gain unauthorized access to legitimate RSS feeds and manipulate their content. This can involve injecting false information or inserting malicious links into legitimate feeds, potentially misleading or harming subscribers.

  5. Data harvesting: Malicious RSS feeds can collect user data. When users subscribe to these feeds, attackers can gather information about their preferences, interests, and reading habits for nefarious purposes.

To mitigate these risks, every individual should make sure they are signing up for legitimate and trusted feeds. Be cautious with links within RSS feeds, especially if they are from unknown sources or seem suspicious. Always verify the legitimacy of a source before clicking.

Make sure to regularly review your subscriptions and remove any that you no longer find useful or that come from untrustworthy sources.


Digital Collaboration Framework

Technology has changed the way young people access, engage with, and share content. It has also spawned a larger cultural transformation tied to expectations about the ease and speed with which content crosses borders and its relevance for a broad community of consumers. Such cross-border expectations create a new opportunity—as well as a new challenge—for JA to reach students, teachers, volunteers, and other stakeholders.

Supporting and collaborating on technology innovation throughout the JA network will foster the production, sharing, and deployment of the widest possible variety of high-quality digital instruction, in order to support both in-person and virtual instruction that actively engages students. To address both opportunities and challenges we have created a new Digital Collaboration Framework (read or download the PDF) and Digital Collaboration Guidelines (read or download the PDF).

In addition, the LX (Learning Experience) Working Group is using an LX & Technology Roadmap as an ongoing working document. This file includes priority projects across all six ROCs and JA Worldwide to coordinate major development projects (see the current version here).

Contact Caroline Jenner with any questions related to the Digital Collaboration Framework and LX & Technology Roadmap.


JADE logo-02.png

JADE

What is the JA Data Experience?

The all-new JA Data Experience—or JADE—will replace Hewitt as the platform supporting the annual reporting process for the JA network. Using Microsoft PowerBI, JADE is built for flexibility to meet the varied needs of JA’s many stakeholders. With Increased Data Relevance as a JA Worldwide Strategic Priority, and the growing need to increase the frequency of data analysis in the network, JADE will help streamline data collection and enable easier access to data not only for annual reporting but provide robust analytics year-round.

Why JADE?

  • Support organizational Strategic Objectives and operationally driven decision-making

  • Fixed, flexible, freestyle reporting with tailored analytics, including impact score

  • Incorporation of Inspire–Prepare–Succeed classifications and regional and local key performance areas to better support collaboration

  • Integration with additional platforms such as Gather, worldwide census information, Program Central, and more to further JA global analytics

JADE Annual Reporting

JADE Guides and Resources

Global Reporting Starts July 3, 2023

With the new fiscal year comes the annual opportunity to report your data. Stakeholders, including funders and the general public, publish, distribute, and rely on your data, sharing it in strategic plans, annual reports and factbooks, websites, funder and grant compliance and reporting, and impact reports around the JA network.

An official announcement that the system is open, as well as materials and guides to help with the process, are coming soon. In the meantime, you can prepare by downloading a calendar reminder by clicking the button below.

Questions about JADE?

If you have process-related questions regarding JADE, contact Debbie Williams. For all other JADE questions, contact Erin Martin.


Inspire–Prepare–Succeed 

The JA network offers a rich portfolio of learning experiences to students around the world, both virtually and in-person. Advances in digital program delivery throughout the network have laid bare the need for an equally advanced way to serve JA students. Historically, JA offices have considered only student experiences that meet specific program-implementation models or standards, but with the evolving delivery and nature of JA programs, our network needs to be able to track these new ways of learning.

In response to advances in student experiences, digitization of programs, virtual program delivery, and the ever-growing list of JA learning experiences, we’re rolling out a new methodology for counting student experiences and measuring impact. We call it Inspire–Prepare–Succeed. The new methodology enhances and supports the global JA network, and enables a more transparent view of the diversity of JA’s offerings.

With Inspire–Prepare–Succeed, JA student experiences are broken down into three categories:

  • Inspire: Introductory learning experiences that pique a student’s interest

  • Prepare: Core learning experiences that build skills, attitudes, and competencies

  • Succeed: Applied learning experiences that demonstrate mastery of competencies in the real world

Inspire–Prepare–Succeed Video

The Inspire–Prepare–Succeed introductory video premiered at the January 2021 JA Global Town Hall. This video is intended for internal audiences, including staff and board members; it is not meant for distribution via social media. Download the video or view it on YouTube.

Video Translations

Interested in translating the video for your region or local area?

Questions about Inspire–Prepare–Succeed?

Contact Alison Gottsch-Walton with any questions related to Inspire–Prepare–Succeed. Contact Lorrie Noggle for any video-related questions.

If you’re not sure where your program fits, please use the form below to submit your question and program for review.


JA Company Program Global Edition Videos

Access and share the JA Company Program videos using the links below:

Downloadable Video Files (Internal Use Only)

These video files are provided for internal use only. You may download and embed them within your own platforms. Please ensure Dropbox links are not shared outside your organization.

Shareable Vimeo Links (for External Use)

These links can be shared directly with volunteers and other external audiences, as well as linked within your own platforms.

JA Company Program Student Guide

Pre-requisites

Masterclasses

Sessions

Volunteer Videos